SlideShare uma empresa Scribd logo
1 de 30
What is Bullying?
Targeting an individual with repetitive negative
action to deliberately harm.



An imbalance of power so victim or target cannot
defend himself/herself.
Did You Know?

Bullying is a relationship issue.



Harassment can be a form of discrimination.
Did You Know?

Both harassment and bullying can be criminal
activities.



Harassment can be a human rights issue.
Did You Know?

If you stand by and watch bullying, you are part of
the problem.



Bullying is NOT a normal part of growing up.
3 Types of Bullying

1 Direct Bullying



2 Relational Aggression



3 Cyber-Bullying
1. Direct Bullying

   Physical



   Verbal
2. Relational Aggression
   - is indirect or covert



   - is intentional damage to peer relationships and
   individual reputations



   - is quiet, insidious,

   and difficult to detect
Relational Aggression
Includes behaviors such as:

*spreading rumors

*exclusion/isolation

*gossiping

*backstabbing

*taunting

*ignoring/shunning

*hostile body language

*making fun of clothing, lifestyle, or appearance
3 Types of Bullying

 1 Direct Bullying



 2 Relational Aggression


  3 Cyber-Bullying
Cyber-Bullying
  Definition
The use of information and
communication technologies to
deliver deliberate, repeated and
hostile messages to an individual
or a group.
Also referred to as:
  Online social cruelty
  Electronic bullying
Cyberbullying
 >Composed of both direct bullying as well as
 relational aggression<

Can be done without adult knowledge
Is a cowardly form of bullying
Is anonymous
Can attack a wide audience
No tangible feedback to the aggressor
Often outside legal reach of school
Home is no longer a refuge
  can happen any time, any place
Different Means of
Cyberbullying
Many ways that people bully
 Through Email
 Through Instant Messaging (IM)
 Through Social Networks
 Through Text Messages
 Through Websites
Email
Bullies use this to send harassing and threatening
messages to the targets.
Instant Messaging (IM)
 This type enables you to create a private chat
 room with another individual and harass them by
 saying mean things to hurt their feelings
Social Networks
 One of the most popular ways to bully others
 Using Social Networks such as:
   Facebook, MySpace, Twitter and Youtube to bully
   others by posting nasty comments or even pictures
   about them for others to read at their own leisure
 Cyber bullies use this method to post abusive
 messages on your profile wall, add rude comments to
 a picture, put a video or photo on their own profile
 that makes fun of someone
Text Messages
 Receiving abusive calls and/or text messages on
 your phone that are meant to be hurtful
   Scary Phone Calls: receive abusive phone calls from
   someone who uses threats of violence to scare them.
   Often they choose to stay silent on the other end.
   Abusive Text Messages: send text messages that try
   to scare, upset or hurt someone on purpose.
   Offensive picture messages: sending pictures of you
   that have been taken without your knowledge.
   Also, posting pictures that a person does not want
   made public – often used to embarrass the target.
Websites
 Create web sites that mock, torment and harass
 others

 Post rude or abusive words, pictures or videos
 of others
Statistics
                                             Have cyberbullied others (lifetime)
     Cyberbullying Offenders
                                             Have cyberbullied others
                     4%
               4%

          5%
                                             Used one or more forms, two or more
                                             times
                                24%
     6%                                      Posted mean or hurtful comments
                                             about someone online
                                             Spread rumors about someone
                                             online, texts, or emails
6%
                                             Threatened to hurt someone through
                                             texts

7%                                           Threatened to hurt someone while
                                      11%    online
                                             Pretended to be someone online and
                                             was mean and hurtful
     8%
                                             Posted a mean or hurtful picture online
                                             of someone
                          14%                Posted a mean or hurtful video online
               11%
                                             of someone
                                             Created a mean or hurtful web page
                                             about someone
Forms of Cyber bullying
 There are 6 forms of cyber bullying:
  Harassment
  Denigration (put-downs)
  Flaming
  Impersonation
  Outing and Trickery
  Cyber Stalking
Harassment
What is it?
  When you repeatedly send offensive, rude, and
  insulting messages
  Make take several and often multiple forms online
    Repeatedly sending unwanted text or instant messages
    Using public forums such as message boards or
    chatrooms
    Tracking targets by using spyware
    Sending viruses
Denigration
 What is it?
   When you distribute information
   about another that is derogatory
   and untrue through posting it on
   a Web page, sending it to others
   through    email     or    instant
   messaging,    or     posting    or
   sending digitally altered photos
   of someone
Flaming
 What is it?
   When online “fighting” using electronic messages
   with angry, vulgar language
   This most aggressive and abrasive form of
   intimidation
   Use capital letters, images and symbols
   to add emotion to argument
Impersonation

 What is it?
   When you break into an email or social networking
   account and using that person’s online identity to
   send or post vicious or embarrassing material
   to/about others
   Most elaborate form of cyberbullying
Outing and Trickery
 What is it?
   When     you    share    someone's   secrets    or
   embarrassing information, or tricking someone
   into revealing secrets or embarrassing information
   and forwarding it to others.
Cyber Stalking
 What is that?

   When you repeatedly send messages that include
   threats of harm or are highly intimidating, or
   engaging in other online activities that make a
   person afraid for his or her safety (depending on
   the content of the message, it may be illegal)
   Victims believe that cyber stalking may escalate to
   real stalking
Why do you think cyber
 bullies bully others?
They do not think it’s a big deal.
Don’t think about and are not aware of the
consequences.
May be encouraged by friends.
Don’t think they will get caught.
They may think that everyone cyber bullies.
May not even realize they are cyber bullying
someone.
Effects of Cyberbullying
Some affects of Cyber Bullying include:
  Undermining confidence, self-esteem, and sense of
  security.
  Lower performance and attendance in school.
  Cause of stress that can affect your health.
  Fuelling prejudice in certain areas such as
  race, religion, and sexuality.
  Can lead to suicidal thoughts.
  Can effect you for the rest of your life.
Negative Emotions
Caused By Cyberbullying
 Feelings of:
 Anger
 Sadness
 Feeling hurt
 Embarrassed
 Afraid
“When people use technology, there is
a lack of tangible feedback about the
consequences of actions on others.”
                -Nancy Willard

Mais conteúdo relacionado

Mais procurados

Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying caitlynx48
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.jessy0121
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...HDCH
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentationSally Garza
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingringw1sl
 
Bullying in social media presentation
Bullying in social media presentationBullying in social media presentation
Bullying in social media presentationmitchell_shannon
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointshannonmf
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 

Mais procurados (20)

Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Bullying in social media presentation
Bullying in social media presentationBullying in social media presentation
Bullying in social media presentation
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
 

Destaque

*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*Amber Dee
 
Cyberbullying powerpoint shawn lemus
Cyberbullying powerpoint shawn lemusCyberbullying powerpoint shawn lemus
Cyberbullying powerpoint shawn lemusshawnlemus
 
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?""Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"DefinetheLine
 
Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetinganniebee3509
 
Cyber Bullying on Social Media Sites
Cyber Bullying on Social Media SitesCyber Bullying on Social Media Sites
Cyber Bullying on Social Media SitesSwapnil Shahade
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parentsdamarissepulveda
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingbl03cook
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyinganugent_13
 
Psychological health!
Psychological health!Psychological health!
Psychological health!kscheidy
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointtburdzy1
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingwirsi
 
Cyberbullying Presentation 2008
Cyberbullying Presentation 2008Cyberbullying Presentation 2008
Cyberbullying Presentation 2008Josie Fraser
 
Aet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingAet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingcschoeneman
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullyingMelissa
 
Cyber Bullying Presentation
Cyber Bullying PresentationCyber Bullying Presentation
Cyber Bullying Presentationamate1cl
 

Destaque (20)

*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Cyberbullying powerpoint shawn lemus
Cyberbullying powerpoint shawn lemusCyberbullying powerpoint shawn lemus
Cyberbullying powerpoint shawn lemus
 
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?""Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
 
Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meeting
 
Cyber Bullying on Social Media Sites
Cyber Bullying on Social Media SitesCyber Bullying on Social Media Sites
Cyber Bullying on Social Media Sites
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parents
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Olmv cyberbullying
Olmv cyberbullyingOlmv cyberbullying
Olmv cyberbullying
 
Nos blessures intérieures
Nos blessures intérieuresNos blessures intérieures
Nos blessures intérieures
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Psychological health!
Psychological health!Psychological health!
Psychological health!
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyberbully powerpoint
Cyberbully powerpointCyberbully powerpoint
Cyberbully powerpoint
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying Presentation 2008
Cyberbullying Presentation 2008Cyberbullying Presentation 2008
Cyberbullying Presentation 2008
 
Aet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingAet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullying
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullying
 
Cyber Bullying Presentation
Cyber Bullying PresentationCyber Bullying Presentation
Cyber Bullying Presentation
 

Semelhante a Cyber bullying presentation intro

Semelhante a Cyber bullying presentation intro (20)

The Hazards Of Cyberbullying
The Hazards Of CyberbullyingThe Hazards Of Cyberbullying
The Hazards Of Cyberbullying
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
cyber bulling
 cyber bulling cyber bulling
cyber bulling
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptx
 
School Cyber Bullying Among Students .pptx.pptx
School Cyber Bullying Among Students .pptx.pptxSchool Cyber Bullying Among Students .pptx.pptx
School Cyber Bullying Among Students .pptx.pptx
 
Cyberbullying_Presentation.pptx.pdf
Cyberbullying_Presentation.pptx.pdfCyberbullying_Presentation.pptx.pdf
Cyberbullying_Presentation.pptx.pdf
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Stephanie nichole ho
Stephanie nichole hoStephanie nichole ho
Stephanie nichole ho
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Mais de kscheidy

Consequences of poor choices!
Consequences of poor choices!Consequences of poor choices!
Consequences of poor choices!kscheidy
 
Social skills and issues
Social skills and issuesSocial skills and issues
Social skills and issueskscheidy
 
Stand up to bullying week
Stand up to bullying weekStand up to bullying week
Stand up to bullying weekkscheidy
 
Change within isolation
Change within isolationChange within isolation
Change within isolationkscheidy
 
Chapter 15
Chapter 15Chapter 15
Chapter 15kscheidy
 
Chapter 10
Chapter 10Chapter 10
Chapter 10kscheidy
 
Honor and duty
Honor and dutyHonor and duty
Honor and dutykscheidy
 
Ch 10 a deadly meeting
Ch  10   a deadly meetingCh  10   a deadly meeting
Ch 10 a deadly meetingkscheidy
 
Chapter 9 notes
Chapter 9 notesChapter 9 notes
Chapter 9 noteskscheidy
 
Ch 6 day 9 - the loyalist migration impacts
Ch  6   day 9 - the loyalist migration impactsCh  6   day 9 - the loyalist migration impacts
Ch 6 day 9 - the loyalist migration impactskscheidy
 
Ch 6 day 11 - the war of 1812 - perspectives
Ch  6   day 11 - the war of 1812 - perspectivesCh  6   day 11 - the war of 1812 - perspectives
Ch 6 day 11 - the war of 1812 - perspectiveskscheidy
 
Chpt 8 notes
Chpt 8 notesChpt 8 notes
Chpt 8 noteskscheidy
 
Cell phone safety
Cell phone safetyCell phone safety
Cell phone safetykscheidy
 
Chpt 7 notes
Chpt 7 notesChpt 7 notes
Chpt 7 noteskscheidy
 

Mais de kscheidy (20)

Consequences of poor choices!
Consequences of poor choices!Consequences of poor choices!
Consequences of poor choices!
 
Social skills and issues
Social skills and issuesSocial skills and issues
Social skills and issues
 
Stand up to bullying week
Stand up to bullying weekStand up to bullying week
Stand up to bullying week
 
Change within isolation
Change within isolationChange within isolation
Change within isolation
 
Chapter 15
Chapter 15Chapter 15
Chapter 15
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
Honor and duty
Honor and dutyHonor and duty
Honor and duty
 
Edo japan
Edo japanEdo japan
Edo japan
 
Japan
JapanJapan
Japan
 
Ch 10 a deadly meeting
Ch  10   a deadly meetingCh  10   a deadly meeting
Ch 10 a deadly meeting
 
Chapter 9 notes
Chapter 9 notesChapter 9 notes
Chapter 9 notes
 
Day 2
Day 2Day 2
Day 2
 
Day 1 ppt
Day 1 pptDay 1 ppt
Day 1 ppt
 
Ch 6 day 9 - the loyalist migration impacts
Ch  6   day 9 - the loyalist migration impactsCh  6   day 9 - the loyalist migration impacts
Ch 6 day 9 - the loyalist migration impacts
 
Ch 6 day 11 - the war of 1812 - perspectives
Ch  6   day 11 - the war of 1812 - perspectivesCh  6   day 11 - the war of 1812 - perspectives
Ch 6 day 11 - the war of 1812 - perspectives
 
Chpt 8 notes
Chpt 8 notesChpt 8 notes
Chpt 8 notes
 
Cell phone safety
Cell phone safetyCell phone safety
Cell phone safety
 
Chpt 7 notes
Chpt 7 notesChpt 7 notes
Chpt 7 notes
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 

Último

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Último (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

Cyber bullying presentation intro

  • 1.
  • 2. What is Bullying? Targeting an individual with repetitive negative action to deliberately harm. An imbalance of power so victim or target cannot defend himself/herself.
  • 3. Did You Know? Bullying is a relationship issue. Harassment can be a form of discrimination.
  • 4. Did You Know? Both harassment and bullying can be criminal activities. Harassment can be a human rights issue.
  • 5. Did You Know? If you stand by and watch bullying, you are part of the problem. Bullying is NOT a normal part of growing up.
  • 6. 3 Types of Bullying 1 Direct Bullying 2 Relational Aggression 3 Cyber-Bullying
  • 7. 1. Direct Bullying Physical Verbal
  • 8. 2. Relational Aggression - is indirect or covert - is intentional damage to peer relationships and individual reputations - is quiet, insidious, and difficult to detect
  • 9. Relational Aggression Includes behaviors such as: *spreading rumors *exclusion/isolation *gossiping *backstabbing *taunting *ignoring/shunning *hostile body language *making fun of clothing, lifestyle, or appearance
  • 10. 3 Types of Bullying 1 Direct Bullying 2 Relational Aggression 3 Cyber-Bullying
  • 11. Cyber-Bullying Definition The use of information and communication technologies to deliver deliberate, repeated and hostile messages to an individual or a group. Also referred to as: Online social cruelty Electronic bullying
  • 12. Cyberbullying >Composed of both direct bullying as well as relational aggression< Can be done without adult knowledge Is a cowardly form of bullying Is anonymous Can attack a wide audience No tangible feedback to the aggressor Often outside legal reach of school Home is no longer a refuge can happen any time, any place
  • 13. Different Means of Cyberbullying Many ways that people bully Through Email Through Instant Messaging (IM) Through Social Networks Through Text Messages Through Websites
  • 14. Email Bullies use this to send harassing and threatening messages to the targets.
  • 15. Instant Messaging (IM) This type enables you to create a private chat room with another individual and harass them by saying mean things to hurt their feelings
  • 16. Social Networks One of the most popular ways to bully others Using Social Networks such as: Facebook, MySpace, Twitter and Youtube to bully others by posting nasty comments or even pictures about them for others to read at their own leisure Cyber bullies use this method to post abusive messages on your profile wall, add rude comments to a picture, put a video or photo on their own profile that makes fun of someone
  • 17. Text Messages Receiving abusive calls and/or text messages on your phone that are meant to be hurtful Scary Phone Calls: receive abusive phone calls from someone who uses threats of violence to scare them. Often they choose to stay silent on the other end. Abusive Text Messages: send text messages that try to scare, upset or hurt someone on purpose. Offensive picture messages: sending pictures of you that have been taken without your knowledge. Also, posting pictures that a person does not want made public – often used to embarrass the target.
  • 18. Websites Create web sites that mock, torment and harass others Post rude or abusive words, pictures or videos of others
  • 19. Statistics Have cyberbullied others (lifetime) Cyberbullying Offenders Have cyberbullied others 4% 4% 5% Used one or more forms, two or more times 24% 6% Posted mean or hurtful comments about someone online Spread rumors about someone online, texts, or emails 6% Threatened to hurt someone through texts 7% Threatened to hurt someone while 11% online Pretended to be someone online and was mean and hurtful 8% Posted a mean or hurtful picture online of someone 14% Posted a mean or hurtful video online 11% of someone Created a mean or hurtful web page about someone
  • 20. Forms of Cyber bullying There are 6 forms of cyber bullying: Harassment Denigration (put-downs) Flaming Impersonation Outing and Trickery Cyber Stalking
  • 21. Harassment What is it? When you repeatedly send offensive, rude, and insulting messages Make take several and often multiple forms online Repeatedly sending unwanted text or instant messages Using public forums such as message boards or chatrooms Tracking targets by using spyware Sending viruses
  • 22. Denigration What is it? When you distribute information about another that is derogatory and untrue through posting it on a Web page, sending it to others through email or instant messaging, or posting or sending digitally altered photos of someone
  • 23. Flaming What is it? When online “fighting” using electronic messages with angry, vulgar language This most aggressive and abrasive form of intimidation Use capital letters, images and symbols to add emotion to argument
  • 24. Impersonation What is it? When you break into an email or social networking account and using that person’s online identity to send or post vicious or embarrassing material to/about others Most elaborate form of cyberbullying
  • 25. Outing and Trickery What is it? When you share someone's secrets or embarrassing information, or tricking someone into revealing secrets or embarrassing information and forwarding it to others.
  • 26. Cyber Stalking What is that? When you repeatedly send messages that include threats of harm or are highly intimidating, or engaging in other online activities that make a person afraid for his or her safety (depending on the content of the message, it may be illegal) Victims believe that cyber stalking may escalate to real stalking
  • 27. Why do you think cyber bullies bully others? They do not think it’s a big deal. Don’t think about and are not aware of the consequences. May be encouraged by friends. Don’t think they will get caught. They may think that everyone cyber bullies. May not even realize they are cyber bullying someone.
  • 28. Effects of Cyberbullying Some affects of Cyber Bullying include: Undermining confidence, self-esteem, and sense of security. Lower performance and attendance in school. Cause of stress that can affect your health. Fuelling prejudice in certain areas such as race, religion, and sexuality. Can lead to suicidal thoughts. Can effect you for the rest of your life.
  • 29. Negative Emotions Caused By Cyberbullying Feelings of: Anger Sadness Feeling hurt Embarrassed Afraid
  • 30. “When people use technology, there is a lack of tangible feedback about the consequences of actions on others.” -Nancy Willard

Notas do Editor

  1. More commonly known for “Dissing” someone online. Sending or posting cruel gossip or rumors about a person to damage his or her REPUTATION or FRIENDSHIPS
  2. Pretending to be someone else and sending material that makes that person look bad, gets the person in trouble or dangers, or damages that persons reputation or friendships
  3. Many print out instant messaging conversations, often containing personal or sexual information to show around to others