SlideShare uma empresa Scribd logo
1 de 27
Cyber Bullying:One Students Search for Answers Lori JanePerdew LIS 5260  Library Systems Information Technology Professor Pentlin
Words have power
I Love You Power to heal Glad to know you You are beautiful
I Hate You Power to hurt You should just die You are ugly
Words But once spoken, they can’t be taken back
Cyber Bullying What Is It? http://stopcyberbullying.org/
Know the Facts http://lindaruppe.vhomesre.com/files/2010/11/cyberbullying-pictures-51.jpg
Nobody Cares If I Live or Die
From Victim to Aggressor
http://captaincollo.blogspot.com/2009/07/cyber-bullying.html http://www.arabic2english.org/wp-content/uploads/2011/02/Cyber-Bullying-in-School-300x225.jpg Tricks of the Trade http://www.justhustlin.com/wp-content/uploads/2010/07/miley-sexting.jpg
Stop Texting Me! http://1.bp.blogspot.com/_9hxqBQGGL5M/TNmMIIy3MQI/AAAAAAAAAB4/HjzojVkjc9A/s1600/bullying.jpg
Sexting
Why Me? http://thediablodispatch.com/wp-content/uploads/2010/12/Cyber-bullying.jpg
Why Do They Do It? http://www.cc-peds.net/promises/archive/autumn_05/images/autumn3_CyberBullies_Images.jpg
What Can I Do? http://k9webprotection.net/wp-content/uploads/2011/01/cyber-bullying.jpg
Don’t Bully Me! http://jsusmerano13.files.wordpress.com/2010/08/stop_cyber_bullying_poster_s2ht.jpg
Tips for Parents http://www.cyberbullyalert.com/blog/tag/cyber-bullying/
Help Me! http://www.newburyport-today.com/2011/04/11/cyberbullying/
http://morichesdaily.com/wp-content/uploads/2010/12/New-Years-Law.png Who’s Going to Protect Me?
Educate www.stopbullyingnow.hrsa.gov
A New Revolution http://edtechvision.org/wp-content/uploads/2008/12/change.jpg
http://internetsavvy.wikispaces.com/file/view/digital_citizenship.png
Do What I Say, Not What I Do http://2.bp.blogspot.com/_QTlkFb5Grc4/Sm8sFlSuDDI/AAAAAAAAAIM/qJ_H3ICzWWg/s1600-h/digital+citizen.jpg
Speak Up!
Works Cited Quote fromEdward Thorndike, http://classiclit.about.com/od/basicsliteratureintro/a/aa_words.htm Teluskin, Joseph. Words that Hurt, Words that Heal: How to Choose Words Wisely and Well. New York: W. Morrow and Co., 1996. Print. Definition of Cyber bullying.  http://definitions.uslegal.com/c/cyber-bullying/ “11 Facts about Cyber Bullying.” http://www.dosomething.org/tipsandtools/11-facts-about-cyber-bullying Web. 30 Apr. 2011. Patchin, Justin W., Justin W., SameerHinduja, eds. “Summary of Cyberbullying Research from 2004-2010.” Cyberbullying Research Center. Web. 20 Apr. 2011.   http://cyberbullying.us/research.php KidsHealth  from Nemours, http://kidshealth.org/parent/emotions/feelings/cyberbullying.html Web. 24 April 2011. National Crime Prevention Council, http://www.ncpc.org/cyberbullying Web. 24 Apr. 2011. “Net Bullies . . . Preventing and Handling Cyberbullying and Harassment.”  http://www.netbullies.com/pages/2/index.htm, Web. 28 Apr. 2011. “Cyber Bullying: Statistics and Tips.” Isafe.org, http://www.isafe.org/channels/sub.php?ch=op&sub_id=media_cyber_bullying. Web 28 Apr. Staff of School Library Journal. “Kids Hide Cyberbullying Incidents from Parents.” School Library Journal. Oct. 2008. Web. 26 Apr. 2011. Staff of School Library Journal. “Sexting and Cyber Safety.” School Library Journal. Oct. 2008. Web. 27 Apr. 2011. http://www.digitalcitizenship.net/uploads/1stLL.pdf
Works Cited National Crime Prevention Council, http://www.ncpc.org/cyberbullying Web. 24 Apr. 2011. Jackson, Drew. “Prevent Cyberbullying.” http://www.slais.ubc.ca/courses/libr500/04-05-wt2/www/D_Jackson/prevent.htm  Web. 27 Apr. 2011. * “What Is the Parent’s Role in This?” http://www.stopcyberbullying.org/prevention/parents_role.html, Web. 27 Apr. 2011. http://www.stopbullying.gov/topics/cyberbullying/schools/ Web. 25 Apr. 2011. “Digital Citizenship Includes Rights as Well as Responsibilities.” SafeKids.com, Sep.  2010. Web. 22 Apr. 2011. http://www.safekids.com/2010/09/27/digital-citizenship-includes-rights-as-well-as-responsibilities/ United Kingdom’s Office for Standards in Education, Children’s Services and Skills (Ofsted). http://www.ofsted.gov.uk/Ofsted-home/Publications-and-research/Browse-all-by/Documents-by-type/Thematic-reports/The-safe-use-of-new-technologies IBLS Editor. “Internet Law—Missouri Governor Signs Cyber-Bullying Bill into Law.” Internet Business Law Services. Jul. 2008. Web. 5 May 2011. http://www.jahonline.org/article/S1054-139X(07)00422-3/abstract Ribbble, Mike. “Raising a Digital Child.” Away. Jan/Feb. 2010.  Web. 23 Apr. 2011. http://www.digitalcitizenship.org/ Ribble, Mike S., Gerald D. Bailey, and Tweed. W. Ross. “Digital Citizenship: Addressing Appropriate Technology Behavior.”  Learning and Leading with Technology, 32.1 (2004): 6-12. Web. 29 Apr. 2011.  Srabstein, Jorge, Benjamin Berkman, and Eugenia Pynitkova. “Anti-Bullying Legislation: A Public Health Perspective.” Journal of Adolescent Health, 42, 1 (2008): 11-20. Web. 30 Apr. 2011. http://www.jahonline.org/article/S1054-139X(07)00422-3/abstract
AASL Standards AASL 1.1.1, 1.2.1,  All of 1.3 Standards, All of 2.3 Standards, 3.1.6, 3.3.7, 4.1.7 All of 4.3 Standards

Mais conteúdo relacionado

Mais procurados

The library without walls
The library without wallsThe library without walls
The library without wallsjessthomas49
 
Social Media:It Ain’t Going Away
Social Media:It Ain’t Going AwaySocial Media:It Ain’t Going Away
Social Media:It Ain’t Going AwayTom Jelen
 
Information Literacy sans frontieres
Information Literacy sans frontieresInformation Literacy sans frontieres
Information Literacy sans frontieresPeter Godwin
 
Going Mobile and Social at Bedfordshire University
Going Mobile and Social at Bedfordshire UniversityGoing Mobile and Social at Bedfordshire University
Going Mobile and Social at Bedfordshire UniversityPeter Godwin
 
Digital etiquette
Digital etiquetteDigital etiquette
Digital etiquettepcooney1
 
Informatica evaluation websites final (2)
Informatica evaluation websites final (2)Informatica evaluation websites final (2)
Informatica evaluation websites final (2)Flor_pepper
 
Online Colaboration & Digital citizenship
Online Colaboration & Digital citizenshipOnline Colaboration & Digital citizenship
Online Colaboration & Digital citizenshipSonya Engelen
 
Library 2.0 : bah Humbug!
Library 2.0 : bah Humbug!Library 2.0 : bah Humbug!
Library 2.0 : bah Humbug!Peter Godwin
 
Powerpoint
PowerpointPowerpoint
Powerpointbmdickey
 
Week 13 part 6
Week 13 part 6Week 13 part 6
Week 13 part 6educw200
 
Tie learning specialist performance task
Tie learning specialist performance taskTie learning specialist performance task
Tie learning specialist performance taskJulie Erickson
 
Social Tech And Teaching August In Service
Social  Tech And  Teaching  August  In  ServiceSocial  Tech And  Teaching  August  In  Service
Social Tech And Teaching August In Servicematthewrjolly
 
Information Literacy gets mobile
Information Literacy gets mobileInformation Literacy gets mobile
Information Literacy gets mobilePeter Godwin
 
Using Twitter: Why do it? | LA Day 2015
Using Twitter: Why do it? | LA Day 2015Using Twitter: Why do it? | LA Day 2015
Using Twitter: Why do it? | LA Day 2015Sarah Gallagher
 

Mais procurados (16)

The library without walls
The library without wallsThe library without walls
The library without walls
 
Social Media:It Ain’t Going Away
Social Media:It Ain’t Going AwaySocial Media:It Ain’t Going Away
Social Media:It Ain’t Going Away
 
Otherwise Open
Otherwise OpenOtherwise Open
Otherwise Open
 
Information Literacy sans frontieres
Information Literacy sans frontieresInformation Literacy sans frontieres
Information Literacy sans frontieres
 
Going Mobile and Social at Bedfordshire University
Going Mobile and Social at Bedfordshire UniversityGoing Mobile and Social at Bedfordshire University
Going Mobile and Social at Bedfordshire University
 
Digital etiquette
Digital etiquetteDigital etiquette
Digital etiquette
 
Informatica evaluation websites final (2)
Informatica evaluation websites final (2)Informatica evaluation websites final (2)
Informatica evaluation websites final (2)
 
Online 1207
Online 1207Online 1207
Online 1207
 
Online Colaboration & Digital citizenship
Online Colaboration & Digital citizenshipOnline Colaboration & Digital citizenship
Online Colaboration & Digital citizenship
 
Library 2.0 : bah Humbug!
Library 2.0 : bah Humbug!Library 2.0 : bah Humbug!
Library 2.0 : bah Humbug!
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Week 13 part 6
Week 13 part 6Week 13 part 6
Week 13 part 6
 
Tie learning specialist performance task
Tie learning specialist performance taskTie learning specialist performance task
Tie learning specialist performance task
 
Social Tech And Teaching August In Service
Social  Tech And  Teaching  August  In  ServiceSocial  Tech And  Teaching  August  In  Service
Social Tech And Teaching August In Service
 
Information Literacy gets mobile
Information Literacy gets mobileInformation Literacy gets mobile
Information Literacy gets mobile
 
Using Twitter: Why do it? | LA Day 2015
Using Twitter: Why do it? | LA Day 2015Using Twitter: Why do it? | LA Day 2015
Using Twitter: Why do it? | LA Day 2015
 

Destaque

Water earth fire air by helana derossett
Water earth fire air by helana derossettWater earth fire air by helana derossett
Water earth fire air by helana derossettPhotoLover13
 
A day at the beach by madison derossett final
A day at the beach by madison derossett finalA day at the beach by madison derossett final
A day at the beach by madison derossett finalPhotoLover13
 
Presentaciónvocalespptx
PresentaciónvocalespptxPresentaciónvocalespptx
Presentaciónvocalespptxenigma1985
 
Water earth fire air by helana derossett
Water earth fire air by helana derossettWater earth fire air by helana derossett
Water earth fire air by helana derossettPhotoLover13
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationljperdew
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationljperdew
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationljperdew
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationljperdew
 

Destaque (10)

Water earth fire air by helana derossett
Water earth fire air by helana derossettWater earth fire air by helana derossett
Water earth fire air by helana derossett
 
A day at the beach by madison derossett final
A day at the beach by madison derossett finalA day at the beach by madison derossett final
A day at the beach by madison derossett final
 
Presentaciónvocalespptx
PresentaciónvocalespptxPresentaciónvocalespptx
Presentaciónvocalespptx
 
Water earth fire air by helana derossett
Water earth fire air by helana derossettWater earth fire air by helana derossett
Water earth fire air by helana derossett
 
Nutrition
NutritionNutrition
Nutrition
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Informacion basica
Informacion basicaInformacion basica
Informacion basica
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 

Semelhante a Cyber Bullying: Understanding the Threat

Cyberbullying - LIS 5620
Cyberbullying - LIS 5620Cyberbullying - LIS 5620
Cyberbullying - LIS 5620mccready95
 
Information Literacy 2.0
Information Literacy 2.0Information Literacy 2.0
Information Literacy 2.0Jen Thomas
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingjpliska
 
What's in Your Digital Toolbox?
What's in Your Digital Toolbox? What's in Your Digital Toolbox?
What's in Your Digital Toolbox? Joquetta Johnson
 
screenagers and the digital window
screenagers and the digital windowscreenagers and the digital window
screenagers and the digital windowJoquetta Johnson
 
Information commons
Information commonsInformation commons
Information commonsinfocommons
 
Discover, Explore, Play, Learn, Love
Discover, Explore, Play, Learn, LoveDiscover, Explore, Play, Learn, Love
Discover, Explore, Play, Learn, LoveAnthony Molaro
 
#2 Library 2.0: Melbourne Workshop
#2 Library 2.0: Melbourne Workshop #2 Library 2.0: Melbourne Workshop
#2 Library 2.0: Melbourne Workshop hblowers
 
Library 2.0: Melbourne
Library 2.0: MelbourneLibrary 2.0: Melbourne
Library 2.0: Melbournehblowers
 
Offering Service and Support to the LGBTQIA Community and Allies (Nov. 2018)
Offering Service and Support to the LGBTQIA Community and Allies (Nov. 2018)Offering Service and Support to the LGBTQIA Community and Allies (Nov. 2018)
Offering Service and Support to the LGBTQIA Community and Allies (Nov. 2018)ALATechSource
 
Teacher Librarians: the real app -- Baltimore PS
Teacher Librarians: the real app -- Baltimore PSTeacher Librarians: the real app -- Baltimore PS
Teacher Librarians: the real app -- Baltimore PStechnolibrary
 
Not afraid
Not afraidNot afraid
Not afraidebsoltys
 
Information Literacy, Web 2.0 and the New Librarians
Information Literacy, Web 2.0 and the New LibrariansInformation Literacy, Web 2.0 and the New Librarians
Information Literacy, Web 2.0 and the New LibrariansPeter Godwin
 
Great Database Debate
Great Database DebateGreat Database Debate
Great Database DebateFloyd Pentlin
 
H domestic violence 1
H domestic violence 1H domestic violence 1
H domestic violence 1ascott11
 
H domestic violence 1
H domestic violence 1H domestic violence 1
H domestic violence 1ascott11
 

Semelhante a Cyber Bullying: Understanding the Threat (20)

Cyberbullying - LIS 5620
Cyberbullying - LIS 5620Cyberbullying - LIS 5620
Cyberbullying - LIS 5620
 
Information Literacy 2.0
Information Literacy 2.0Information Literacy 2.0
Information Literacy 2.0
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
What's in Your Digital Toolbox?
What's in Your Digital Toolbox? What's in Your Digital Toolbox?
What's in Your Digital Toolbox?
 
523 assig 1
523 assig 1523 assig 1
523 assig 1
 
screenagers and the digital window
screenagers and the digital windowscreenagers and the digital window
screenagers and the digital window
 
Learning and teaching in the digital age (By Steve Wheeler)
Learning and teaching in the digital age (By Steve Wheeler)Learning and teaching in the digital age (By Steve Wheeler)
Learning and teaching in the digital age (By Steve Wheeler)
 
Information commons
Information commonsInformation commons
Information commons
 
Discover, Explore, Play, Learn, Love
Discover, Explore, Play, Learn, LoveDiscover, Explore, Play, Learn, Love
Discover, Explore, Play, Learn, Love
 
#2 Library 2.0: Melbourne Workshop
#2 Library 2.0: Melbourne Workshop #2 Library 2.0: Melbourne Workshop
#2 Library 2.0: Melbourne Workshop
 
Library 2.0: Melbourne
Library 2.0: MelbourneLibrary 2.0: Melbourne
Library 2.0: Melbourne
 
Offering Service and Support to the LGBTQIA Community and Allies (Nov. 2018)
Offering Service and Support to the LGBTQIA Community and Allies (Nov. 2018)Offering Service and Support to the LGBTQIA Community and Allies (Nov. 2018)
Offering Service and Support to the LGBTQIA Community and Allies (Nov. 2018)
 
Teacher Librarians: the real app -- Baltimore PS
Teacher Librarians: the real app -- Baltimore PSTeacher Librarians: the real app -- Baltimore PS
Teacher Librarians: the real app -- Baltimore PS
 
Not afraid
Not afraidNot afraid
Not afraid
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
School Library Websites
School Library WebsitesSchool Library Websites
School Library Websites
 
Information Literacy, Web 2.0 and the New Librarians
Information Literacy, Web 2.0 and the New LibrariansInformation Literacy, Web 2.0 and the New Librarians
Information Literacy, Web 2.0 and the New Librarians
 
Great Database Debate
Great Database DebateGreat Database Debate
Great Database Debate
 
H domestic violence 1
H domestic violence 1H domestic violence 1
H domestic violence 1
 
H domestic violence 1
H domestic violence 1H domestic violence 1
H domestic violence 1
 

Último

Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 

Último (20)

Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 

Cyber Bullying: Understanding the Threat

  • 1. Cyber Bullying:One Students Search for Answers Lori JanePerdew LIS 5260 Library Systems Information Technology Professor Pentlin
  • 3. I Love You Power to heal Glad to know you You are beautiful
  • 4. I Hate You Power to hurt You should just die You are ugly
  • 5. Words But once spoken, they can’t be taken back
  • 6. Cyber Bullying What Is It? http://stopcyberbullying.org/
  • 7. Know the Facts http://lindaruppe.vhomesre.com/files/2010/11/cyberbullying-pictures-51.jpg
  • 8. Nobody Cares If I Live or Die
  • 9. From Victim to Aggressor
  • 11. Stop Texting Me! http://1.bp.blogspot.com/_9hxqBQGGL5M/TNmMIIy3MQI/AAAAAAAAAB4/HjzojVkjc9A/s1600/bullying.jpg
  • 14. Why Do They Do It? http://www.cc-peds.net/promises/archive/autumn_05/images/autumn3_CyberBullies_Images.jpg
  • 15. What Can I Do? http://k9webprotection.net/wp-content/uploads/2011/01/cyber-bullying.jpg
  • 16. Don’t Bully Me! http://jsusmerano13.files.wordpress.com/2010/08/stop_cyber_bullying_poster_s2ht.jpg
  • 17. Tips for Parents http://www.cyberbullyalert.com/blog/tag/cyber-bullying/
  • 21. A New Revolution http://edtechvision.org/wp-content/uploads/2008/12/change.jpg
  • 23. Do What I Say, Not What I Do http://2.bp.blogspot.com/_QTlkFb5Grc4/Sm8sFlSuDDI/AAAAAAAAAIM/qJ_H3ICzWWg/s1600-h/digital+citizen.jpg
  • 25. Works Cited Quote fromEdward Thorndike, http://classiclit.about.com/od/basicsliteratureintro/a/aa_words.htm Teluskin, Joseph. Words that Hurt, Words that Heal: How to Choose Words Wisely and Well. New York: W. Morrow and Co., 1996. Print. Definition of Cyber bullying. http://definitions.uslegal.com/c/cyber-bullying/ “11 Facts about Cyber Bullying.” http://www.dosomething.org/tipsandtools/11-facts-about-cyber-bullying Web. 30 Apr. 2011. Patchin, Justin W., Justin W., SameerHinduja, eds. “Summary of Cyberbullying Research from 2004-2010.” Cyberbullying Research Center. Web. 20 Apr. 2011. http://cyberbullying.us/research.php KidsHealth from Nemours, http://kidshealth.org/parent/emotions/feelings/cyberbullying.html Web. 24 April 2011. National Crime Prevention Council, http://www.ncpc.org/cyberbullying Web. 24 Apr. 2011. “Net Bullies . . . Preventing and Handling Cyberbullying and Harassment.” http://www.netbullies.com/pages/2/index.htm, Web. 28 Apr. 2011. “Cyber Bullying: Statistics and Tips.” Isafe.org, http://www.isafe.org/channels/sub.php?ch=op&sub_id=media_cyber_bullying. Web 28 Apr. Staff of School Library Journal. “Kids Hide Cyberbullying Incidents from Parents.” School Library Journal. Oct. 2008. Web. 26 Apr. 2011. Staff of School Library Journal. “Sexting and Cyber Safety.” School Library Journal. Oct. 2008. Web. 27 Apr. 2011. http://www.digitalcitizenship.net/uploads/1stLL.pdf
  • 26. Works Cited National Crime Prevention Council, http://www.ncpc.org/cyberbullying Web. 24 Apr. 2011. Jackson, Drew. “Prevent Cyberbullying.” http://www.slais.ubc.ca/courses/libr500/04-05-wt2/www/D_Jackson/prevent.htm Web. 27 Apr. 2011. * “What Is the Parent’s Role in This?” http://www.stopcyberbullying.org/prevention/parents_role.html, Web. 27 Apr. 2011. http://www.stopbullying.gov/topics/cyberbullying/schools/ Web. 25 Apr. 2011. “Digital Citizenship Includes Rights as Well as Responsibilities.” SafeKids.com, Sep. 2010. Web. 22 Apr. 2011. http://www.safekids.com/2010/09/27/digital-citizenship-includes-rights-as-well-as-responsibilities/ United Kingdom’s Office for Standards in Education, Children’s Services and Skills (Ofsted). http://www.ofsted.gov.uk/Ofsted-home/Publications-and-research/Browse-all-by/Documents-by-type/Thematic-reports/The-safe-use-of-new-technologies IBLS Editor. “Internet Law—Missouri Governor Signs Cyber-Bullying Bill into Law.” Internet Business Law Services. Jul. 2008. Web. 5 May 2011. http://www.jahonline.org/article/S1054-139X(07)00422-3/abstract Ribbble, Mike. “Raising a Digital Child.” Away. Jan/Feb. 2010. Web. 23 Apr. 2011. http://www.digitalcitizenship.org/ Ribble, Mike S., Gerald D. Bailey, and Tweed. W. Ross. “Digital Citizenship: Addressing Appropriate Technology Behavior.” Learning and Leading with Technology, 32.1 (2004): 6-12. Web. 29 Apr. 2011. Srabstein, Jorge, Benjamin Berkman, and Eugenia Pynitkova. “Anti-Bullying Legislation: A Public Health Perspective.” Journal of Adolescent Health, 42, 1 (2008): 11-20. Web. 30 Apr. 2011. http://www.jahonline.org/article/S1054-139X(07)00422-3/abstract
  • 27. AASL Standards AASL 1.1.1, 1.2.1, All of 1.3 Standards, All of 2.3 Standards, 3.1.6, 3.3.7, 4.1.7 All of 4.3 Standards

Notas do Editor

  1. “Colors fade, temples crumble, empires fall, but wise words endure.” -Edward Thorndikehttp://classiclit.about.com/od/basicsliteratureintro/a/aa_words.htm
  2. “Gossip is a type of verbal terrorism. To destroy somebody’s good name is to commit a kind of murder.” Rabbi Joseph Teluskin Author of Words That Hurt, Words That Heal
  3. The National Crime Prevention Council defines cyber-bullying as “the process of using the Internet, cell phones or other devices to send or post text or images intended to hurt or embarrass another person.” http://definitions.uslegal.com/c/cyber-bullying/I would click on the link to show the audience a fantastic definition of Cyber Bullying.http://stopcyberbullying.org/Google Images Cyberbullying‑is‑a‑rising‑issue‑that‑schools‑across‑the‑US‑are‑facing‑these‑dayshttp://seerpress.com/wp-content/uploads/2010/07/Cyberbullying-is-a-rising-issue-that-schools-across-the-US-are-facing-these-days..jpg
  4. Facts about cyber bullyingNearly 42% of children have been bullied online at least once1 in 4 have been bullied more than onceGirls are twice as likely to be bullied online and are twice as likely to bully someone elseApprox. 75% of middle school children have visited a site that bullies another student http://www.dosomething.org/tipsandtools/11-facts-about-cyber-bullying“This study [Cyberbullying Research Center] surveyed a random sample of 4441 youth between the ages of 10 and 18 from a large school district in the southern United States. Data were collected in February of 2010 from 37 different schools.” They found that the cell phone was the most popular piece of technology and that 83% used one at least once a week . . . Approximately 20% of the students in our sample report experiencing cyberbullying in their lifetimes. When asked about specific types of cyberbullying in the previous 30 days, mean or hurtful comments (13.7%) and rumors spread (12.9%) online continue to be among the most commonly-cited. Seventeen percent of the sample reported being cyberbullied in one or more of the nine types reported, two or more times over the course of the previous 30 days.”http://cyberbullying.us/research.phpGoogle Images cyberbullying‑pictures‑51.jpg http://lindaruppe.vhomesre.com/files/2010/11/cyberbullying-pictures-51.jpg
  5. Watch for changes in the child’s behaviorDoesn’t want to go to schoolFeelings of inadequacy or self-loathingMay manifest as physical problemsThese signs can occur in children being bullied or by the bullies themselves.Did you know that children who have been cyber bullied have a much higher rate of alcohol and drug use?http://kidshealth.org/parent/emotions/feelings/cyberbullying.htmlGoogle Images cyber‑bullying‑and‑parent http://bullyingpictures.com/wp-content/uploads/2010/11/cyber-bullying-and-parents.jpg
  6. Did you know that sometimes children who have been cyber bullied will become bullies and/or cyber bullies themselves? Go into detail about the different types of bullies they become.http://www.ncpc.org/cyberbullyinghttp://www.netbullies.com/pages/2/index.htmGoogle Imagescyber_bullying‑43870‑11.jpg
  7. There are many ways that children and adults cyber bully. Some children might text their friends and spread lies and rumors about someone. They might set up a Web site and invite their friends to vote for the ugliest person or the fattest person. They might send mean or demeaning messages constantly to the person they are bullying. If they have compromising pictures of the person, they might send it out over the internet to everyone they know. If they have someone’s password, they can mess up accounts, use their accounts for illegal activity—the ways a cyber bully can mess up a person’s life is almost endless.http://www.isafe.org/channels/sub.php?ch=op&sub_id=media_cyber_bullyingGoogle Images (Left to right) cyberbully2.jpghttp://captaincollo.blogspot.com/2009/07/cyber-bullying.htmlGoogle Images Cyber‑Bullying‑in‑School‑300x http://www.arabic2english.org/wp-content/uploads/2011/02/Cyber-Bullying-in-School-300x225.jpgGoogle Images miley‑sexting.jpg http://www.justhustlin.com/wp-content/uploads/2010/07/miley-sexting.jpg
  8. The most frequent forms of online and in-school bullying involved name-calling or insults, and the online incidents most typically took place through instant messaging. Repeated school-based bullying experiences increased the likelihood of repeated cyberbullying more than the use of any particular electronic communication tool, with about two-thirds of cyberbullying victims reported knowing their perpetrators, and half of them knowing the bully from school, the study says. School Library Journal Article: http://www.libraryjournal.com/slj/articlessurveys/859890-351/kids_hide_cyberbullying_incidents_from.html.cspGoogle Image bullying.jpghttp://1.bp.blogspot.com/_9hxqBQGGL5M/TNmMIIy3MQI/AAAAAAAAAB4/HjzojVkjc9A/s1600/bullying.jpg
  9. Sexting. I felt we needed a little levity here. But this is a serious issue.“A recent survey found that 20 percent of teens ages 13–19 had sent or posted nude or semi-nude images or videos of themselves, according to the National Campaign to Prevent Teen and Unplanned Pregnancy, a Washington, D.C.-based advocacy group.” SLJ Article about Sexting: http://www.schoollibraryjournal.com/article/CA6664187.htmlGoogle Images SEXTING.gif http://blogs.trb.com/news/opinion/chanlowe/blog/SEXTING.gif
  10. Victim’s react in a variety of ways. They might just ignore the problem and hope it goes away. Or they might try to get back at the one who is cyber bullying them, if they know who it is. Many start skipping school, stay away from their friends and not participate in any family or school activities. Most will experience a myriad of negative feelings both about themselves and about the world in general.http://www.ncpc.org/cyberbullyingGoogle ImagesCyber‑bullying.jpghttp://thediablodispatch.com/wp-content/uploads/2010/12/Cyber-bullying.jpg
  11. Some potential reasons why children cyber bully:Easy access to social networks—Itis so easy for children to join sites like MySpace, Facebook and Twitter. There are children under the age of 13 who have opened accounts and even some parents who have signed up their underage children.Anonymity—some children feel emboldened because they don’t have to use their own names and mistakenly assume they are safe because of it.Emotional Disconnect—misunderstandings can arise between people because of the lack of facial expressions, vocal nuances or gestures. Desire for popularity or power—being popular or having power over someone else can provide some of the same feelings as illegal substances.Friends encourage them to do it—again it’s the need to be liked or popularCan’t see the consequences—childrensometimes don’t realize that they are going too far. They may think of it as a joke.http://www.ncpc.org/cyberbullyingGoogle Images 3_CyberBullies_Image.jpg http://www.cc-peds.net/promises/archive/autumn_05/images/autumn3_CyberBullies_Images.jpg
  12. What Educators Can Tell Students:The first and best tip is to tell an adult! If it’s happening at school, tell your principle right away. If it happens at home, tell your parents. And keep on telling them until they really listen and respond.If you know a message is from a cyber bully, don’t open it and don’t delete it; the school or police might need it for evidence. Again, tell an adult.http://www.slais.ubc.ca/courses/libr500/04-05-wt2/www/D_Jackson/prevent.htmGoogle Images cyber‑bullying.jpg http://k9webprotection.net/wp-content/uploads/2011/01/cyber-bullying.jpg
  13. How Can Children Prevent Cyber Bullying? The best thing kids can do is not to participate in the cyber bullying and tell their friends not to either. They should let a parent, teacher or principle know what is happening. If possible, they should block any text messages or emails from the cyber bully. Kids have the power to change the internet environment in their school, home and community. It’s up to parents, schools and the local community to teach children good digital citizenship. We’ll be discussing digital citizenship more later in the presentation. http://www.slais.ubc.ca/courses/libr500/04-05-wt2/www/D_Jackson/prevent.htmGoogle Image stop_cyber_bullying_poster http://jsusmerano13.files.wordpress.com/2010/08/stop_cyber_bullying_poster_s2ht.jpg
  14. Tips to Protect Your Children Online:One of the best things a parent can do is put the computer or laptop in an open area like the family room or kitchen as opposed to letting the child keep it in their room. Parents need to encourage their children to talk about what they are doing on the internet—to talk about what Web sites the children are visiting; what games they are playing; what social networks the children are using. Parents need to set boundaries. Let the children know exactly what they can and can’t do or where they can or can’t go on the internet and then enforce the rules. Rules without discipline don’t work. Children need to learn that there are consequences to their actions. Make sure you and your children don’t have descriptive usernames and passwords—for instance, LoverBoy16 or SurferGirl15. These types of names attract pedophiles. And make sure your kids know not to ever give their passwords to anyone, not even their BFFs (Best Friends Forever). Parents need to really stress this. Don’t let them share any personal information like cell phone numbers or address unless you approve it.http://www.slais.ubc.ca/courses/libr500/04-05-wt2/www/D_Jackson/parents.htmGoogle Image tinameier2_narrowweb__http://www.cyberbullyalert.com/blog/tag/cyber-bullying/
  15. Information to Give to Parents: If you think your child might be the victim of cyber bullying—Talk to your child! Let them know that you want to help. Don’t accuse your child! Be a sympathetic listener. Let your child know that it isn’t their fault that this happened. Be proud that they spoke up and shared their experience with you. Write down details. Be proactive! Talk to the school or local police about the incident. Follow up with your child to make sure that the bullying has stopped. And most importantly, reassure your child that they are safe. Make sure your children know what to do to protect themselves on the internet.http://www.stopcyberbullying.org/prevention/parents_role.htmlGoogle Images t1larg‑cyber‑bullying‑gi2.jpghttp://www.newburyport-today.com/2011/04/11/cyberbullying/
  16. “As of June 2007, 35 states have enacted antibullying legislation that aims to protect the safety of 77% of U.S. students enrolled in public schools. However, only 16 of those states have enacted statutes that incorporate comprehensive basic public health antibullying principles.”  http://www.jahonline.org/article/S1054-139X(07)00422-3/abstractIn Missouri, Governor Blunt signed a bill in 2008, changing the wording in an anti-bullying law that had previously stated that verbal harassment had to be a written note or made by phone. It now includes any type of technology. http://www.ibls.com/internet_law_news_portal_view.aspx?id=2095&s=latestnewsGoogle Images New‑Years‑Law.png http://morichesdaily.com/wp-content/uploads/2010/12/New-Years-Law.png
  17. Every school should make sure all staff and students knows what cyber bullying is and then establish some expectations (ground rules) and put them in writing. You might consider having the students actively participate in establishing the expectations. Teach the students all about cyber bullying. You could do a program during several character development classes. Lead them in discussions. Encourage them to take a stand against any kind of bullying. And get the parents involved. Create anti-bullying events and activities for students and parents. Respond immediately and appropriately to any bullying incidents. And most importantly, don’t give up if you don’t immediately see a change. http://www.stopbullying.gov/topics/cyberbullying/schools/Google Images fullsize_11.jpgwww.stopbullyingnow.hrsa.govGoogle Images fullsize_11.jpg http://assets0.ordienetworks.com/tmbs/1500242455/full-size_11.jpg
  18. It’s called Digital Citizenship. Instead of constantly trying to block our children from Internet sites or constantly trying to control everything they do on the Internet and over their cell phones, how about teaching them how to use technology correctly and ethically? Many countries believe that children should have freedom of expression with limits. Read Article 13 of the United Nations Convention on the Rights of the Child. http://www.safekids.com/2010/09/27/digital-citizenship-includes-rights-as-well-as-responsibilities/That doesn’t mean that parents and educators shouldn’t protect children, but teach them about the risks and help them deal with them. The British government’s Office for Standards in Education, Children’s Services and Skills (Ofsted) put out a report. It asked schools to ‘help pupils understand how to manage risk; to provide them with richer learning experiences; and to bridge the gap between systems at school and the more open systems outside school.” http://www.ofsted.gov.uk/Ofsted-home/Publications-and-research/Browse-all-by/Documents-by-type/Thematic-reports/The-safe-use-of-new-technologies“The focus should be on how the technology is used rather than the technology itself.” (A)Way Magazine, January 2010 - Raising a Digital Child, http://www.digitalcitizenship.org/ Google Images change.jpg http://edtechvision.org/wp-content/uploads/2008/12/change.jpg
  19. From the moment a child picks up a piece of technology, we as parents and educators need to teach them how to use it properly and ethically. And then we need to set the example. That means teaching them to respect copyright and fair use laws. That means we make sure they are crediting photographs used. That means not downloading music and movies illegally. As educators, we can’t demand that a student do everything ethically if we won’t.(A)Way Magazine, January 2010 - Raising a Digital Child, http://www.digitalcitizenship.org/Google Images digital_citizenship.png http://internetsavvy.wikispaces.com/file/view/digital_citizenship.png
  20. Our Goal as Educators and Parents: To help become ethical digital citizens, and to make sure they are aware of any possible issues related to the use of technology. We need to teach students the responsible use of all technology. We need to reinforce the lessons by showing and discussing inappropriate and appropriate use of technology. Teach students to cite things properly. Parents and teachers must be role models for students. When children see parents and teachers misusing any technology, they will think it is okay to do so.http://www.digitalcitizenship.net/uploads/1stLL.pdfGoogle Imagesdigital+citizen.jpghttp://2.bp.blogspot.com/_QTlkFb5Grc4/Sm8sFlSuDDI/AAAAAAAAAIM/qJ_H3ICzWWg/s1600-h/digital+citizen.jpg
  21. Sorry. I didn’t know how to do the first citation.
  22. * When I left it on the same line as the Web site, it changes to yellow and won’t change back. Sorry.