Ppt cyberbullying

675 views
613 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
675
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
10
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Ppt cyberbullying

  1. 1. I N T C 3 6 1 0N O V E M B E R 2 6 , 2 0 1 2Cyberbullying
  2. 2. Cyberbullying Flash video
  3. 3.  "Cyberbullying" is when a child, preteen or teen istormented, threatened, harassed, humiliated,embarrassed or otherwise targeted by anotherchild, preteen or teen using the Internet,interactive and digital technologies or mobilephones.What is Cyberbullying
  4. 4. How Cyberbulling Works Direct attacks (messages sent to your kids directly)and By proxy (using others to help cyberbully the victim,either with or without the accomplices knowledge).
  5. 5. TEXT Messaging Harassment Hateful or threatening messages to other kids Warning wars A screen name that is very similar to another kidsname Text attacks-kids gang up –high volume of text =higher cell phone charges Death threats – text, photos, videos
  6. 6. Stealing passwords A kid may steal another childs password and begin tochat with other people, pretending to be the other kid. A kid may also use another kids password to changehis/her profile to include sexual, racist, andinappropriate things that may attract unwanted attentionor offend people. A kid often steals the password and locks the victim outof their own account. Once the password is stolen, hackers may use it to hackinto the victims computer.
  7. 7. Blogs Blogs are online journals. Kids sometimes use these blogsto damage other kids reputations or invade their privacy. For example, in one case, a boy posted a bunch of blogsabout his breakup with his ex-girlfriend, explaining howshe destroyed his life, calling her degrading names. Theirmutual friends read about this and criticized her. Shewas embarrassed and hurt, all because another kidposted mean, private, and false information about her. Sometimes kids set up a blog or profile page pretendingto be their victim and saying things designed to humiliatethem.
  8. 8. Sending Pictures through E-mail and CellPhones There have been cases of teens sendingmass e-mails to other users, thatinclude nude or degrading pictures ofother teens. Once an e-mail like this issent, it is passed around to hundredsof other people within hours; there isno way of controlling where it goes. The kids receive the pictures directlyon their phones, and may send it toeveryone in their address books or postin online photos websites. Kids often take a picture of someone ina locker room, bathroom or dressingroom and post it online or send it toothers on cell phones.
  9. 9.  Whos Hot? Whos Not? Whois the biggest slut in the sixthgrade? These types ofquestions run rampant on theInternet polls, all created byyours truly - kids and teens.Such questions are often veryoffensive to others and are yetanother way that kids can"bully" other kids online.Internet Polling
  10. 10. Interactive Gaming Gaming allows chat and other interactivity Kids verbally abuse the other kids, using threats and lewdlanguage. Lock them out of games, passing false rumors about them orhacking into their accounts.
  11. 11. Sending Malicious Code SEND…. viruses, spyware and hacking programs to their victims. They do this to either destroy their computers or spyon their victim. Trojan Horse programs allow the cyberbully tocontrol their victims computer remote control, andcan be used to erase the hard drive of the victim.
  12. 12. Sending Porn and Other Junk E-Mail Sign their victims up for e-mailing and IM marketinglists, lots of them, especially to porn sites. Parents usually get involved, either blaming them(assuming they have been visiting porn sites) ormaking them change their e-mail.
  13. 13. Impersonation Post provocative messages in a hate groups chatroom posingas the victim, inviting an attack against the victim, often giving the name, address and telephone number of thevictim to make the hate groups job easier. S Send a message to someone posing as the victim, sayinghateful or threatening things while masquerading as thevictim. They may also alter a message really from the victim,making it appear that they have said nasty things or sharedsecrets with others.
  14. 14. Why Cyberbully? Anger, revenge or frustration. For Entertainment Out of Boredom To intentionally torment
  15. 15. Help Stop Cyberbullying Educate students – cyberbullying is hurtful to thevictim. Don’t be a part of it. Encourage students not to respond if it happens tothem. Be aware of anonymous methods of reportingcyberbullying…to administration or police.
  16. 16. NJ and the law In 2002, New Jersey adopted its first anti-bullyinglegislation. In January 2011 that law was strengthened. The appointment of specific people in each school and district to runantibullying programs the investigation of any episodes starting within a day after theyoccur Public school employees are required to take training courses on howto pick up on cyberbullying, while forcing all districts to create"school safety teams" to consider complaints of bullying. School bullies to face suspension or expulsion, and requires schoolsuperintendents to report all bullying incidents to the New JerseyBoard of Education Schools and districts will receive grades on how well they handle anddefuse such incidents.

×