SlideShare a Scribd company logo
1 of 16
Cyberbullying
Brindetta Cook
CSIS 200
April 29, 2013
Source: http://thinkprogress.org/wp-content/uploads/2012/06/Cyberbullying.jpg
What is “Cyberbullying”?
“Cyberbullying is bullying that takes place using
electronic technology. “
Statistics
The Harford County Examiner reported similarly concerning cyber bullying 
statistics:
• Around half of teens have been the victims of cyber bullying
• Only 1 in 10 teens tells a parent if they have been a cyber bully victim
• Fewer than 1 in 5 cyber bullying incidents are reported to law
enforcement
• 1 in 10 adolescents or teens have had embarrassing or damaging
pictures taken of themselves without their permission, often using cell
phone cameras
• About 1 in 5 teens have posted or sent sexually suggestive or nude
pictures of themselves to others
Causes
• revenge of other peers
• for entertainment purposes
• to boost their ego
• to get a laugh from their peers
• help bolster or remind people of their
own social standing
Effects
•Undermining your confidence, self-esteem and sense of
security
•Affecting your performance and attendance at school
•Causing stress and affecting your health
•Affecting your professional reputation and career
•Fueling prejudice in areas such as race, religion and
sexuality
•Leading to suicidal thoughts
Who is affected?
• Ages 15-17
• Females are about twice as likely as
males to be victims and perpetrators of
cyber bullying.
• Males are more likely to be threatened
by cyber bullies than females
• Affects all races
Tyler Clementi
Jessica Logan
Technology’s Role
• Over 80% of teens use a cell phone regularly, making it the
most common medium for cyber bullying
• Cyberbullying can happen 24 hours a day, 7 days a week
• Cyberbullying messages and images can be posted
anonymously and distributed quickly to a very wide
audience.
• Deleting inappropriate or harassing messages, texts, and
pictures is extremely difficult after they have been posted or
sent.
How you can help!
• Don’t engage in or support mean material,
gossip, or rumors posted online, or talk about
it
• Support the victim being targeted online by
posting positive messages!
• Print the evidence to share with an authority
Remember!
• we are not invisible online, and
anything we post can be traced back to
us. Monitor your online reputation
YOU have the power
• If cyberbullying becomes severe and involves
threats of violence, you should contact the
police immediately. Some states have
computer harassment laws to prosecute
offenders.
Governor Cuomo Signs Legislation to
Help Protect Students from
Cyberbullying
• Requires Schools to Act When Cyberbullying Occurs
• Ensures Proper Protocols Are in Place to Deal with
Cyberbullying
• Sets Training Requirements For School Employees to Help
Identify and Prevent Cyberbullying
Have you ever been a victim of cyberbullying?
• A.)YES
• B.) NO
Source:
http://samuelflinn.files.wordpress.com/2012/05/cyber-
bullying-poster.jpg
Resources
Anti Bullying Campaigns and Programs:
• The Great American NO BULL Challenge
• Internet Safety 101
• Olweus Bullying Prevention Program
• Stomp Out Bullying
• Delete Digital Drama
• Cyberbully411
• STOP Cyberbullying
Sources
" What are the effects of cyberbullying? | Cyberbullying | Teacher advice | Teachtoday."
Teachtoday. N.p., n.d. Web. 28 Apr. 2013. <http://www.teachtoday.eu/en/Teacher-
advice/Cyberbullying/What-are-the-effects-of-cyberbullying.aspx>.
"Cyber Bullying Statistics - Bullying Statistics." Bullying Statistics ­ Teen Violence, Anger, 
Bullying, Treatment Options. N.p., n.d. Web. 29 Apr. 2013.
<http://www.bullyingstatistics.org/content/cyber-bullying-statistics.html>.
"Cyberbullying Effects | End Of Bullying." EndofBullying.com. N.p., n.d. Web. 29 Apr. 2013.
<http://endofbullying.com/cyberbullying-effects/>.
Sources cont’d.
"Governor Cuomo Signs Legislation to Help Protect Students from Cyberbullying |
Governor Andrew M. Cuomo." Governor Andrew M. Cuomo. N.p., n.d. Web.
29 Apr. 2013. <http://www.governor.ny.gov/press/07092012cyberbullying>.
"InternetSafety101.org: Statistics." InternetSafety101.org: Home. N.p., n.d. Web.
29 Apr. 2013.
<http://www.internetsafety101.org/cyberbullyingstatistics.htm#_ftnref>.
"What is Cyberbullying | StopBullying.gov." Home | StopBullying.gov. N.p., n.d.
Web. 27 Apr. 2013. <http://www.stopbullying.gov/cyberbullying/what-is-
it/index.html>.
"my Secure Cyberspace:." Cyberbullying. N.p., n.d. Web. 28 Apr. 2013.
<www.mysecurecyberspace.com/encyclopedia/index/cyberbullying.html>.

More Related Content

What's hot

Gang Violence
Gang ViolenceGang Violence
Gang Violencecryaneghs
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingringw1sl
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.jessy0121
 
Bullying In Schools Educ 350
Bullying In Schools Educ 350Bullying In Schools Educ 350
Bullying In Schools Educ 350crowl006
 
bullying and the effects it has on students
bullying and the effects it has on studentsbullying and the effects it has on students
bullying and the effects it has on studentschris18
 
Zoophilia in Frontotemporal Dementia
Zoophilia in Frontotemporal DementiaZoophilia in Frontotemporal Dementia
Zoophilia in Frontotemporal DementiaZahiruddin Othman
 
Anti-bullying presentation #2
Anti-bullying presentation #2Anti-bullying presentation #2
Anti-bullying presentation #2itunaschool
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*Amber Dee
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingpscl
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying griehl
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateMarian Merritt
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying CarlosE15
 

What's hot (20)

Gang Violence
Gang ViolenceGang Violence
Gang Violence
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
Bullying In Schools Educ 350
Bullying In Schools Educ 350Bullying In Schools Educ 350
Bullying In Schools Educ 350
 
bullying and the effects it has on students
bullying and the effects it has on studentsbullying and the effects it has on students
bullying and the effects it has on students
 
Zoophilia in Frontotemporal Dementia
Zoophilia in Frontotemporal DementiaZoophilia in Frontotemporal Dementia
Zoophilia in Frontotemporal Dementia
 
Anti-bullying presentation #2
Anti-bullying presentation #2Anti-bullying presentation #2
Anti-bullying presentation #2
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
 
El ciberacoso
El ciberacosoEl ciberacoso
El ciberacoso
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
 
El ciberbullying!!
El ciberbullying!!El ciberbullying!!
El ciberbullying!!
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Bullying
BullyingBullying
Bullying
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 

Similar to Csis200 cyberbullying

Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jfJohn Field
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big ProblemGail Rebuck
 
Stop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measuresStop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measureskanika sharma
 
Cabatian & Estrada 1
Cabatian & Estrada 1Cabatian & Estrada 1
Cabatian & Estrada 1Samphiriane
 
Cyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItCyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItFeliciaDixon5
 
Cyber-bullying
Cyber-bullyingCyber-bullying
Cyber-bullyinganwidener
 
Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By AnamikaGisha Mathyari
 
Social and Ethical Issues in the Digital Era Presentation
Social and Ethical Issues in the Digital Era Presentation Social and Ethical Issues in the Digital Era Presentation
Social and Ethical Issues in the Digital Era Presentation courtneyjohnson105
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullyingZiar Khan
 
MultiMedia Presentation
MultiMedia PresentationMultiMedia Presentation
MultiMedia PresentationAshlynnH
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullyingsepulvedamd
 

Similar to Csis200 cyberbullying (20)

Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jf
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big Problem
 
Bully
BullyBully
Bully
 
Stop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measuresStop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measures
 
Cabatian & Estrada 1
Cabatian & Estrada 1Cabatian & Estrada 1
Cabatian & Estrada 1
 
Symposium On Anti-Bullying In Schools
Symposium On Anti-Bullying In SchoolsSymposium On Anti-Bullying In Schools
Symposium On Anti-Bullying In Schools
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItCyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent It
 
Cyber-bullying
Cyber-bullyingCyber-bullying
Cyber-bullying
 
Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By Anamika
 
Social and Ethical Issues in the Digital Era Presentation
Social and Ethical Issues in the Digital Era Presentation Social and Ethical Issues in the Digital Era Presentation
Social and Ethical Issues in the Digital Era Presentation
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
MultiMedia Presentation
MultiMedia PresentationMultiMedia Presentation
MultiMedia Presentation
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Recently uploaded

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Recently uploaded (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Csis200 cyberbullying

  • 2. What is “Cyberbullying”? “Cyberbullying is bullying that takes place using electronic technology. “
  • 3. Statistics The Harford County Examiner reported similarly concerning cyber bullying  statistics: • Around half of teens have been the victims of cyber bullying • Only 1 in 10 teens tells a parent if they have been a cyber bully victim • Fewer than 1 in 5 cyber bullying incidents are reported to law enforcement • 1 in 10 adolescents or teens have had embarrassing or damaging pictures taken of themselves without their permission, often using cell phone cameras • About 1 in 5 teens have posted or sent sexually suggestive or nude pictures of themselves to others
  • 4. Causes • revenge of other peers • for entertainment purposes • to boost their ego • to get a laugh from their peers • help bolster or remind people of their own social standing
  • 5. Effects •Undermining your confidence, self-esteem and sense of security •Affecting your performance and attendance at school •Causing stress and affecting your health •Affecting your professional reputation and career •Fueling prejudice in areas such as race, religion and sexuality •Leading to suicidal thoughts
  • 6. Who is affected? • Ages 15-17 • Females are about twice as likely as males to be victims and perpetrators of cyber bullying. • Males are more likely to be threatened by cyber bullies than females • Affects all races
  • 8. Technology’s Role • Over 80% of teens use a cell phone regularly, making it the most common medium for cyber bullying • Cyberbullying can happen 24 hours a day, 7 days a week • Cyberbullying messages and images can be posted anonymously and distributed quickly to a very wide audience. • Deleting inappropriate or harassing messages, texts, and pictures is extremely difficult after they have been posted or sent.
  • 9. How you can help! • Don’t engage in or support mean material, gossip, or rumors posted online, or talk about it • Support the victim being targeted online by posting positive messages! • Print the evidence to share with an authority
  • 10. Remember! • we are not invisible online, and anything we post can be traced back to us. Monitor your online reputation
  • 11. YOU have the power • If cyberbullying becomes severe and involves threats of violence, you should contact the police immediately. Some states have computer harassment laws to prosecute offenders.
  • 12. Governor Cuomo Signs Legislation to Help Protect Students from Cyberbullying • Requires Schools to Act When Cyberbullying Occurs • Ensures Proper Protocols Are in Place to Deal with Cyberbullying • Sets Training Requirements For School Employees to Help Identify and Prevent Cyberbullying
  • 13. Have you ever been a victim of cyberbullying? • A.)YES • B.) NO Source: http://samuelflinn.files.wordpress.com/2012/05/cyber- bullying-poster.jpg
  • 14. Resources Anti Bullying Campaigns and Programs: • The Great American NO BULL Challenge • Internet Safety 101 • Olweus Bullying Prevention Program • Stomp Out Bullying • Delete Digital Drama • Cyberbully411 • STOP Cyberbullying
  • 15. Sources " What are the effects of cyberbullying? | Cyberbullying | Teacher advice | Teachtoday." Teachtoday. N.p., n.d. Web. 28 Apr. 2013. <http://www.teachtoday.eu/en/Teacher- advice/Cyberbullying/What-are-the-effects-of-cyberbullying.aspx>. "Cyber Bullying Statistics - Bullying Statistics." Bullying Statistics ­ Teen Violence, Anger,  Bullying, Treatment Options. N.p., n.d. Web. 29 Apr. 2013. <http://www.bullyingstatistics.org/content/cyber-bullying-statistics.html>. "Cyberbullying Effects | End Of Bullying." EndofBullying.com. N.p., n.d. Web. 29 Apr. 2013. <http://endofbullying.com/cyberbullying-effects/>.
  • 16. Sources cont’d. "Governor Cuomo Signs Legislation to Help Protect Students from Cyberbullying | Governor Andrew M. Cuomo." Governor Andrew M. Cuomo. N.p., n.d. Web. 29 Apr. 2013. <http://www.governor.ny.gov/press/07092012cyberbullying>. "InternetSafety101.org: Statistics." InternetSafety101.org: Home. N.p., n.d. Web. 29 Apr. 2013. <http://www.internetsafety101.org/cyberbullyingstatistics.htm#_ftnref>. "What is Cyberbullying | StopBullying.gov." Home | StopBullying.gov. N.p., n.d. Web. 27 Apr. 2013. <http://www.stopbullying.gov/cyberbullying/what-is- it/index.html>. "my Secure Cyberspace:." Cyberbullying. N.p., n.d. Web. 28 Apr. 2013. <www.mysecurecyberspace.com/encyclopedia/index/cyberbullying.html>.

Editor's Notes

  1. http://www.stopbullying.gov/cyberbullying/what-is-it/index.html Examples of cyberbullying include: mean text messages or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles. Being a victim of cyberbullying can be a common and painful experience. Some youth who cyberbully: Pretend they are other people online to trick others Spread lies and rumors about victims Trick people into revealing personal information Send or forward private text messages, pictures, etc. Post pictures of victims without their consent Sending mean messages or threats to a person&apos;s email account or cell phone Spreading rumors online or through texts Posting hurtful or threatening messages on social networking sites or web pages Stealing a person&apos;s account information to break into their account and send damaging messages Pretending to be someone else online to hurt another person Taking unflattering pictures of a person and spreading them through cell phones or the Internet Sexting, or circulating sexually suggestive pictures or messages about a person
  2. Cyber world has become the new way to communicate in today&apos;s society People (students) in particular don’t think they can get caught Can lead to other devastating tragedies (school shootings, suicide, and other harm) http://www.bullyingstatistics.org/content/cyber-bullying-statistics.html
  3. The teen years can be cruel. Nearly everyone has been a part of some form of bullying during his or her lifetime, be it on the giving or receiving end. In general, cyber bullies have their own motives on why they are involved in cyber bullying. Some of their intentions have been identified as power, attention, retaliation, boredom, jealousy, and the pleasure of inflicting pain.
  4. Can have a lasting impression on you for the rest of your life
  5. Cyberbullying has become a prevalent problem globally Homosexual and bisexual teens are more likely to report bullying than heterosexual teens Students with disabilities are more likely to be the victims of bullying Females are more often the victims of bullying than males
  6. Tyler Clementi: jumped to his death from the George Washington Bridge. This occurred after a sexual encounter he had with a man in his dorm room was allegedly video streamed over the internet without Clementi&apos;s knowledge Jessica Logan: committed suicide after sexting a nude photo of herself to her boyfriend. When they broke up, he sent the photo to everyone else at her school. Jessica was cruelly harassed for months by the other girls at her school, Jessica Logan decided to tell her story on a Cincinnati television station. Her purpose was simple: “I just want to make sure no one else will have to go through this again.” The interview was in May 2008. Two months later, on July 3, 2008, Jessie attended the funeral of a boy who committed suicide, then came home and killed herself.
  7. The psychological and emotional outcomes of cyber bullying are similar to those of real-life bullying. The difference is, real-life bullying often ends when school ends. For cyber bullying, there is no escape. And, it’s getting worse. http://www.dosomething.org/tipsandtools/11-facts-about-cyber-bullying
  8. You may be able to sue a cyberbully or the bully&apos;s parents for damages if you can prove defamation, invasion of privacy, or intentional infliction of emotional distress. Damages can include money spent on counseling, limited college opportunities due to failing grades, etc.
  9. The new law goes into effect on July 1, 2013. The new law cracks down on cyberbullying through the following provisions: “ The new law is designed to strengthen a school&apos;s response to harassment and bullying through improved reporting, investigation, intervention, training and prevention. The new law requires schools to take action when students experience cyberbullying or other forms of harassment. It ensures that school districts take immediate steps to end harmful behavior, prevent recurrences, and ensure the safety of the targeted students. The legislation also establishes improved training to help teachers and administrators better prevent and respond to bullying and other harmful acts.” http://www.governor.ny.gov/press/07092012cyberbullying