Cyber-bullying: Is Your Career at Risk?
Upcoming SlideShare
Loading in...5
×
 

Cyber-bullying: Is Your Career at Risk?

on

  • 1,586 views

Cyber-bullies can attack anyone at any time using online social sites. Find out what the risks are and some simple ways you can protect yourself.

Cyber-bullies can attack anyone at any time using online social sites. Find out what the risks are and some simple ways you can protect yourself.

Statistics

Views

Total Views
1,586
Slideshare-icon Views on SlideShare
1,577
Embed Views
9

Actions

Likes
0
Downloads
10
Comments
0

2 Embeds 9

http://www.slideshare.net 7
http://1441096025.nvmodules.netvibes.com 2

Accessibility

Upload Details

Uploaded via as Apple Keynote

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Using technology to harass, or bully someone else <br /> --> email, instant message, web pages, digital photos <br /> <br /> Why cyber-bully? <br /> --> anonimity of the Internet <br /> --> lack of personal contact/risk <br /> --> causes more damage because of speed and reach of Internet <br /> --> amount of personal information found online <br /> --> bullies may arbitrarily choose victims <br /> --> &#x201C;cyber&#x201D; may not be the limit, may just be a testing ground that leads to violence <br /> <br /> Protect yourself <br /> --> Use caution <br /> --> where do you post, what do you post and who has access? <br /> --> limiting access to your info may make identifying bully easier <br /> <br /> --> Consider ignoring the situation <br /> --> Responding with hostility may escalate the situation <br /> --> A bully may become energized by the attention <br /> --> Change your accounts <br /> -->if bully follows, may build stronger case for legal action <br /> <br /> --> Document <br /> --> what/how -- emails, web pages, IMs, etc. <br /> --> dates and times <br /> --> archive electronic version <br /> --> consider archiving printed version <br /> <br /> --> Report <br /> --> Law enforcement agencies have different policies <br /> --> Law enforcement officials can decide if it&#x2019;s free speech or breaking law <br /> --> in addition, report to Sierra College Police Dept. <br /> --> bullied while on campus <br /> --> bullied while at home in connection with your relationship w/SC
  • Using technology to harass, or bully someone else <br /> --> email, instant message, web pages, digital photos <br /> <br /> Why cyber-bully? <br /> --> anonimity of the Internet <br /> --> lack of personal contact/risk <br /> --> causes more damage because of speed and reach of Internet <br /> --> amount of personal information found online <br /> --> bullies may arbitrarily choose victims <br /> --> &#x201C;cyber&#x201D; may not be the limit, may just be a testing ground that leads to violence <br /> <br /> Protect yourself <br /> --> Use caution <br /> --> where do you post, what do you post and who has access? <br /> --> limiting access to your info may make identifying bully easier <br /> <br /> --> Consider ignoring the situation <br /> --> Responding with hostility may escalate the situation <br /> --> A bully may become energized by the attention <br /> --> Change your accounts <br /> -->if bully follows, may build stronger case for legal action <br /> <br /> --> Document <br /> --> what/how -- emails, web pages, IMs, etc. <br /> --> dates and times <br /> --> archive electronic version <br /> --> consider archiving printed version <br /> <br /> --> Report <br /> --> Law enforcement agencies have different policies <br /> --> Law enforcement officials can decide if it&#x2019;s free speech or breaking law <br /> --> in addition, report to Sierra College Police Dept. <br /> --> bullied while on campus <br /> --> bullied while at home in connection with your relationship w/SC
  • Using technology to harass, or bully someone else <br /> --> email, instant message, web pages, digital photos <br /> <br /> Why cyber-bully? <br /> --> anonimity of the Internet <br /> --> lack of personal contact/risk <br /> --> causes more damage because of speed and reach of Internet <br /> --> amount of personal information found online <br /> --> bullies may arbitrarily choose victims <br /> --> &#x201C;cyber&#x201D; may not be the limit, may just be a testing ground that leads to violence <br /> <br /> Protect yourself <br /> --> Use caution <br /> --> where do you post, what do you post and who has access? <br /> --> limiting access to your info may make identifying bully easier <br /> <br /> --> Consider ignoring the situation <br /> --> Responding with hostility may escalate the situation <br /> --> A bully may become energized by the attention <br /> --> Change your accounts <br /> -->if bully follows, may build stronger case for legal action <br /> <br /> --> Document <br /> --> what/how -- emails, web pages, IMs, etc. <br /> --> dates and times <br /> --> archive electronic version <br /> --> consider archiving printed version <br /> <br /> --> Report <br /> --> Law enforcement agencies have different policies <br /> --> Law enforcement officials can decide if it&#x2019;s free speech or breaking law <br /> --> in addition, report to Sierra College Police Dept. <br /> --> bullied while on campus <br /> --> bullied while at home in connection with your relationship w/SC
  • Using technology to harass, or bully someone else <br /> --> email, instant message, web pages, digital photos <br /> <br /> Why cyber-bully? <br /> --> anonimity of the Internet <br /> --> lack of personal contact/risk <br /> --> causes more damage because of speed and reach of Internet <br /> --> amount of personal information found online <br /> --> bullies may arbitrarily choose victims <br /> --> &#x201C;cyber&#x201D; may not be the limit, may just be a testing ground that leads to violence <br /> <br /> Protect yourself <br /> --> Use caution <br /> --> where do you post, what do you post and who has access? <br /> --> limiting access to your info may make identifying bully easier <br /> <br /> --> Consider ignoring the situation <br /> --> Responding with hostility may escalate the situation <br /> --> A bully may become energized by the attention <br /> --> Change your accounts <br /> -->if bully follows, may build stronger case for legal action <br /> <br /> --> Document <br /> --> what/how -- emails, web pages, IMs, etc. <br /> --> dates and times <br /> --> archive electronic version <br /> --> consider archiving printed version <br /> <br /> --> Report <br /> --> Law enforcement agencies have different policies <br /> --> Law enforcement officials can decide if it&#x2019;s free speech or breaking law <br /> --> in addition, report to Sierra College Police Dept. <br /> --> bullied while on campus <br /> --> bullied while at home in connection with your relationship w/SC
  • Using technology to harass, or bully someone else <br /> --> email, instant message, web pages, digital photos <br /> <br /> Why cyber-bully? <br /> --> anonimity of the Internet <br /> --> lack of personal contact/risk <br /> --> causes more damage because of speed and reach of Internet <br /> --> amount of personal information found online <br /> --> bullies may arbitrarily choose victims <br /> --> &#x201C;cyber&#x201D; may not be the limit, may just be a testing ground that leads to violence <br /> <br /> Protect yourself <br /> --> Use caution <br /> --> where do you post, what do you post and who has access? <br /> --> limiting access to your info may make identifying bully easier <br /> <br /> --> Consider ignoring the situation <br /> --> Responding with hostility may escalate the situation <br /> --> A bully may become energized by the attention <br /> --> Change your accounts <br /> -->if bully follows, may build stronger case for legal action <br /> <br /> --> Document <br /> --> what/how -- emails, web pages, IMs, etc. <br /> --> dates and times <br /> --> archive electronic version <br /> --> consider archiving printed version <br /> <br /> --> Report <br /> --> Law enforcement agencies have different policies <br /> --> Law enforcement officials can decide if it&#x2019;s free speech or breaking law <br /> --> in addition, report to Sierra College Police Dept. <br /> --> bullied while on campus <br /> --> bullied while at home in connection with your relationship w/SC
  • Using technology to harass, or bully someone else <br /> --> email, instant message, web pages, digital photos <br /> <br /> Why cyber-bully? <br /> --> anonimity of the Internet <br /> --> lack of personal contact/risk <br /> --> causes more damage because of speed and reach of Internet <br /> --> amount of personal information found online <br /> --> bullies may arbitrarily choose victims <br /> --> &#x201C;cyber&#x201D; may not be the limit, may just be a testing ground that leads to violence <br /> <br /> Protect yourself <br /> --> Use caution <br /> --> where do you post, what do you post and who has access? <br /> --> limiting access to your info may make identifying bully easier <br /> <br /> --> Consider ignoring the situation <br /> --> Responding with hostility may escalate the situation <br /> --> A bully may become energized by the attention <br /> --> Change your accounts <br /> -->if bully follows, may build stronger case for legal action <br /> <br /> --> Document <br /> --> what/how -- emails, web pages, IMs, etc. <br /> --> dates and times <br /> --> archive electronic version <br /> --> consider archiving printed version <br /> <br /> --> Report <br /> --> Law enforcement agencies have different policies <br /> --> Law enforcement officials can decide if it&#x2019;s free speech or breaking law <br /> --> in addition, report to Sierra College Police Dept. <br /> --> bullied while on campus <br /> --> bullied while at home in connection with your relationship w/SC
  • Using technology to harass, or bully someone else <br /> --> email, instant message, web pages, digital photos <br /> <br /> Why cyber-bully? <br /> --> anonimity of the Internet <br /> --> lack of personal contact/risk <br /> --> causes more damage because of speed and reach of Internet <br /> --> amount of personal information found online <br /> --> bullies may arbitrarily choose victims <br /> --> &#x201C;cyber&#x201D; may not be the limit, may just be a testing ground that leads to violence <br /> <br /> Protect yourself <br /> --> Use caution <br /> --> where do you post, what do you post and who has access? <br /> --> limiting access to your info may make identifying bully easier <br /> <br /> --> Consider ignoring the situation <br /> --> Responding with hostility may escalate the situation <br /> --> A bully may become energized by the attention <br /> --> Change your accounts <br /> -->if bully follows, may build stronger case for legal action <br /> <br /> --> Document <br /> --> what/how -- emails, web pages, IMs, etc. <br /> --> dates and times <br /> --> archive electronic version <br /> --> consider archiving printed version <br /> <br /> --> Report <br /> --> Law enforcement agencies have different policies <br /> --> Law enforcement officials can decide if it&#x2019;s free speech or breaking law <br /> --> in addition, report to Sierra College Police Dept. <br /> --> bullied while on campus <br /> --> bullied while at home in connection with your relationship w/SC
  • Cyber = ... <br /> <br /> Bully = the act of intentionally causing harm to others, through verbal harassment, physical assault, or other more subtle methods of coercion such as manipulation <br /> <br /> --> harass = more difficult because law (if any) varies by jurisdiction <br /> <br /> --> psychological harassment = humiliating or abusive behavior that lowers a person&apos;s self-esteem or causes them torment... verbal comments, actions, gestures <br /> <br /> --> stalking = the unauthorized following and surveillance of an individual, to the extent that the person&apos;s privacy is unacceptably intruded upon, and the victim fears for his/her safety. <br /> <br /> Libel = a published false statement that is damaging to a person&apos;s reputation <br /> <br /> Slander = the action or crime of making a false spoken statement damaging to a person&apos;s reputation <br /> <br /> ID theft - ID not actually stolen, simply used -- stolen data is used to obtain goods and services <br /> <br /> related to ID fraud -- someone poses as someone to commit fraud or to obtain goods and services
  • Using your ID on a social media site: each service has its own &#x201C;Terms of Service&#x201D; <br /> You have to contact them when you discover someone using your &#x201C;brand&#x201D; <br /> <br /> I found my name using a search engine with a link to a video sharing site that I used. In the search engine paragraph was my name and &#x201C;Great fucking video,&#x201D; a comment which I did not make and did not want appearing next to my name as though I had.
  • TMI = stalking. Keep in mind that the more unusual your name, the easier it is to track you. <br /> <br /> Privacy settings <br /> Do you understand them, do you use them, do they do what you expect? <br /> If it&#x2019;s on the web, you canNOT expect privacy. Too easy to share! <br /> <br /> Post <br /> Who else is on your network? If you&#x2019;ve friended your boss, think about what you say about your job. <br /> ReadWriteWeb article by Lidija Davis, &#x201C;Say something in passing on a social site and it may come back to haunt you.&#x201D; <br /> ex: <br /> James Andrews tweeted: &#x201C;True confession but I&#x2019;m in one of those towns where I scratch my head and say &#x201C;I would die if I had to live here!&#x201D; Turns out he was in Memphis to visit his client, FedEx, and some FedEx employees were deeply offended and sent an email to Mr. Andrews home office: {see print-out} <br /> <br /> To &#x201C;hoekstra&#x201D; <br /> <br /> Internet Archive -- Way Back Machine <br /> <br /> Are the lives of teachers public or private? <br /> A tv station in Arizona ran a November sweeps piece on what they found on Arizona teachers&#x2019; social network pages.
  • Not going online doesn&#x2019;t protect you. Sorry. <br /> <br /> Have you &#x201C;Googled&#x201D; yourself lately? Have you Googled your home phone number? <br /> (Seth Godin&#x2019;s Blog) <br /> The first thing to do this year <br /> Google yourself. <br /> If you&apos;re a salesperson, your prospects already do. If you&apos;re looking for a job, your prospective employers already do. If you&apos;ve got a job, your co-workers already do. <br /> What do they see? Do you know? <br /> If you don&apos;t like it, you can fix it. Start a blog, even if it&apos;s just a few pages worth. <br /> <br /> http://usernamecheck.com/ <br /> <br /> http://namechk.com/ <br /> <br /> http://knowem.com/
  • http://www.cla.ca/casl/slic/254cyberbullying.html
  • Tell students that cyber-bullying is not okay and to follow the recommendations in the safety memo.

Cyber-bullying: Is Your Career at Risk? Cyber-bullying: Is Your Career at Risk? Presentation Transcript

  • Cyber-bullying 34 (SD24) Anna Tivol
  • About this class... Language warning Have questions? Ask them. Disagree? Please tell me.
  • Cyber-bully policy...
  • Cyber-bully policy... What is the Sierra College policy regarding cyber-bullying?
  • Cyber-bully policy... What is the Sierra College policy regarding cyber-bullying? What is Sierra College’s responsibility in protecting employees and students?
  • Cyber-bully policy... What is the Sierra College policy regarding cyber-bullying? What is Sierra College’s responsibility in protecting employees and students? What does Sierra College expect you to teach students?
  • Cyber-bully policy... What is the Sierra College policy regarding cyber-bullying? What is Sierra College’s responsibility in protecting employees and students? What does Sierra College expect you to teach students? Chief Murphy’s Safety Memo
  • Cyber-bully policy... What is the Sierra College policy regarding cyber-bullying? What is Sierra College’s responsibility in protecting employees and students? What does Sierra College expect you to teach students? Chief Murphy’s Safety Memo Read, study, pop-quiz
  • Safety Memo
  • Safety Memo “Using technology to harass, or bully someone else.”
  • Safety Memo “Using technology to harass, or bully someone else.” Why people “cyber-bully”
  • Safety Memo “Using technology to harass, or bully someone else.” Why people “cyber-bully” Protect yourself 4 ways:
  • Safety Memo “Using technology to harass, or bully someone else.” Why people “cyber-bully” Protect yourself 4 ways: Use caution when posting personal information
  • Safety Memo “Using technology to harass, or bully someone else.” Why people “cyber-bully” Protect yourself 4 ways: Use caution when posting personal information Consider ignoring an online bully
  • Safety Memo “Using technology to harass, or bully someone else.” Why people “cyber-bully” Protect yourself 4 ways: Use caution when posting personal information Consider ignoring an online bully Document activity
  • Safety Memo “Using technology to harass, or bully someone else.” Why people “cyber-bully” Protect yourself 4 ways: Use caution when posting personal information Consider ignoring an online bully Document activity Report to authorities
  • Define for this class... Cyber-bully cyber bully Libel Slander ID theft
  • Expand for this class... Reputation / privacy Online ID theft/Someone posing as you Someone using your name but NOT posing as you Information posted about you Information/comments mistakenly attached to you Mistaken identity
  • Other issues... TMI Stupid sh!t The myth of “privacy settings” Think before you post The Internet remembers everything forever Who should be your friend? Should you “friend” students?
  • ...and more issues... Sexting - illegal; under-age -- additional danger Phishing - protect your passwords Spam - costing us all $$$ Copyright Infringement - Oh, MY, word!!!
  • Who is most at risk? Full-time students (18-24) Dismiss risk of online crime Computer security not utilized for crime prevention Very active online - pre-occupied with social interaction Open and adventurous and over-confident Proficient but not on security aspects
  • Protection Just don’t go online Establish your brand Keep tabs on your “brand” Search engines, use multiple Name registration checkers - social media sites
  • What schools can do... Integrate cyber-bullying into other anti-bully programs Review all existing policies Integrate curriculum-based programs into classrooms Educate staff
  • Education Educate yourself Pay attention: news, discussions, articles Educate your students Appropriate behavior for your class Is there a school policy? Help create one.