2. Introduction
Cyber bullying is a large problem in schools
across the United States.
Students lives are affected each day.
3. Introduction
Parents and teachers often
overlook cyber-bullying.
Adult figures need to be
aware of what technologies
children are using.
Without the help of adults this
izzymunchted
problem will never end.
4. Background
Information
Students are being harassed and bullied through
different technologies.
Bullying is occurring both inside and outside of the
classroom.
5. Background Information
Internet bullying occurs through instant
messaging, email, websites, mobile phones
and social networking sites.
Abusive text messages have also been
known to impact a students life.
6. Background Information
Laws against cyber-bullying are
not always clear.
Educators need to know when to
step in and stop bullying.
There must be repercussions for
harassing students.
7. Impact of Cyber-Bullying
Cyber-Bullying can happen to many
different age groups.
Some students are bullied constantly
throughout their entire school experience.
10. Preventative Measures
More ways have been developed for parents to talk to their
children about cyber-bullying.
Teachers have the privilege of attending classes and
workshops about this serious matter.
In the future, law enforcement
hopes to have clear laws preventing
this behavior.
11. Preventative Measures
Schools need to be serious about
eliminating bulling.
Keeping students busy will help
reduce cyber-bullying.
Creating a trusting environment will
help students to talk about their
problems.
jdanvers
12. Conclusion
Are you doing everything in you power to keep
cyber-bullying at a minimum?
Communication and awareness are key to
keeping harassment off of school grounds.
13. References
Hinduja, S., & Patchin, J.W. (2009). Cyberbllying research center. Retrieved from
http://www.cyberbullying.us/
Sutton, S. (2009). School solutions for cyber bullying. Principal Leadership (Middle School Ed.), 9(6),
Retrieved from http://0-newfirstsearch.oclc.org.catalog.lib.cmich.edu/WebZ/FTFETCH?sessionid=fsapp3-
53106-g7716jdn-
fon2w2:entitypagenum=3:0:rule=100:fetchtype=fulltext:dbname=WilsonSelectPlus_FT:recno=7:resultset=1:ft
format=HTML:format=BI:isbillable=TRUE:numrecs=1:isdirectarticle=FALSE:entityemailfullrecno=7:entityema
ilfullresultset=1:entityemailftfrom=WilsonSelectPlus_FT:
Whitaker, J.L. (2009). Online dangers: keeping children and adolescents safe. Washington and Lee Law
Review , 66(3), Retrieved from http://0-
newfirstsearch.oclc.org.catalog.lib.cmich.edu/WebZ/FTFETCH?sessionid=fsapp3-59569-g76wpgmo-
gr8t57:entitypagenum=5:0:rule=100:fetchtype=fulltext:dbname=WilsonSelectPlus_FT:recno=1:resultset=2:ftf
ormat=HTML:format=BI:isbillable=TRUE:numrecs=1:isdirectarticle=FALSE:entityemailfullrecno=1:entityemai
lfullresultset=2:entityemailftfrom=WilsonSelectPlus_FT:
14. Image References
Title :_DSC0070
Author: jdanvers
Source: http://www.flickr.com/photos/jdanvers/4461340606/
Title: Create the Future PD Qatar Academy
Author: Julie Lindsay
Source: http://www.flickr.com/photos/julielindsay/3321008397/
Title: Serene Computer Lab at Seward Montessori School
Author: Izzymunchted
Source: http://www.flickr.com/photos/izzymunchted/1419115048/
Title: Working on meeting recap post in computer lab
Author: jessica mullen
Source: http://www.flickr.com/photos/jessicamullen/4109596882/