• Like
  • Save
Cyber bullying
Upcoming SlideShare
Loading in...5
×
 

Cyber bullying

on

  • 1,973 views

 

Statistics

Views

Total Views
1,973
Views on SlideShare
1,973
Embed Views
0

Actions

Likes
1
Downloads
30
Comments
1

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel

11 of 1

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • It's good to know that a lot of youngsters are become awaring of the effects of bullying or cyberbullying and are now ready to stand up against bullying. Yet, not all youngsters are becoming one. I am a parent and I am worried that my son may not be as strong as enough like them to fight against these bullies and so I tried to find solutions and luckily I found one. It's a solution which featured a safety app which gets me connected to a Safety Network or escalate my call to the nearest 911 when needed, it has other cool features that are helpful for your kids with just a press of a Panic Button. Check it here:http://safekidzone.com/eMail/ProtectorPlus/SafeKidZone/
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Cyber bullying Cyber bullying Presentation Transcript

    • Cyber bullying
      By Michael Joyette and Royce Fabila
      December 3, 2010
    • Table of Contents
      • What is Cyber Bullying?
      • How does it work?
      • Types of Cyber bullies
      • Megan Meier
      • How can we help stop Cyber Bullying?
      • Interesting facts and Statistics
    • What is Cyber Bullying?
    • Definition
      When the internet, cell phones or other digital devices are used to send or post text or images intended to hurt or embarrass another person.
      Cyber Bullying has always been considered an incident/act involving minors unlike Cyber Stalking which is between adults.
    • How does it work?
      Proxy
      Definition
      Direct Attacks
      Definition
      Types of attacks
    • Proxy
      Is using others to help cyber bully the victim, either with or without the accomplice's knowledge.
      Example: Notify and warning wars.
    • Direct Attacks
      Chat Sites
      Cell Phones
      Interactive Gaming
      Web sites
      Impersonation
    • Types of Cyber Bullies
      The Vengeful Angel
      The Revenge of the Nerd
      The Mean Girls
      The Because I Can
    • Megan Meier
    • An example of Cyber Bullying
      Who is Megan Meier?
      On MySpace became friends with a boy named Josh Evans.
      Josh Evans started to harass her through MySpace.
      Committed suicide by hanging.
      After Megan’s death it was found out that it was a former friends mother that was behind Josh Evans.
    • How can we stop Cyber Bullying?
      What can a teen do to stop Cyber Bullying?
      What can parents do to help Cyber Bullying?
      What can public institutions do?
    • Interesting Facts and Statistics
      20% of teenage respondents of a U.S survey seriously thought about suicide.
      All forms of bullying are associated with increased suicidal ideation.
      Cyber Bullying victims more likely to attempt suicide than those who have not experienced it.
    • Interesting Facts and Statistics(Part 2)
    • Summary and Conclusion
      Digital communications has made it easier for people to be anonymous and still have access to reaching to a large global audience. Due to this anonymity it is easier to deceive individuals, especially those who have a hard time socializing in the real world.
      Cyber bullying is a major problem that can no longer be ignored by people. Everyone has a part to play in stopping Cyber bullying, spotting it is the first step.
    • References (Pictures)
      Web. 22 Nov. 2010.
      http://www.staidanscbs.com/Projects/07/YSI/cyber_bully.jpg
      Web. 14 Nov. 2010
      http://c0023576.cdn1.cloudfiles.rackspacecloud.com/wp-content/uploads/2008/08/megan-meier.jpg
      Web. 29 Nov. 2010
      http://cyberbullying.us/2010_charts/cyberbullying_victim_2010.jpg
    • References
      • Web. 14 Nov. 2010.
      http://www.stopcyberbullying.org/how_it_works/cyberbullying_by_proxy.html
      • Web. 14 Nov. 2010.
      http://www.stopcyberbullying.org/how_it_works/direct_attacks.html
      • Web. 14 Nov. 2010.
      http://www.stopcyberbullying.org/parents/howdoyouhandleacyberbully.html
      • Web. 14 Nov. 2010.
      http://meganmeierfoundation.cwsit.org/megansStory.php
      • Web. 14 Nov. 2010.
      http://cyberbullying.us/cyberbullying_and_suicide.php
      • Web. 14 Nov. 2010.
      http://www.ncpc.org/resources/files/pdf/bullying/cyberbullying.pdf
      Pages 2-3
    • References cont’d
      • Legislative Assembly of P.E.I. Standing Committee on social Development.(March 9, 2010). Motion 14 Cyberbullying and violence prevention among youth. Retrieved November 30, 2010 from www.canadiancrc.com/PDFs/PEI_Cyber-bullying_leg_09MAR.pdf
      • Karen S. Headle(n.d) Cyberbullying. Retrieved November 30, 2010 from http://lee.iafs.ufl.edu/FCSPubs/What_is_cyberbullying.pdf
    • Thank You
      Are there any questions?