• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Cyber Bullying
 

Cyber Bullying

on

  • 2,888 views

 

Statistics

Views

Total Views
2,888
Views on SlideShare
2,870
Embed Views
18

Actions

Likes
0
Downloads
43
Comments
0

2 Embeds 18

http://www.slideshare.net 9
http://cyberbullyinginschools.blogspot.com 9

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Cyber Bullying Cyber Bullying Presentation Transcript

    • CYBER BULLYING
      Marjon Ricketts
      April 14, 2010
    • Table of Contents
      What is cyber bullying?
      Facts
      Social Networks used
      Different forms of cyber bullying?
      Targeted groups
      The effects of cyber bullying?
      What can be done to stop cyber bullying?
      Summary and Conclusion
      References
    • Cyber bullying
      Cyber bullying is the harmful application of technology by parties wishing to extend the reach and impact of their behaviour.
      It is the use of communication technologies to support repeated acts by an individual or group.
      Acts carried out are intended to embarrass, humiliate or intimidate their victim.
    • Facts
      Over 40% of those bullied by way of information technology mediums are teenagers with internet access.
      Females are more likely than males to be targeted by way of harmful technological acts
      Currently the most common virtual locations for cyber bullying are chat rooms, social networking sites, e mail and instant message systems.
      Only 15% of those who experience this form of harassment seek help
      60% of those who experience the act of cyber bullying experience this act in the home
      Psychological and emotional outcomes of cyber bullying are similar to that of being bullied face to face; however you may be able to end physical contact whereas the attempt to end cyber bullying is much more difficult.
      Of offenders interviewed most consider this act fun or instructive using this act as a means of trying to strengthening their victims.
    • Social Networking Service
      Social networking services are primarily used to aid in building social
      relations.
      Networks generally consist of individual profiles and or member representation
      Networking sites currently used in the process of cyber bullying
      Bebo
      Facebook
      Formspring.me
      My Space
      Twitter
      Bebo and My Space Services now employ security officers to search account holder
      profiles for inappropriate content, resulting in the freezing of a members account.
    • Forms of cyber bullying
      Sexting – the act of sending sexually explicit messages or photographs electronically
      primarily between mobile phones
      The story of Jessica LoganJessica Logan was an 18 year old teenager from Ohio. Her only crime was sending nude images of herself to her boyfriend’s mobile phone.When they broke up, he sent the images to other girls, who started harassing her, calling her a slut and a whore.Jessica, an only child, became miserable and depressed and stopped going to school.In May 2008 Jessica appeared on Cincinnati TV to tell her story "to make sure no one else will have to go through this again".Two months later, Jessica hanged herself in her bedroom.
      http://www.youtube.com/watch?v=VLTj3WBmY1k
    • Forms of cyber bullying
      General - threats and intimidation sent via e mail, networking sites, cellular phone and message boards.
      Cyber stalking – repeated and prolonged unwanted texting, e mail, or instant messaging whether explicitly offensive or not; online stalking involves the process of constantly monitoring a parties online activities.
      Defamation – the posting of upsetting or defamatory remarks as it pertains to an individual online, insults may be general or include prejudice or religious based bullying.
      Peer rejection or exclusion – the act of excluding someone by refusing to return or acknowledge messages.
      Unauthorized access and impersonation by way of identity theft – accessing and copying someone’s information, e.g. e mails, or pictures in order to harass or humiliate them.
    • Forms of cyber bullying
      Impersonation – by hacking into an individual account profile, parties are able to pretend to be the person whose account has been hacked.
      Sending or forwarding of private of personal information which include text, photograph and video.
      Manipulation – using online friendship status’ to suggest that a genuine friend would release personal information.
      Manipulation is also used by way of adults who have a sexual interest in children, to groom children adults have contacted them online in hopes of being able to set up a meeting.
      Gaming sites and virtual world – Live text or voice chat during online gaming, players repeatedly pick on weaker or less experienced players, at time killing their opponents players.
    • Targeted groups
      Youth aged 12 to 18, generally students
      Members of various cultural and ethnic backgrounds
      Those with expressed sexual preference for the same sex
      Workplace employers
      Teachers
      Children under the age of 12 for the purposes of sexual exploitation
      Patrons with strong religious beliefs often designated to specified religious groups
    • The effects of cyber bullying
      Undermining of one’s confidence, self esteem and sense of security
      Limits social interactions, individuals choose to isolate themselves and avoid social forums
      Professional and peer interaction are impacted
      Distress – feeling highly anxious, unsafe and inadequate as a person
      Eating or sleeping disorders
      A desire to seek revenge
      Development of social phobias
      Self infliction of pain or scarring
      Loss of hope which may compound into a decision that life is not worth living
      http://www.cbsnews.com/video/watch/?id=6343317n&tag=related;photovideo
    • What can be done to prevent cyber bullying?
      Education and awareness of cyber bullying and its impact
      Promote the positive use of technology
      Place computers with internet access in an open space
      Never give out personal information such as passwords
      Do not believe everything that you read
      Do not open a message from someone you do not know
      If it does not look or feel right it probably isn’t, trust your instincts
    • What can be done to prevent cyber bullying
      Do not erase or delete messages from cyber bullies as an investigation may lead you to
      your bully
      Protect yourself, try not to arrange meetings with someone you met online
      Some anti virus programs such as McAffee offer chat messaging protection for both instant messaging and chat rooms
      Making the reporting of cyber bullying easier as it is often difficult for victims to
      communicate this stress
      stopcyberbullying.org dedicated to prevention and counselling for those in need
    • Summary and Conclusion
      Technology is great as it provides a means to mass communication, social engagement and a wealth of insight and knowledge.
      Though there are many positive facets, the misuse of technology through cyber bullying is painful for those targeted.
      Seeking an end to the hate epidemic deemed cyber bullying is an ongoing process as technology continues to evolve; however education is the first step in prevention
    • References
      Images
      1 and 2
      http://www.bing.com/images/search?q=cyber+bullying+pictures&FORM=BIFD#focal=8251eeff23d1e453bd7c66cd14bd3b8d&furl=http%3A%2F%2Fwww.cyberbullyalert.com%2Fblog%2Fwp-content%2Fuploads%2Fcyberbullying.jpg
      3
      http://ablogofourown.files.wordpress.com/2009/04/sexting.jpg
      4
      http://www.bing.com/images/search?q=cyber+bullying+pictures&FORM=BIFD#focal=2ce126f756d411680b4076a626ac64d3&furl=http%3A%2F%2Fwww.ryanpatrickhalligan.org%2Fimages%2Fcyber-bully.jpg
      5
      http://www.bing.com/images/search?q=questions&FORM=BIFD#focal=1b3c72bbe7b17cd03abe2f60d59c3e19&furl=http%3A%2F%2Fwww.freeclipartnow.com%2Fd%2F41525-2%2Fquestion-mark.jpg
      Video
      1
      http://www.youtube.com/watch?v=VLTj3WBmY1k
      2
      http://www.cbsnews.com/video/watch/?id=6343317n&tag=related;photovideo
    • References
      Definition
      http://en.wikipedia.org/wiki/Cyberbullying
       
      Facts
      http://www.cyberbullyalert.com/blog/2008/08/cyber-bullying-statistics-that-may-shock-you/
      Social Networking
      http://en.wikipedia.org/wiki/Social_networking_sites
      Forms of Cyber bullying/Targeted Groups/Effects/Prevention
      http://www.cyberbullyalert.com/blog/2008/08/cyber-bullying-statistics-that-may-shock-you/
      http://www.puresight.com/Cyberbullying/o-and-onts-for-cyber-bullying-victims.html
      http://safety.lovetoknow.com/Cyber_Bullying_Statistics
      http://www.teachernet.gov.uk/wholeschool/behaviour/tacklingbullying/cyberbullying/understandingcyberbullying/formsofcyberbullying/
      http://www.safesocialnetworking.com/img/safety/Cyberbullying_1.pdf
      http://www.youthlaw.asn.au/legalinfo/BullyingRacismReport.pdf
    • THANK YOU
      ARE THERE ANY QUESTIONS?