SlideShare a Scribd company logo
1 of 19
Cyberbullying
Bullying Goes High Tech
Jim Masucci
November 10, 2010
“It’s one thing when you get made fun of at
school, but to be bullied in your own home, via
your computer, is a disgusting thing for people to
do.” Sixteen year old from Alabama
What is Cyberbullying?
Being cruel to others by sending or posting
harmful material using technological means
An individual or group that uses
information and communication involving
electronic technologies to facilitate
deliberate and repeated harassment or
threats to an individual or group.
Also known as:
‘Electronic Bullying’ &
‘Online Social Cruelty’
Tools for Cyberbullying
 Cell Phones – calls
or messages
 Internet
 Electronic Mail
 Instant Messaging
 Blogs
 Social Networks
 Chat Rooms
 Defamatory Web
Sites (Polling)
Why Cyberbullying?
The Internet has become a way of life
for most teens, and an easy tool
for harassing others.
91% of 12 – 15 year olds use the
Internet
99% of teens 16 – 18 use the Internet
Available 24 hrs/day, 7 days/wk
Victim is a perpetual target
Why Cyberbullying? (cont)
Traditional bullying – the bully is
usually stronger than his or her
victim either physically or
socially. Usually occurs in the
school setting (classroom,
playground, or bus).
Cyberbullying - Internet tends to
level the playing field, affording
less dominant teens the means
they need to bully others.
Sometimes used in revenge for
traditional bullying.
How Big a Problem Is It?
 42% of teens surveyed admitted to being
bullied on-line
 35% claim to have been threatened.
 53% confessed to having said something
mean or hurtful on-line. (I-Safe 2007)
 More girls than boys are cyberbullied.
 For teens that are regular visitors to
social networking sites, the chances of
them being cyberbullied goes up.
 Only 15% of parents knew what
cyberbullying was
Types of Cyberbullies
 Avenging Angel - use technical means to get
back at someone who has been bullying them,
or one of their friends.
 Power Hungry - Closest to traditional school
yard bully. Tends to feel superior, and exerts his
or her strengths over the victim.
Types of Cyberbullies (cont.)
 Mean Girls - Work in
groups, and need an
audience to play to. The
group tends to approve
of the actions, or do
nothing about them.
 Inadvertent Bully –
Probably don’t even
realize they are doing
something wrong. Ex :
passing on gossip or
pictures or answering
polls.
Forms of Cyberbullying
 Flaming – Saying mean or hurtful things
 Harassment and cyberstalking - repeated
actions such as sending messages, or threats to
a victim.
 Denigration – putting someone down
 Outing – spreading secret or embarrassing
information or pictures
 Exclusion - intentionally excluding a person by
leaving them off of the list.
 Impersonation – pretending to be someone else
Cyberbullying – It’s Illegal
All of the following forms of cyberbulling
can lead to arrest & prosecution:
 Making threats of violence to people or
their property
 Making obscene or harassing phone
calls
 Harassment or stalking
 Hate or bias crimes
 Creating or sending sexually explicit
images of teens
 Posting real or doctored photos of
someone without their permission
 Taking a photo of someone in place
where privacy expected
Impacts of Cyberbullying
 Feelings of guilt or self
blame
 Sleep difficulties
 Poor performance in
school
 Violence against
tormentors. Victims are
8X more likely to bring a
weapon to school
 Suicide
What Should You Do?
Teens
 Do not respond in a similar
manner. Block the screen names if
possible.
 Do not forward anything
 Do not delete messages
 Consult an adult
 Safeguard user ID’s and
passwords.
“A password is like a tooth brush.
Choose a good one, and don’t
share it.” (Yahoo Security Center)
What Should You Do?
Parents
 Take the situation seriously,
and be supportive.
 Don’t blame the victim.
 Increase tech awareness.
 Monitor computer use.
(Software & placement of
computer)
 Contact ISP and cell phone
provider. Contact law
enforcement, if threatened.
What Should You Do?
Teachers and Schools
If the incident occurs during
school, investigate and
respond.
Otherwise :
 Respond if the incident
causes disruptions.
 Provide counseling to the
perpetrators and the
victims
 Develop anti-bulllying
programs to educate
students
Teach Our Children
 All actions have consequences
 Cyber bullying hurts
 They are just being used and
manipulated by cyber bully
 Cyber bully and accomplices
often become the target of
cyber bullying themselves
 Care about others and stand
up for what’s right
Legal Issues for Schools
 Privacy Issue – Does a school have the right to
search a student’s computer for evidence.
 Free Speech Issue – Does the school have the
right to discipline a student for remarks published
on the Internet during non-school hours.
Sexting
Sending sexually suggestive messages or images to
others via cell phone, or posting them on social
websites.
Surveys of teenagers :
- 20 percent have sent or posted picture of themselves
- 40 percent of teenagers have sent sexually
suggestive messages.
- More girls than boys
Technology is much more far-reaching and permanent,
and teenagers are not consequential thinkers . . . They
Sexting – Legal
Consequenses
Worst Case scenario
 Possession or distribution of Child
Pornography
 Possible inclusion on sex offenders
registry.
More likely
 Suspension or expulsion from school.
 Probation and attend counseling
Additional Sources
http://www.scottmcleod.net/ties2006
http://www.stopcyberbulling.com
http://www.nertsmartz.org
http://www.isafe.org

More Related Content

What's hot

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
larsselect
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
drogt1mm
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
ringw1sl
 

What's hot (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying full
Cyberbullying fullCyberbullying full
Cyberbullying full
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 

Similar to Olmv cyberbullying

Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
John Field
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
John Field
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
Doctora2017
 
Parents Association Cyberbullying presentation
Parents Association Cyberbullying presentationParents Association Cyberbullying presentation
Parents Association Cyberbullying presentation
ColEanna
 

Similar to Olmv cyberbullying (20)

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshare
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Parents Association Cyberbullying presentation
Parents Association Cyberbullying presentationParents Association Cyberbullying presentation
Parents Association Cyberbullying presentation
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Angelo G. mendiola
Angelo G. mendiolaAngelo G. mendiola
Angelo G. mendiola
 
cyber bulling
 cyber bulling cyber bulling
cyber bulling
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parents
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 

Olmv cyberbullying

  • 1. Cyberbullying Bullying Goes High Tech Jim Masucci November 10, 2010 “It’s one thing when you get made fun of at school, but to be bullied in your own home, via your computer, is a disgusting thing for people to do.” Sixteen year old from Alabama
  • 2. What is Cyberbullying? Being cruel to others by sending or posting harmful material using technological means An individual or group that uses information and communication involving electronic technologies to facilitate deliberate and repeated harassment or threats to an individual or group. Also known as: ‘Electronic Bullying’ & ‘Online Social Cruelty’
  • 3. Tools for Cyberbullying  Cell Phones – calls or messages  Internet  Electronic Mail  Instant Messaging  Blogs  Social Networks  Chat Rooms  Defamatory Web Sites (Polling)
  • 4. Why Cyberbullying? The Internet has become a way of life for most teens, and an easy tool for harassing others. 91% of 12 – 15 year olds use the Internet 99% of teens 16 – 18 use the Internet Available 24 hrs/day, 7 days/wk Victim is a perpetual target
  • 5. Why Cyberbullying? (cont) Traditional bullying – the bully is usually stronger than his or her victim either physically or socially. Usually occurs in the school setting (classroom, playground, or bus). Cyberbullying - Internet tends to level the playing field, affording less dominant teens the means they need to bully others. Sometimes used in revenge for traditional bullying.
  • 6. How Big a Problem Is It?  42% of teens surveyed admitted to being bullied on-line  35% claim to have been threatened.  53% confessed to having said something mean or hurtful on-line. (I-Safe 2007)  More girls than boys are cyberbullied.  For teens that are regular visitors to social networking sites, the chances of them being cyberbullied goes up.  Only 15% of parents knew what cyberbullying was
  • 7. Types of Cyberbullies  Avenging Angel - use technical means to get back at someone who has been bullying them, or one of their friends.  Power Hungry - Closest to traditional school yard bully. Tends to feel superior, and exerts his or her strengths over the victim.
  • 8. Types of Cyberbullies (cont.)  Mean Girls - Work in groups, and need an audience to play to. The group tends to approve of the actions, or do nothing about them.  Inadvertent Bully – Probably don’t even realize they are doing something wrong. Ex : passing on gossip or pictures or answering polls.
  • 9. Forms of Cyberbullying  Flaming – Saying mean or hurtful things  Harassment and cyberstalking - repeated actions such as sending messages, or threats to a victim.  Denigration – putting someone down  Outing – spreading secret or embarrassing information or pictures  Exclusion - intentionally excluding a person by leaving them off of the list.  Impersonation – pretending to be someone else
  • 10. Cyberbullying – It’s Illegal All of the following forms of cyberbulling can lead to arrest & prosecution:  Making threats of violence to people or their property  Making obscene or harassing phone calls  Harassment or stalking  Hate or bias crimes  Creating or sending sexually explicit images of teens  Posting real or doctored photos of someone without their permission  Taking a photo of someone in place where privacy expected
  • 11. Impacts of Cyberbullying  Feelings of guilt or self blame  Sleep difficulties  Poor performance in school  Violence against tormentors. Victims are 8X more likely to bring a weapon to school  Suicide
  • 12. What Should You Do? Teens  Do not respond in a similar manner. Block the screen names if possible.  Do not forward anything  Do not delete messages  Consult an adult  Safeguard user ID’s and passwords. “A password is like a tooth brush. Choose a good one, and don’t share it.” (Yahoo Security Center)
  • 13. What Should You Do? Parents  Take the situation seriously, and be supportive.  Don’t blame the victim.  Increase tech awareness.  Monitor computer use. (Software & placement of computer)  Contact ISP and cell phone provider. Contact law enforcement, if threatened.
  • 14. What Should You Do? Teachers and Schools If the incident occurs during school, investigate and respond. Otherwise :  Respond if the incident causes disruptions.  Provide counseling to the perpetrators and the victims  Develop anti-bulllying programs to educate students
  • 15. Teach Our Children  All actions have consequences  Cyber bullying hurts  They are just being used and manipulated by cyber bully  Cyber bully and accomplices often become the target of cyber bullying themselves  Care about others and stand up for what’s right
  • 16. Legal Issues for Schools  Privacy Issue – Does a school have the right to search a student’s computer for evidence.  Free Speech Issue – Does the school have the right to discipline a student for remarks published on the Internet during non-school hours.
  • 17. Sexting Sending sexually suggestive messages or images to others via cell phone, or posting them on social websites. Surveys of teenagers : - 20 percent have sent or posted picture of themselves - 40 percent of teenagers have sent sexually suggestive messages. - More girls than boys Technology is much more far-reaching and permanent, and teenagers are not consequential thinkers . . . They
  • 18. Sexting – Legal Consequenses Worst Case scenario  Possession or distribution of Child Pornography  Possible inclusion on sex offenders registry. More likely  Suspension or expulsion from school.  Probation and attend counseling