Your SlideShare is downloading. ×
0
Cyber-Bullying
Cyber-Bullying
Cyber-Bullying
Cyber-Bullying
Cyber-Bullying
Cyber-Bullying
Cyber-Bullying
Cyber-Bullying
Cyber-Bullying
Cyber-Bullying
Cyber-Bullying
Cyber-Bullying
Cyber-Bullying
Cyber-Bullying
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Cyber-Bullying

167

Published on

Published in: Career, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
167
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Source: http://www.carynsullivanscribe.com/wp-content/uploads/2012/10/Cyberbullying.jpg
  • Cyber-bullying is when a child, pre-teen or adolescent is tormented, harassed, threatened, or humiliated by another child, preteen, or teen using the Internet, digital technologies, or mobile phones. Sources: http://info.uknowkids.com/Portals/176530/images/cyberbullying.jpghttp://socialsafety.org/cyber-bullying/
  • Flaming is the posting of derogatory remarks on someone else’s webpage or messaging nasty remarks to someone. Mostly, it is online fights filled with bad language. The best way to deal with flaming is to ignore it. Take down the post or block the person. If you fight back, you’re engaging in a flaming war and are just as guiltyas the person who flamed you. Flaming wars can escalate into real-life, physical fights, which nobody wants.Impersonation is when a person logs into someone else’s account or creates a fake account with another person’s information and pictures, and sends out messages pretending to be that user. This is a form of identity theft and it is a federal crime. Generally it’s prosecuted as a Class C Felony, which can bring with it 2-8 years in jail and up to $10,000 in fines depending on the harm inflicted by assuming another person’s identity.Bad Mouthing can include creating profiles that make fun of another person, blogs that rate people in your class or creating home pages that make fun of others. Authorities can take this very seriously. There are many documented cases of mean comments or even excessive profanity on Twitter and Facebook leading to expulsion from school. Sources: http://socialsafety.org/cyber-bullying/
  • Sources:http://www.cyberbully411.org/
  • Cyber-bullies may suffer later for the things they post online, while applying for colleges or jobs. They may lose their cell phone or online accounts as a penalty for their actions. If cyber bullying was sexual in nature or involved sexting, the results can include registration as a sex offender.Sources: http://aspanational.files.wordpress.com/2012/02/cyber_bullytext.pnghttp://www.cyberbully411.org/
  • Sources: http://www.cyberbully411.org/
  • StopCyberBullying is the home of Don’t Stand By, Stand Up – a promise people to make to stand up to cyber bullying. StopCyberBullying was the first cyber bullying prevention program in North America. It specially trained young volunteers to design and deliver community programs to help their peers address cyber bullying. There is also the Kids Help Phone at 1-800-668-6868. If you are being cyber bullied or know someone who is, call that phone number.Cyber Bully Alert:It is a software tool for parents to equip their children with and give them the ability to immediately communicate and document any threats their children experience when online. How it works isthe cyber bully alert icon will be installed on the tool bar on your computer and with internet connection the child can send an instant alert via email or text message by clicking on the icon and following the send alert instructions. Two messages can be sent: an automated alert and a customizable alert that can include an incident description. Sources: http://www.stopcyberbullying.org/http://www.cyberbullyalert.com/http://www.stopcyberbullying.org/images/main_logo.gif
  • In the past decade, the blast of the Internet, social networking sites and increased technology has made the social issue of cyber-bullying worse. Due to digital advancements, cyber-bullying has become a public situation with numerous more people involved. Rumors can be spread more rapidly than ever before. The rapid growth of the Internet and technology has also led to the growth in cyber-crime, which are crimes committed on the internet using technology as a tool to target innocent people. Cyber-crimes have become prevalent because today’s technology has made it easier for criminals to not have to expose his or her face. Sources:http://www.cyberbully411.org/http://en.wikipedia.org/wiki/Computer_crimehttp://dejuregovernment.com/wp-content/uploads/2013/02/Cyber-Crimes.jpg
  • All 50 states need to have cyber-bullying laws. There are only anti-stalking statutes that mention electronic communications. The rapid growth of technology in itself is playing such a huge role in every kid and adult’s life that definite laws need to be created. Besides schools addressing cyber bullying, if there were laws pertaining specifically to cyber bullying, kids would be more likely to stop the bullying due to severe law consequences. Awareness is the best prevention for cyber-bullying! Teachers need to monitor internet activity, and discuss the dangers of cyber bullying. Schools must have programs in place to educate students on cyber bullying and enforce consequences when it occurs.
  • Who has the power to improve it? Parents! The key to cyber bullying prevention just might be the parents. Children and teens are often unsupervised on their computer or cellphones and know more about technology than their parents. Supervising your child’s use of the computer and cellphone could make a huge difference. Learning about the sites that your child visits and what he or she is doing online and being concerned if your child spends excessive amounts of time online or hides the screen when you approach are all key factors. Setting a time limit for these devices is a highly recommended strategy. Most cyber-bullying is done outside of school, during kid’s free time, so parents cracking down on computer/cellphone use with their children could make a huge difference. Sources: http://www.greatschools.org/parenting/bullying/231-faq-about-cyberbullying.gs?page=all
  • Cyberbullying can be a life-or-death situation. Megan Meier, a 13-year-old girl, became friends with a boy, Josh Evans, on MySpace. One day he started saying that she wasn’t very nice to her friends. Public bulletins began saying she was a slut and fat. On October 16, 2006, her parents found her hanging in her closet. There was no Josh Evans. He was a fake person. An ex-best friend’s mother created the account, and Megan didn’t live to see her fourteenth birthday. To learn more about Megan Meier, visit the Megan Meier Foundation: http://www.meganmeierfoundation.orgSources: http://bloximages.newyork1.vip.townnews.com/stltoday.com/content/tncms/assets/v3/editorial/a/e0/ae0a32b9-1c4e-50a8-b9ff-70095d619b69/4fc62971be0a5.preview-300.jpghttp://socialsafety.org/cyber-bullying/
  • Tyler Clementi, an 18-year-old freshman at Rutgers University, jumped off the George Washington Bridge in September 2010 after finding out that his roommate, Dharun Ravi, used a webcam to stream Tyler kissing another man. Ravi invited his Twitter followers to view it. This invasion of privacy and cruelty led to Clementi’s death. To learn more about Tyler Clementi, visit the Tyler Clementi Foundation: thetylerclementifoundation.org.Sources: http://www.cnn.com/video/crime/2010/09/30/jvm.rutgers.suicide.hln.640x360.jpghttp://socialsafety.org/cyber-bullying/
  • Transcript

    • 1. Cyber-BullyingKylene FitsikStudentSiena CollegeApril 29, 2013CSIS 200
    • 2. What is Cyber-Bullying?● Cyber-bullying is any harassment that occurs viatechnology● Forum posts, chat rooms, fake profiles, emailmessages● Threatening text messages, phone calls
    • 3. Three Main Types● Flaming● Impersonation● Bad Mouthing
    • 4. Causes● Minimal parental supervision● Drug and alcohol use● Family conflicts(divorce, separation, fighting, etc.)● Revenge of otherpeers, entertainment purposes, toboost their ego, or to remind people oftheir own social standing
    • 5. EffectsVictims:● Deep emotional scars, anxiety● Withdrawal from friends and activities, changes inbehavior and appetite● Depression, suicideCyber-bullies:● Consequences when time to apply for colleges andjobs● Lose cell phone or online accounts● Registration as a sex offender
    • 6. Who is Targeted?● 1/3 of children has been a victim to cyber-bullying● Nearly half of suicides among 10 to 14 yearolds are due to cyber-bullying● 1 in 7 teachers is a victim of cyber-bullying● Girls are at higher risk than boys● Average age of a teenager involved in cyber-bullying is 15 years old● Higher among African-Americans than whiteteens due to fewer protective factors such asparental supervision, drug/alcohol use etc.
    • 7. Technology’s PositiveRole● Like StopCyberBullying on Facebook!● Kids Help Phone at 1-800-668-6868● Software tool: Cyber-Bully Alert
    • 8. Negative Impacts● More of a public situation with numerous morepeople involved● Rumors spreading more rapidly● Cyber-crimes: using the Internet to steal aperson’s identity, stalk innocent people, hack intoother user’s computers, etc.● Technology making it easier for criminals to nothave to expose his or her face
    • 9. What needs to change?● State-wide cyber-bullying laws● Schools need to educate studentson cyber-bullying● Enforce consequences
    • 10. What Schools are Doing● Blocking access to problematicwebsites● Controlling usage of cellphones oncampus especially in restrooms, lockerrooms, pools, etc.
    • 11. Who has the power?● Key to cyber bullying=Parents● Kids are unsupervised on theircomputers and cellphones● Set a time limit● Know something is not right if childhides their screen when parentapproaches them
    • 12. Megan Meier● 13 year old girl became friends with Josh Evans on MySpace● Started calling her nasty names and created public bulletins● October 16, 2006, Megan found dead hanging in her closet● Fake Josh Evans● Megan Meier Foundation:http://www.meganmeierfoundation.org
    • 13. Tyler Clementi● 18 year old freshman at Rutgers University jumped off theGeorge Washington Bridge in September 2010● Reason: Dharun Ravi used a webcam to stream Tyler kissinganother man● Ravi invited his Twitter friends to view it● Tyler Clementi Foundation: thetylerclementifoundation.org
    • 14. Referenceshttp://socialsafety.org/cyber-bullying/http://www.cyberbully411.org/http://www.stopcyberbullying.org/http://www.cyberbullyalert.com/http://www.greatschools.org/parenting/bullying/231-faq-about-cyberbullying.gs?page=allhttp://en.wikipedia.org/wiki/Computer_crimePictures:http://www.carynsullivanscribe.com/wp-content/uploads/2012/10/Cyberbullying.jpghttp://www.cnn.com/video/crime/2010/09/30/jvm.rutgers.suicide.hln.640x360.jpghttp://bloximages.newyork1.vip.townnews.com/stltoday.com/content/tncms/assets/v3/editorial/a/e0/ae0a32b9-1c4e-50a8-b9ff-70095d619b69/4fc62971be0a5.preview-300.jpghttp://dejuregovernment.com/wp-content/uploads/2013/02/Cyber-Crimes.jpghttp://info.uknowkids.com/Portals/176530/images/cyberbullying.jpghttp://www.stopcyberbullying.org/images/main_logo.gifhttp://aspanational.files.wordpress.com/2012/02/cyber_bullytext.png

    ×