• Save
Cyberbullying Class
Upcoming SlideShare
Loading in...5

Cyberbullying Class



This presentation can be used with students/parents/teachers.

This presentation can be used with students/parents/teachers.



Total Views
Slideshare-icon Views on SlideShare
Embed Views



0 Embeds 0

No embeds


Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    Cyberbullying Class Cyberbullying Class Presentation Transcript

    • Cyber bullying & Cyber threats Kelly Schermerhorn Model Schools November 3, 2009
    • Cyber bullying What it is, who is involved, where it is, why do we care, and how it affects YOU! What we can do about it!
    • What is it?
      • Cyber bullying is the use of electronic means by a minor to torment, threaten, harass, humiliate, embarrass or otherwise target another person.
    • Where is it found? E-mails Instant messaging Text or digital imaging messages sent on cell phones Web pages, Web logs (blogs) Chat rooms or discussion groups Other information communication technologies Plus more…
    • Where is it found? Significant amount occurring off-campus. – But is impacting student relationships on-campus. • It is highly likely students are using the school’s Internet system or personal cell phones to engage in cyber bullying. – Bypass Internet filter/proxy sites. – Use cell phones or other digital devices. – This raises liability concerns.
    • The technologies Wikis are websites anyone can edit . If you can word process, you can use a wiki. Visitors can see a history of changes and revert to earlier versions. Example: www.wikipedia.org Wikis/Podcasts Podcasts are blogs with audio or video. Podcasts are like Internet radio or TV shows. Anyone can be a producer. Podcasts are consumed on demand. Examples: www.epnweb.org Blogs Web + Log = weblog, or we blog Blogs are easily created and easily updated sites. If you can email, you can blog. Blogs allow visitors to comment. Example: www.weblogg-ed.com
    • Types of cyber bullying
      • Flaming (sarcasm)
      • Harassment
      • Denigration (dissin’)
      • Impersonation
      • Outing (telling a secret)
      • Trickery
      • Exclusion (keep out of the loop)
      • Cyber stalking
      • • Trash talking
    • Informational video
      • Wired Safety’s Cyber bullying Part I & II video
      • Parry Aftab-lawyer and spokesperson for WiredSafety.org
    • 1995-2005
      • 2 million children accessed the Internet in 1995 (worldwide).
      • This number climbed to 4 million in 1996.
      • The number exceeded 28 million in 2000; 45 million in 2002; 77 million in 2005-what do you think it is today?
      • 35 % of 12-15 yr olds have access in their bedroom now (Oct 7, 2009-TechWatch.co.uk)
    • Internet usage stats
      • http://www.internetworldstats.com/stats.htm
    • Cyber bullying survey
    • Cyber bullying survey
    • Cyber bullying survey
    • Cyber bullying survey
    • Cyber bullying survey
    • Who are Cyber bullies?
      • May be known to the victim or a online stranger.
      • May be anonymous and enlist others including online “friends”.
      • May be related to fights about relationships.
      • May be based on hate or bias.
      • Some teens think cyber bullying is a game!
    • Teenagers might think…
      • They think they are invisible, so they think they can’t be punished.
      • No real harm has been caused online.
      • They should have free speech right to post whatever they want, regardless of the harm caused.
    • Virtual world-real harm
      • Communication can be vicious and occur 24/7.
      • Damaging material can be widely disseminated.
      • Impossible to retrieve or remove.
      • Can lead to suicide and violence.
      • Teens reluctant to tell adults.
      • Great emotional harm.
    • Cyber bullying can make you feel…
      • STUPID
      • PUT DOWN
    • Warning signs
      • Sadness or anger after Internet use.
      • Withdrawal from friends and activities.
      • School avoidance, decline in grades, and depression.
      • Indications the child is being bullied at school.
    • IT IS A CRIME!!!
      • Post something in public
      • 3rd Degree Misdemeanor – 1 year in jail $2,500 fine
      • STALKING
      • Several communications are sent directly to victim
      • 1st Degree Misdemeanor – 5 Years in jail $10,000 fine
    • Some recent cyber bullying cases in the news
      • Ryan Halligan – 13yrs old, VT
      • Classmates spread rumors he was GAY
      • Female befriended him for his secrets
      • Posted to internet
      • Committed suicide
      • Ghyslain Raza – “Star Wars Kid”, Canada
      • Overweight and slightly awkward teenager
      • Video of himself playing with a play light saber
      • Classmates found & posted to internet
      • Finished school year in a Psychiatric ward
      • Internets most downloaded video 2006
    • Megan Meier
      • Megan – 13yrs old, Missouri
      • - Suffered from depression and attention disorder
      • Met Josh Evans 16 – Cyber friend on her MySpace site
      • Josh ended their friendship – heard she was cruel
      • Electronic postings about her “fat”, “slut”
      • “ This world would be better off without her”
      • Committed suicide Oct 16, 2006
    • Megan Meier
      • Lori Drew – 49 yrs old, Mo
      • Aka – Josh Evans with co-conspirators - Ashley Grills.
      • May 15, 2008 Indicted – Federal Grand Jury
      • One count conspiracy. (5yrs)
      • Three counts accessing protected computers without authorization. (5yrs ea count)
      • Fraudulently use of an account – to cause harm.
      • Violated MySpace “terms of Service”.
      • Grand Jury in Los Angeles, Ca – Jurisdiction
      • Ashley Grills – granted immunity.
    • Terms of use
      • Cyber bullying is a violation of the
      • "terms of use" of most service providers.
      • – Will respond by removing such harmful content and terminating the membership of the offending poster.
      • – But educators, parents, and students must file a complaint.
      • File a complaint by providing the harmful messages and ask that the account be terminated and any harmful material be removed.
    • Cyber threats
      • Threats or distressing material.
      • General statements that make it sound like the writer is emotionally upset and may consider harming someone else, harming himself or herself, or committing suicide.
    • Have you heard of..
      • Jeff Weise
      • Pekka-Eric Auvinen
      • Dillon Cossey
      • Dylan Klebold & Eric Harris
    • How about now?
      • Jeff Weise - Red Lake
      • Pekka-Eric Auvinen - Jokela
      • Dillon Cossey – Plymouth - Whitemarsh
      • Dylan Klebold & Eric Harris - Columbine
    • What can we do?
      • We can not control the children – we must educate.
      • • Balanced approach – policies may be too rigid.
      • • Set rules and limits to Internet use.
      • • Guide students to GOOD content/ethical usage.
      • • Help Teachers and Parents educate children abut safe, responsible uses of the internet.
      • • Foster appropriate use of the internet among preschoolers and other young students
    • What else…
      • Use the Internet for education-related activities and not recreational use or as a baby sitter.
      • • Use the Internet to communicate to the parents and students. (websites, homework, e-mail)
      • • Engage the community.
    • Situation review
      • Imminent Threat of Violence or Danger.
      • • Gather evidence – screen shots, emails..
      • • Violence or suicide Assessment.
      • • Cyber bully Assessment – can the school respond?
    • What can teachers do?
      • Communicate with students
      • • Communicate with other educators / Lawyer
      • • Communicate with IT
      • • Communicate with the police
      • • Communicate with the parents
      • Contact the Service provider
      • • Confront students who are behaving in
      • irresponsible, inappropriate, or unsafe
      • ways. * Do not look the other way*
    • Student’s perspective
      • Utah student creates video and wins
      • “predator”
    • Resources
      • http://www.stopbullyingnow.hrsa.gov/
      • http://www.cyberbully.org/
      • http://www.ncpc.org/cyberbullying
      • http://www.cyberbullying.us/
      • http://123elearning.wikispaces.com/cyberbullying+presentation
      • http://123elearning.wikispaces.com/onlinesafety
      • http://www.ikeepsafe.org/iksc_kids/
      • http://www.ftc.gov/bcp/conline/edcams/kidzprivacy/
      • http://www.cybersmartkids.com.au/
      • http://www.protectkids.com/
      • http://www.ftc.gov/bcp/conline/edcams/kidzprivacy/kidz.htm
      • http://www.safesurf.com/
      • http://www.cybersmart.org/for/students.asp
      • http://www.isafe.org/
      • http://www.webwisekids.org/
      • http://kidshealth.org/parent/positive/family/net_safety.html