• Save
Cyberbullying Class
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Cyberbullying Class

on

  • 1,462 views

This presentation can be used with students/parents/teachers.

This presentation can be used with students/parents/teachers.

Statistics

Views

Total Views
1,462
Views on SlideShare
1,462
Embed Views
0

Actions

Likes
2
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Cyberbullying Class Presentation Transcript

  • 1. Cyber bullying & Cyber threats Kelly Schermerhorn Model Schools November 3, 2009
  • 2. Cyber bullying What it is, who is involved, where it is, why do we care, and how it affects YOU! What we can do about it!
  • 3. What is it?
    • Cyber bullying is the use of electronic means by a minor to torment, threaten, harass, humiliate, embarrass or otherwise target another person.
  • 4. Where is it found? E-mails Instant messaging Text or digital imaging messages sent on cell phones Web pages, Web logs (blogs) Chat rooms or discussion groups Other information communication technologies Plus more…
  • 5. Where is it found? Significant amount occurring off-campus. – But is impacting student relationships on-campus. • It is highly likely students are using the school’s Internet system or personal cell phones to engage in cyber bullying. – Bypass Internet filter/proxy sites. – Use cell phones or other digital devices. – This raises liability concerns.
  • 6. The technologies Wikis are websites anyone can edit . If you can word process, you can use a wiki. Visitors can see a history of changes and revert to earlier versions. Example: www.wikipedia.org Wikis/Podcasts Podcasts are blogs with audio or video. Podcasts are like Internet radio or TV shows. Anyone can be a producer. Podcasts are consumed on demand. Examples: www.epnweb.org Blogs Web + Log = weblog, or we blog Blogs are easily created and easily updated sites. If you can email, you can blog. Blogs allow visitors to comment. Example: www.weblogg-ed.com
  • 7. Types of cyber bullying
    • Flaming (sarcasm)
    • Harassment
    • Denigration (dissin’)
    • Impersonation
    • Outing (telling a secret)
    • Trickery
    • Exclusion (keep out of the loop)
    • Cyber stalking
    • • Trash talking
  • 8. Informational video
    • Wired Safety’s Cyber bullying Part I & II video
    • Parry Aftab-lawyer and spokesperson for WiredSafety.org
  • 9. 1995-2005
    • 2 million children accessed the Internet in 1995 (worldwide).
    • This number climbed to 4 million in 1996.
    • The number exceeded 28 million in 2000; 45 million in 2002; 77 million in 2005-what do you think it is today?
    • 35 % of 12-15 yr olds have access in their bedroom now (Oct 7, 2009-TechWatch.co.uk)
  • 10. Internet usage stats
    • http://www.internetworldstats.com/stats.htm
  • 11. Cyber bullying survey
  • 12. Cyber bullying survey
  • 13. Cyber bullying survey
  • 14. Cyber bullying survey
  • 15. Cyber bullying survey
  • 16. Who are Cyber bullies?
    • May be known to the victim or a online stranger.
    • May be anonymous and enlist others including online “friends”.
    • May be related to fights about relationships.
    • May be based on hate or bias.
    • Some teens think cyber bullying is a game!
  • 17. Teenagers might think…
    • They think they are invisible, so they think they can’t be punished.
    • No real harm has been caused online.
    • They should have free speech right to post whatever they want, regardless of the harm caused.
  • 18. Virtual world-real harm
    • Communication can be vicious and occur 24/7.
    • Damaging material can be widely disseminated.
    • Impossible to retrieve or remove.
    • Can lead to suicide and violence.
    • Teens reluctant to tell adults.
    • Great emotional harm.
  • 19. Cyber bullying can make you feel…
    • SAD ANGRY UPSET
    • DEPRESSED VIOLATED
    • HATED ANNOYED
    • HELPLESS EXPLOITED
    • STUPID
    • PUT DOWN
  • 20. Warning signs
    • Sadness or anger after Internet use.
    • Withdrawal from friends and activities.
    • School avoidance, decline in grades, and depression.
    • Indications the child is being bullied at school.
  • 21. IT IS A CRIME!!!
    • HARASSMENT
    • Post something in public
    • 3rd Degree Misdemeanor – 1 year in jail $2,500 fine
    • STALKING
    • Several communications are sent directly to victim
    • 1st Degree Misdemeanor – 5 Years in jail $10,000 fine
  • 22. Some recent cyber bullying cases in the news
    • Ryan Halligan – 13yrs old, VT
    • Classmates spread rumors he was GAY
    • Female befriended him for his secrets
    • Posted to internet
    • Committed suicide
    • Ghyslain Raza – “Star Wars Kid”, Canada
    • Overweight and slightly awkward teenager
    • Video of himself playing with a play light saber
    • Classmates found & posted to internet
    • Finished school year in a Psychiatric ward
    • Internets most downloaded video 2006
  • 23. Megan Meier
    • Megan – 13yrs old, Missouri
    • - Suffered from depression and attention disorder
    • Met Josh Evans 16 – Cyber friend on her MySpace site
    • Josh ended their friendship – heard she was cruel
    • Electronic postings about her “fat”, “slut”
    • “ This world would be better off without her”
    • Committed suicide Oct 16, 2006
  • 24. Megan Meier
    • Lori Drew – 49 yrs old, Mo
    • Aka – Josh Evans with co-conspirators - Ashley Grills.
    • May 15, 2008 Indicted – Federal Grand Jury
    • One count conspiracy. (5yrs)
    • Three counts accessing protected computers without authorization. (5yrs ea count)
    • Fraudulently use of an account – to cause harm.
    • Violated MySpace “terms of Service”.
    • Grand Jury in Los Angeles, Ca – Jurisdiction
    • Ashley Grills – granted immunity.
  • 25. Terms of use
    • Cyber bullying is a violation of the
    • "terms of use" of most service providers.
    • – Will respond by removing such harmful content and terminating the membership of the offending poster.
    • – But educators, parents, and students must file a complaint.
    • File a complaint by providing the harmful messages and ask that the account be terminated and any harmful material be removed.
  • 26. Cyber threats
    • Threats or distressing material.
    • General statements that make it sound like the writer is emotionally upset and may consider harming someone else, harming himself or herself, or committing suicide.
  • 27. Have you heard of..
    • Jeff Weise
    • Pekka-Eric Auvinen
    • Dillon Cossey
    • Dylan Klebold & Eric Harris
  • 28. How about now?
    • Jeff Weise - Red Lake
    • Pekka-Eric Auvinen - Jokela
    • Dillon Cossey – Plymouth - Whitemarsh
    • Dylan Klebold & Eric Harris - Columbine
  • 29. What can we do?
    • We can not control the children – we must educate.
    • • Balanced approach – policies may be too rigid.
    • • Set rules and limits to Internet use.
    • • Guide students to GOOD content/ethical usage.
    • • Help Teachers and Parents educate children abut safe, responsible uses of the internet.
    • • Foster appropriate use of the internet among preschoolers and other young students
  • 30. What else…
    • Use the Internet for education-related activities and not recreational use or as a baby sitter.
    • • Use the Internet to communicate to the parents and students. (websites, homework, e-mail)
    • • Engage the community.
  • 31. Situation review
    • Imminent Threat of Violence or Danger.
    • • Gather evidence – screen shots, emails..
    • • Violence or suicide Assessment.
    • • Cyber bully Assessment – can the school respond?
  • 32. What can teachers do?
    • Communicate with students
    • • Communicate with other educators / Lawyer
    • • Communicate with IT
    • • Communicate with the police
    • • Communicate with the parents
    • Contact the Service provider
    • • Confront students who are behaving in
    • irresponsible, inappropriate, or unsafe
    • ways. * Do not look the other way*
  • 33. Student’s perspective
    • Utah student creates video and wins
    • “predator”
  • 34. Resources
    • http://www.stopbullyingnow.hrsa.gov/
    • http://www.cyberbully.org/
    • http://www.ncpc.org/cyberbullying
    • http://www.cyberbullying.us/
    • http://123elearning.wikispaces.com/cyberbullying+presentation
    • http://123elearning.wikispaces.com/onlinesafety
    • http://www.ikeepsafe.org/iksc_kids/
    • http://www.ftc.gov/bcp/conline/edcams/kidzprivacy/
    • http://www.cybersmartkids.com.au/
    • http://www.protectkids.com/
    • http://www.ftc.gov/bcp/conline/edcams/kidzprivacy/kidz.htm
    • http://www.safesurf.com/
    • http://www.cybersmart.org/for/students.asp
    • http://www.isafe.org/
    • http://www.webwisekids.org/
    • http://kidshealth.org/parent/positive/family/net_safety.html
    http://www.cscic.state.ny.us