The Hazards Of Cyberbullying


Published on

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

The Hazards Of Cyberbullying

  1. 1. The Hazards of Cyberbullying <ul><li>Mahmud Shihab </li></ul><ul><li>International College </li></ul><ul><li>2007-2008 </li></ul>
  2. 2. WHAT IS IT? Cyberbullying is sending or posting harmful or cruel text or images using the Internet or other digital communication devices.
  3. 3. What Does It Look Like? <ul><li>Sending cruel, vicious, and sometimes threatening messages by email or SMS. </li></ul><ul><li>Creating web sites that have stories, cartoons, pictures, and jokes ridiculing others. </li></ul><ul><li>Writing insulting messages using social networking sites like Facebook and MySpace. </li></ul><ul><li>Breaking into an e-mail account and sending vicious or embarrassing material to others. </li></ul>
  4. 4. What Does It Look Like? <ul><li>Engaging someone in IM (instant messaging), tricking that person into revealing sensitive personal information , and forwarding that information to others. </li></ul><ul><li>Taking a picture of a person in an inappropriate situation using a digital phone camera and sending that picture to others. </li></ul>
  5. 5. The Vocab of Cyberbullying Occurs <ul><li>Flaming : sending angry , rude or vulgar messages directed at target of choice </li></ul><ul><li>Harassment : repeatedly sending an individual offensive and sensitive messages </li></ul><ul><li>Cyberstalking : harassment that is highly intimidating or includes threats of harm </li></ul>
  6. 6. <ul><li>Denigration : Sending or posting harmful, untrue or cruel statements about a person to other people </li></ul><ul><li>Masquerade : Pretending to be someone else and sending or posting material that makes that person look bad or places that person in potential danger </li></ul><ul><li>“ outing ”: Sending or posting material about a person that contains sensitive, private or embarrassing information ; material often acquired via trickery </li></ul><ul><li>Disinhibition : The tendency for technology to create the illusion of invisibility, users may be able to create a level of anonymity which promotes the mindset that they can do or say anything they want without the risk of consequences </li></ul>
  7. 7. IMPACT OF CYBERBULLYING <ul><li>Low self-esteem </li></ul><ul><li>Anger </li></ul><ul><li>Depression </li></ul><ul><li>School failure/avoidance </li></ul><ul><li>School violence </li></ul><ul><li>Anxiety </li></ul><ul><li>Long term psychological harm </li></ul><ul><li>Suicide </li></ul>
  8. 8. Legal Cases <ul><li>Grounds for suits: </li></ul><ul><li>- defamation </li></ul><ul><li>- invasion of privacy </li></ul><ul><li>- intentional infliction of emotional distress </li></ul><ul><li>In the U.S. Parents of cyberbullies can be held financially liable for the acts of their children. </li></ul>
  9. 9. How Might You Know If Someone Is Being Cyberbullied? <ul><li>Long hours on the computer </li></ul><ul><li>Closes windows on their computer when you enter the room </li></ul><ul><li>Is secretive about internet activities </li></ul><ul><li>Behavioral changes </li></ul><ul><li>Won’t say who they are talking to </li></ul><ul><li>May find unexplained pictures on computer </li></ul><ul><li>Trouble sleeping </li></ul><ul><li>Stomach and Lack of appetite </li></ul><ul><li>Headaches </li></ul><ul><li>Hesitate or resistant to leaving home </li></ul>
  10. 10. What Should Be Done When Cyberbullying Is Known To Be Occurring? <ul><li>Conduct a threat assessment </li></ul><ul><li>Save all messages as evidence on the target computer </li></ul><ul><li>Inform the internet service provider ( ISP ) </li></ul><ul><li>Inform the local police </li></ul><ul><li>Support the victim </li></ul><ul><li>Contact the school counselor </li></ul>
  11. 11. What A Cyberbullying Victim Should NOT Do ? <ul><li>Do not reply to messages from </li></ul><ul><li>cyberbullies </li></ul><ul><li>Do not delete messages from </li></ul><ul><li>cyberbullies </li></ul><ul><li>Do not agree to meet with a </li></ul><ul><li>cyberbully </li></ul>
  12. 12. HELPFUL SOFTWARE <ul><li>EmailTrackerPro : allows you to track emails back to the IP address of the sender, allows full internet traces on demand </li></ul><ul><li>McAfee Parental Controls : offers chat filtering protection for both instant messaging and chat rooms </li></ul>
  13. 13. Questions or Comments?