Cyberbullying year7


Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Cyberbullying year7

  1. 1. Cyberbullying
  2. 2. What is bullying? <ul><li>Behaviour by an individual or group, repeated over time, that intentionally hurts another individual or group. </li></ul>
  3. 3. What is cyberbullying? <ul><li>The use of phones or the internet to deliberately upset someone else. </li></ul>
  4. 4. Is there a difference? <ul><li>Cyberbullying has a much bigger audience, no closure and no escape from the bully. Other people might not know the impact they have. </li></ul>
  5. 5. Who is a cyberbully? <ul><li>Someone who deliberately sends this hurtful information. Why do you think they do this? </li></ul><ul><li>Someone who passes the message/image on to someone else. (An ‘accessory’) What is a ‘bystander to bullying’? </li></ul><ul><li>Someone who sends the message thinking it is only a joke. </li></ul>
  6. 6. Examples of cyberbullying <ul><li>Threats </li></ul><ul><li>Harassment repeatedly sending unwanted messages </li></ul><ul><li>Sending nasty messages </li></ul><ul><li>Impersonation </li></ul><ul><li>Sending upsetting images </li></ul>
  7. 7. Direct cyberbulling <ul><li>Direct attack to the victim via email, IM, blog </li></ul><ul><li>Warning war – fake squealing on someone </li></ul><ul><li>Text war </li></ul><ul><li>Photoshopped pictures sent or posted as real pics </li></ul><ul><li>Using a stolen password to lock out the rightful owner and then hijack the account for nasty purposes </li></ul><ul><li>Create a poll or survey to vote on who is nice or ugly </li></ul><ul><li>Ganging up against a player in a game </li></ul>
  8. 8. Direct cyberbulling <ul><li>Post pictures without permission and ask others to rate who is fat or ugly </li></ul><ul><li>Ridiculing on web sites, blogs, IM </li></ul><ul><li>Pretend to be a friend, share secrets and publicise the secrets </li></ul><ul><li>Arrange to socially ostracise or ignore someone </li></ul><ul><li>Create and share insulting code names for people (uf=ugly face) </li></ul>
  9. 9. Direct cyberbulling <ul><li>Tease </li></ul><ul><li>Taunt </li></ul><ul><li>Insult </li></ul><ul><li>Threaten the victim or a member of the victim's family </li></ul><ul><li>Impersonate someone else </li></ul><ul><li>Spread rumours (true or not) </li></ul><ul><li>Post clips on YouTube without permission </li></ul>
  10. 10. Cyber-bullying by proxy <ul><li>The bully instigates others by creating indignation or strong emotion, and then lets others do their dirty work. </li></ul><ul><li>The “ forwarding” accomplice </li></ul>
  11. 11. Characteristics of Cyberbullying <ul><li>Unequal power </li></ul><ul><li>Hurtful actions </li></ul><ul><li>Repetitive behaviours </li></ul><ul><li>Bully can remain anonymous </li></ul><ul><li>Bully can pretend to be another person </li></ul><ul><li>Bullying can happen anywhere,anytime , given that cyber-space is everywhere all of the time </li></ul><ul><li>Bullying can take many forms within the cyberspace environment </li></ul><ul><li>Capacity for instant and limitless dissemination of words and images </li></ul><ul><ul><li>Kids Help Phone Cyber--bullying Study, April 2007 </li></ul></ul>
  12. 12. How common is cyberbullying ? <ul><li>90% of middle school students have had their feelings hurt online. </li></ul><ul><li>75% have visited a Web site bashing another student. </li></ul><ul><li>40% have had their password(s) stolen and changed by a bully. </li></ul><ul><li>Only 15% of parents asked knew what cyberbullying was. </li></ul>Source:
  13. 13. Vehicles for cyberbullying <ul><li>Email </li></ul><ul><li>IM – MSN </li></ul><ul><li>Social networking sites – Facebook </li></ul><ul><li>Web sites </li></ul><ul><li>Chat rooms </li></ul><ul><li>Virtual learning environments – school work sites </li></ul><ul><li>Mobile phones </li></ul><ul><li>Camera phones </li></ul><ul><li>On line and interactive games </li></ul><ul><li>Blogs & Wikis </li></ul><ul><li>Bashing site – Rate My School </li></ul><ul><li>Internet polling – Doodle </li></ul>
  14. 14. Divagirl: Hey, loser, watch your back. tmt323: What r u talking about? Divagirl: Why don't you kill yourself while u r ahead? tmt323: Why can't you just leave me alone? Divagirl: Ugly girls like u need to be put in their place. Example of cyberbullying on iChat (Apple’s instant messaging)
  15. 15. If you receive a nasty message… <ul><li>Save it. </li></ul><ul><li>Do not reply. </li></ul><ul><li>Block future messages. </li></ul><ul><li>Show it to your parents/carer or teacher . </li></ul>
  16. 16. Cyberbullying can be reported through: <ul><li>Mobile phone companies, </li></ul><ul><li>Internet service providers and </li></ul><ul><li>Social networking sites –myspace </li></ul>
  17. 17. The Law <ul><li>There are laws which may apply in terms of: </li></ul><ul><ul><li>harassment and </li></ul></ul><ul><ul><li>threatening and menacing communications. </li></ul></ul><ul><li>Your school could contact the police if they feel a law has been broken </li></ul>
  18. 18. The Anti-Cyberbullying Code <ul><li>Always respect others. </li></ul><ul><li>Think before you send. </li></ul><ul><li>Block the Bully. </li></ul><ul><li>Don’t retaliate or reply. </li></ul><ul><li>Save the evidence. </li></ul><ul><li>Make sure you tell. </li></ul><ul><li>Treat your password like your toothbrush. </li></ul><ul><li>From DCSF guidance on Cyberbullying </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.