Your SlideShare is downloading. ×
0
Tie  digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullying
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Tie digital citizenship project cyberbullying

1,263

Published on

This presentation is about the effects of cyberbullying and how to help stop it.

This presentation is about the effects of cyberbullying and how to help stop it.

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,263
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
11
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Cyberbullying<br />By Sarah Swearingen<br />
  • 2. Definition<br />"Cyberbullying" is when a child, preteen or teen is <br />tormented, threatened, harassed, humiliated, embarrassed <br />or otherwise targeted by another child, preteen or teen using <br />the Internet, interactive and digital technologies or mobile <br />phones. It has to have a minor on both sides, or at least have <br />been instigated by a minor against another minor. Once <br />adults become involved, it is plain and simple cyber-<br />harassment or cyber-stalking. Adult cyber-harassment or <br />cyber-stalking is NEVER called cyberbullying (Parry).<br />
  • 3. How it Works<br />There are two kinds of cyberbullying, direct attacks<br />(messages sent to your kids directly) and cyberbullying by <br />proxy (using others to help cyberbully the victim, either with <br />or without the accomplice's knowledge). Because <br />cyberbullying by proxy often gets adults involved in the <br />harassment, it is much more dangerous (Parry).<br />
  • 4. Direct Attack Examples<br />Instant Messaging/Text Messaging<br />Stealing Passwords<br />Blogs<br />Websites<br />Sending Pictures through E-mail and Cell Phones<br />Internet Polling<br />Interactive Gaming<br />Sending Malicious Code<br />Sending Porn and Other Junk E-mail<br />Impersonation<br />(Parry).<br />
  • 5. Cyberbullying by Proxy<br />Cyberbullying by proxy is when a cyberbully gets someone<br />else to do their dirty work. Most of the time they are<br />unwitting accomplices and don't know that they are being <br />used by the cyberbully. Cyberbullying by proxy is the most <br />dangerous kind of cyberbullying because it often gets adults <br />involved in the harassment and people who don't know they<br />are dealing with a kid or someone they know (Parry).<br />
  • 6. Cyberbullying by Proxy Examples<br />"Warning" or "Notify Wars" are an example of cyberbullying<br />by proxy. Kids click on the warning or notify buttons on their <br />IM screen or e-mail or chat screens, and alert the ISP or <br />service provider that the victim has done something that <br />violates their rules. If the victim receives enough warnings or <br />notifications, they can lose their account. The service <br />providers are aware of this abuse, and often check and see if <br />the warning were justified. But all the cyberbully has to do is <br />make the victim angry enough to say something rude or <br />hateful back. Then, BINGO! they warn them, making it look <br />like the victim had started it. In this case, the ISP or service <br />provider is the innocent accomplice of the cyberbully <br />(Parry).<br />
  • 7. Cyberbullying<br />It is so important to protect and educate young people on <br />using the Internet and to provide all users with a safe <br />experience. How do you address “cyber-bullying”? Do you <br />look at how individuals function in their family, school and <br />work communities, how people deal with drama or politics, <br />or how they treat others and present themselves? Or do you <br />look at the parenting and teaching skills being presented in <br />these individual lives (Cyberbullying Research Center, 2010)?<br />
  • 8. Prevention<br />To begin a successful decline in cyber-bullying education and <br />interventions need to focus on building empathy, identifying <br />escalation and techniques for stopping the cycle of abuse. <br />Environments at home and school need to be one where <br />people don’t get validated for negative attention and where <br />they don’t see relationship drama as part of normal life<br />(Collier, 2011).<br />
  • 9. Prevention<br />The Internet is not the problem here, as much as people <br />think it is, it is just a tool in an ongoing battle for attention, <br />validation, and status. Unless teachers and parents find <br />effective ways of getting to the root of this problem, at home <br />and in the classroom, the Internet will just continue to be <br />used to reinforce what is pervasive offline. Cyber-bullying <br />didn't come from out of nowhere, it is not new, and it is <br />something school counselors, teachers, parents and risk-<br />prevention practitioners among us do understand (Collier, <br />2011).<br />
  • 10. Prevention<br />When it comes to cyber-bullying we need to take the focus <br />off of technology and put it on the social and environmental <br />conditions that give rise to social cruelty offline as well as <br />online. To defeat cyber-bullying, we need to create home and <br />school cultures that encourage critical thinking about the <br />right and wrong kinds of attention, validation, and status-<br />seeking; teach perspective-taking; and cultivate self-worth, <br />resilience, and a sense of belonging (Collier, 2011).<br />
  • 11. References<br />Collier, Anne. (2011). Understanding cyber-bullying from the inside out. Retrieved from http://www.connectsafely.org/Safety-Advice-Articles/understanding-cyberbullying-from-the-inside-out.html<br />Parry. Stop cyberbullying. Retrieved from http://www.stopcyberbullying.org/what_is_cyberbullying_exactly.html<br />(**this website was really hard to site because they did not list the author or the copyright)<br />(2010). Cyberbullying research center.Retrieved from http://www.cyberbullying.us/<br />Twyman, Kimberly. (2010). Comparing Children and Adolescents Engaged in Cyberbullying to Matched Peers. Retrieved from http://ehis.ebscohost.com.jvlapps.nsuok.edu/ehost/pdfviewer/pdfviewer?vid=2&hid=5&sid=0d08118f-b15b-4eb8-84f3-7dc3f47a4b71%40sessionmgr14<br />
  • 12. Test Questions<br />What is Direct Attack Cyberbullying?<br />What is Cyberbullying by Proxy?<br /> True or False: The Internet is not the problem, it is just a tool in an ongoing battle for attention, validation, and status. <br />
  • 13. Answers<br />Direct Attack Cyberbullying is when threats or harassment is sent directly to the child through text messages, E-mail, websites or impersonation.<br />Cyberbullying by proxy is when a cyberbully gets someone else to do their dirty work. Cyberbullying by Proxy is the most dangerous type of cyberbullying.<br />TRUE.<br />

×