Your SlideShare is downloading. ×
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Keenright591 Interactive Presentation
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Keenright591 Interactive Presentation

191

Published on

This is a lesson for studnets to learn about cyberbullying.

This is a lesson for studnets to learn about cyberbullying.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
191
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Cyberbullying
  • 2. What is cyberbullying? Cyberbullying in any kind of negative virtual communication.
  • 3. There are many ways to bully someone other than just sending them a message.
  • 4. Ways of Cyberbullying
    • Instant Messaging
    • Stealing passwords
    • Blogs
    • Web Sites
    • Sending pictures through phones and email
    • Sending malicious code
    • Impersonations
    • Prevention
  • 5. Instant messaging Sending threatening messages through IM’s or texting. Sending warning messages not to tell on them. Creating screen names that are 1 letter away from someone else’s screen name and sending offensive messages Texting wars and death threats
  • 6. Stealing passwords Student’s may steal passwords and access other’s accounts to send offensive messages to anger them. Students may gain access to an account and then change the settings to lock them out.
  • 7. Blogs Blogs are used as online journals to write damaging thing about someone’s reputation.
  • 8. Web Sites Web sites are created to insult another student or a group of students. Students also post pictures and personal information about other students.
  • 9. Sending pictures through cell phones and email Sending degrading photos through e-mails; the emails can then be passed around to hundreds of emails within hours. New cell phones are now able to send photos and can be spread to an entire address book at once.
  • 10. Sending Malicious Code Student send viruses, spyware and hacking programs to other computers as a form of harassment. Some programs can even give the student access to a victims computer.
  • 11. Impersonation When a student impersonates another students they usually do this in a chat room. The students reveals personal information that could include name, address and phone number. This could lead to an attack on the victim.
  • 12. Prevention Understand that teasing, threats and taking over someone’s identity are all forms of bullying. If this happens to you report the behaviors to an adult. Parents
  • 13. Parents Tell you parents. Parents need to inform you school counselor of the cyberbullying. Parents need to tell your doctor. It may be necessary to have counseling until the problems are resolved. Netiquette
  • 14.
    • Netiquette
    • Never send your name, address or phone number to someone on the internet
    • Don’t send out an email when you are mad; wait and reread it when you are calm.
    Go to Quiz
  • 15.
    • What is one way that someone could use their cell phone to cyberbully?
    • Call their mom
    • Send you a threatening message
    • Call information
  • 16. Go read for the answer again. Read here
  • 17. Instant messaging Sending threatening messages through IM’s or texting. Sending warning messages not to tell on them. Creating screen names that are 1 letter away from someone else’s screen name and sending offensive messages Texting wars and death threats Go back to question
  • 18. NEXT QUESTION
  • 19.
    • Stealing passwords could not allow someone to:
    • Access my account
    • Be good at playing games
    • Send emails under my account without my knowledge
  • 20. Go read for the answer again. Read here
  • 21. Stealing passwords Student’s may steal passwords and access other’s accounts to send offensive messages to anger them. Students may gain access to an account and then change the settings to lock them out. Go back to question
  • 22. NEXT QUESTION
  • 23.
    • These can be created to post pictures on the internet:
    • Channels
    • Web sites
    • Stations
  • 24. Go read for the answer again. Read here
  • 25. Web Sites Web sites are created to insult another student or a group of students. Students also post pictures and personal information about other students. Go back to question
  • 26. NEXT QUESTION
  • 27.
    • What can spread pictures and information the fastest?
    • Mail
    • Word of Mouth
    • Computers
    • Cell Phones
    • Both C & D
  • 28. Go read for the answer again. Read here
  • 29. Sending pictures through cell phones and email Sending degrading photos through e-mails; the emails can then be passed around to hundreds of emails within hours. New cell phones are now able to send photos and can be spread to an entire address book at once. Go back to question
  • 30. NEXT QUESTION
  • 31.
    • What can happen if someone gets into your computer?
    • They can send your personal information to other recipients
    • A virus could be sent to infect your computer
    • Someone would be able to act like you in a chat room.
    • A & C
    • All of the above
  • 32. Go read for the answer again. Read here
  • 33. Sending Malicious Code Student send viruses, spyware and hacking programs to other computers as a form of harassment. Some programs can even give the student access to a victims computer. Go back to question Impersonation When a student impersonates another students they usually do this in a chat room. The students reveals personal information that could include name, address and phone number. This could lead to an attack on the victim.
  • 34. NEXT PAGE
  • 35. Congratulations you have just finished your Cyberbullying training.

×