Keenright591 Interactive Presentation

283 views

Published on

This is a lesson for studnets to learn about cyberbullying.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
283
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Keenright591 Interactive Presentation

  1. 1. Cyberbullying
  2. 2. What is cyberbullying? Cyberbullying in any kind of negative virtual communication.
  3. 3. There are many ways to bully someone other than just sending them a message.
  4. 4. Ways of Cyberbullying <ul><li>Instant Messaging </li></ul><ul><li>Stealing passwords </li></ul><ul><li>Blogs </li></ul><ul><li>Web Sites </li></ul><ul><li>Sending pictures through phones and email </li></ul><ul><li>Sending malicious code </li></ul><ul><li>Impersonations </li></ul><ul><li>Prevention </li></ul>
  5. 5. Instant messaging Sending threatening messages through IM’s or texting. Sending warning messages not to tell on them. Creating screen names that are 1 letter away from someone else’s screen name and sending offensive messages Texting wars and death threats
  6. 6. Stealing passwords Student’s may steal passwords and access other’s accounts to send offensive messages to anger them. Students may gain access to an account and then change the settings to lock them out.
  7. 7. Blogs Blogs are used as online journals to write damaging thing about someone’s reputation.
  8. 8. Web Sites Web sites are created to insult another student or a group of students. Students also post pictures and personal information about other students.
  9. 9. Sending pictures through cell phones and email Sending degrading photos through e-mails; the emails can then be passed around to hundreds of emails within hours. New cell phones are now able to send photos and can be spread to an entire address book at once.
  10. 10. Sending Malicious Code Student send viruses, spyware and hacking programs to other computers as a form of harassment. Some programs can even give the student access to a victims computer.
  11. 11. Impersonation When a student impersonates another students they usually do this in a chat room. The students reveals personal information that could include name, address and phone number. This could lead to an attack on the victim.
  12. 12. Prevention Understand that teasing, threats and taking over someone’s identity are all forms of bullying. If this happens to you report the behaviors to an adult. Parents
  13. 13. Parents Tell you parents. Parents need to inform you school counselor of the cyberbullying. Parents need to tell your doctor. It may be necessary to have counseling until the problems are resolved. Netiquette
  14. 14. <ul><li>Netiquette </li></ul><ul><li>Never send your name, address or phone number to someone on the internet </li></ul><ul><li>Don’t send out an email when you are mad; wait and reread it when you are calm. </li></ul>Go to Quiz
  15. 15. <ul><li>What is one way that someone could use their cell phone to cyberbully? </li></ul><ul><li>Call their mom </li></ul><ul><li>Send you a threatening message </li></ul><ul><li>Call information </li></ul>
  16. 16. Go read for the answer again. Read here
  17. 17. Instant messaging Sending threatening messages through IM’s or texting. Sending warning messages not to tell on them. Creating screen names that are 1 letter away from someone else’s screen name and sending offensive messages Texting wars and death threats Go back to question
  18. 18. NEXT QUESTION
  19. 19. <ul><li>Stealing passwords could not allow someone to: </li></ul><ul><li>Access my account </li></ul><ul><li>Be good at playing games </li></ul><ul><li>Send emails under my account without my knowledge </li></ul>
  20. 20. Go read for the answer again. Read here
  21. 21. Stealing passwords Student’s may steal passwords and access other’s accounts to send offensive messages to anger them. Students may gain access to an account and then change the settings to lock them out. Go back to question
  22. 22. NEXT QUESTION
  23. 23. <ul><li>These can be created to post pictures on the internet: </li></ul><ul><li>Channels </li></ul><ul><li>Web sites </li></ul><ul><li>Stations </li></ul>
  24. 24. Go read for the answer again. Read here
  25. 25. Web Sites Web sites are created to insult another student or a group of students. Students also post pictures and personal information about other students. Go back to question
  26. 26. NEXT QUESTION
  27. 27. <ul><li>What can spread pictures and information the fastest? </li></ul><ul><li>Mail </li></ul><ul><li>Word of Mouth </li></ul><ul><li>Computers </li></ul><ul><li>Cell Phones </li></ul><ul><li>Both C & D </li></ul>
  28. 28. Go read for the answer again. Read here
  29. 29. Sending pictures through cell phones and email Sending degrading photos through e-mails; the emails can then be passed around to hundreds of emails within hours. New cell phones are now able to send photos and can be spread to an entire address book at once. Go back to question
  30. 30. NEXT QUESTION
  31. 31. <ul><li>What can happen if someone gets into your computer? </li></ul><ul><li>They can send your personal information to other recipients </li></ul><ul><li>A virus could be sent to infect your computer </li></ul><ul><li>Someone would be able to act like you in a chat room. </li></ul><ul><li>A & C </li></ul><ul><li>All of the above </li></ul>
  32. 32. Go read for the answer again. Read here
  33. 33. Sending Malicious Code Student send viruses, spyware and hacking programs to other computers as a form of harassment. Some programs can even give the student access to a victims computer. Go back to question Impersonation When a student impersonates another students they usually do this in a chat room. The students reveals personal information that could include name, address and phone number. This could lead to an attack on the victim.
  34. 34. NEXT PAGE
  35. 35. Congratulations you have just finished your Cyberbullying training.

×