Inquiry project presentation

97 views
70 views

Published on

THis is something

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
97
On SlideShare
0
From Embeds
0
Number of Embeds
37
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Inquiry project presentation

  1. 1. Cyberbullying By Samara and Michelle
  2. 2. How does cyberbullying connect to our Central Idea? ❖ ❖ ❖ When the cyberbully uses his/her power to hurt others then it will affect relationships as no one will like that particular person. It affects access to opportunities because your employer could easily trace your digital footprints. If you’ve been harmful then there’s a good chance you won’t get accepted. The cyberbully has the power, they can have consequences by getting in trouble. Our main inquiry is power through cyberbullying.
  3. 3. Main Questions: What is our responsibility if we get we get cyber bullied? How does cyberbullying work?
  4. 4. What we found out Answers to our questions (Samara) When get cyber bullied you should/should not ● write back ● block cyberbullies from your computer ● if the cyberbully goes to your school contact the vice principal ● Tell a friend or adult you trust This answer connects to our unit because: ● The cyberbully has the power ● If someone follows these tips ● Affecting relationships ● cyberbully can lose access to opportunities
  5. 5. What we found out Answers to our questions (Michelle) Cyberbullying comes in three different categoriesDirect Attacks consist of: ● Threatening texts, IMs or emails ● Creating websites that could be harmful to others Cyberbullying-by-proxy attacks consist of: ● Misusing the internet by targeting others (accomplices) to do for them ● Stealing the password of others and locking them out of their own account Posting humiliating information and images
  6. 6. Video Primary and secondary resources Brain Pop video on Digital Etiquette: www.brainpop.com/technology/computersandinternet/digitaletiquette/ Video
  7. 7. Taking Action Reflecting on our learning: Reflecting on our learning… What we can do to take action...
  8. 8. Credits Our Resources www.brainpop.com/technology/computersandinternet/digitaletiquette/ Video for slide Finding Out (BrainPop) and Photo’s. http://www.bullyingstatistics.org/content/text-bullying.html Information-Cyber Bullying http://www.helpguide.org/mental/cyber-bullying.htm Information- Cyber Bullying http://thumbs.dreamstime.com/z/computer-cyber-bullying-hands-security-theft-16479290.jpg Image (Title Page) http://www.simplyclick.net/sc/website/cyberbullying_by_proxy.html Information-Cyber Bullying http://www.webroot.com/us/en/home/resources/tips/cyberbullying-online-predators/safety-my-child-is-being-cyberbullied Information-Cyber Bullying

×