SlideShare a Scribd company logo
1 of 25
Cyber Bullying




     Level 7
Hey It’s Me Again!
  I’m Tek – your i-SAFE guide.
  I’m a part of i-SAFE America.
  i-SAFE is concerned with
     teaching you how to be safe
     online.

  We want you to recognize and
   avoid dangerous, destructive or
   unlawful online behavior.

  Also, we hope to empower you to
    communicate what you learn
    from i-SAFE with others.
All right – Let’s talk Empowerment

              Remember -
               Empowerment means
               you own what you
               learn and can use it to
               teach others and make
               a difference.
i-SAFE includes an empowerment activity in
every lesson. By completing the activity you
may be eligible for neat incentives and prizes.
Check it out at www.isafe.org – Click
on the link to contests and Incentives.


So not only are you learning and
sharing, you are getting rewarded for
doing so!


   Empowerment is the Key to Learning!
The Plan
In this lesson, you will be learning
about cyber bullying and
netiquette. You will be
developing articles or brochures
on the concepts of being
considerate online, etc.
All Right – Let’s Get Started

 Make sure you have a copy of the activity
 page called The Cyber Bullying Fact Sheet
We will be using it to learn more about Cyber
                     Bullying.
Time to Brainstorm

1. What is bullying?
3. Why do people act as bullies?
5. What are some things that a bully might do?
7. What are examples of things a cyber bully might do?
9. Have any of you had incidents in which you were
   bullied?
11. Have you had experiences with a cyber bully?
Let’s Take a Closer Look at
the Cyber Bullying Fact Sheet
"All cruelty springs from weakness.” (Seneca, 4BC-
                        AD65)

Bullying has become an online event as well as a
physical one. Intimidation online can be just as bad,
and in some cases worse, than when bullying occurs
in the physical community.
Bullying
Bullies are those people who gain
gratification (a sense of happiness) when
they have provoked or tormented others.
They feel better by making others feel worse.
 Cyber bullies are those bullies who use the
Internet to be mean to others.
Bullying
E-mail provides one method of communication for
these bullies.
Flame mail – mail designed to make another
person mad – is used along with hate mail – mail
that shows racism, sexism, or other prejudices.

Another way bullies use the Internet is through
bulletin boards and chat sites to make their
comments public.

Finally, some cyber bullies build websites devoted
to making a person or persons feel bad.
Think About It!
Do you think it’s a sign of strength
  or weakness to use the Internet
        for bullying? Why?
Tell someone. Don’t keep this to yourself. Tell a trusted adult
  about the bullying.
Don’t open or read messages by Cyber bullies.
Tell the police if threatened.
Tell your Internet Service Provider.
Tell your school if it is school related. Schools have a bullying plan
  in place.
Don’t erase the messages – they may be needed to take action.
  Instead, put them in a folder unread.
Protect yourself – never agree to meet with the person or with
   anyone you meet online.
If bullied through chat or instant messaging, the “bully” can often
   be blocked. Tell someone!
Don’t give out private information such as
passwords, pins, name, address, phone number,
school name, or family and friends names. This
information can be used by bullies and other
harmful people on the Internet.
Use Netiquette. Be polite online and others will
tend to do the same. If someone does get angry
or bullies you, ignore them – online Cyber bullies
want a reaction just like other bullies.
Don’t send a message when you are angry – it is
hard to undo things that are said in anger.
Delete messages from people you don’t know or
from people who seem angry or mean.
When something doesn’t seem right, it probably
isn’t. Get out of the site, chat, etc.
The best defense to keep
     from being a bully online:
         Use Netiquette.
Be polite online and others will tend to do the same.
  If someone does get angry or bullies, ignore them –
  online bullies want a reaction.
Think about ways to apply E-mail netiquette to the
  following:
Subject lineS                    AttAchmentS
ForwArded meSSAgeS               SpAm
chAin letterS                    hoAxeS
Your originAl meSSAgeS
Chatroom Netiquette
Many of the same conventions that
apply to newsgroups and e-mail are
also relevant in chatrooms. You're still
just typing your thoughts and sending
them to people, but in a chatroom
they're just a little quicker to respond.
While chatting:
1. Avoid Using ALL CAPS - It’s considered yelling.
3. Decide What Tone the Conversation Has
   Before Posting - Don't use offensive language or
   nicknames. Always avoid making personal
   attacks and calling names.
5. Don't "Flood" the Chatroom - Flooding is
   repeating messages over and over, or filling the
   screen with gibberish, in order to impede
   communication in the chatroom.
7. Be Nice to Newbies - Remember your first chats?
   If someone stumbles into your chat, who is
   obviously new to this medium, show some
   patience and help him or her get the hang of it.
Resources for your
           Community
 What resources are available at your
 school level?
What is your school’s anti-bullying plan?
What are resources in your community?
Time for Group Work
Your teacher will divide you into groups for the
     next activity.
In your small groups, read the activity page and
     follow the directions to complete it.
1st - Read the letters you received. Some will be
     from bullies and some from victims.
2nd - Each group should then draft a response
     letter advising one of the letter writers.
     Incorporate information on local resources,
     help, advice, etc.
3rd - Once the responses are drafted, design an
     advice article or informational brochure about
     how to recognize and handle Cyber bullying.
Presentation Time
 Present your advice letters and brochure/article to
                      the class.




Then Discuss:
How could you make a difference in other peoples lives
 and help both cyber bullies and victims.
Refer to the Point to Ponder at the end of the Activity
    page:
If the problem of online bullying grows, what might be
    some consequences to freedom on the Internet?
How would those consequences affect you personally?
So How Do you Know When
        You’re Done???
Have you:
 1. Covered all the reference sheets?
 2. Discussed with your class what you
    have learned?
 3. Completed the Online And Helpless
    worksheet?
 4. Completed and shared your article or
    brochure?
It doesn’t have to end here!




  Find out about DRiVE!
Take Action
  It’s Easy with the i-Mentor Training Network!

Visit the Kids and Teens section at www.isafe.org
to learn about the i-Mentor Training Network.
It’s all online!

The i-Mentor Training Network has short
informative videos that will take you step by step
through the process of accomplishing any of the
i-SAFE Outreach activities you can do in your
school and community.

To watch the videos go to the i-Mentor Network
located in the Kids and Teens section of the
i-SAFE website at www.isafe.org.
Take Action
 It’s Easy with the i-Mentor Training Network!

The i-Mentor Training Network videos were
produced for students like you, who care about
online safety and want to DRiVE the message to
other students, parents, and community
members.

By watching the training videos you will become
a Certified i-Mentor and will be able to teach
students, conduct the i-SAFE assembly
experience, or be that important link to parents
and community leaders by presenting the i-
Parent Programs and Community Leaders
Meetings.
Get the recognition you deserve
      as an i-SAFE Mentor
        • Enroll online at www.isafe.org by clicking on
          Create an Account.
        • Go to the Kids and Teens Section and Submit
          the Online Mentor Menu.
        • Receive your own Student Toolkit and
          materials to get started.




            Take Action
               www.isafe.org

More Related Content

What's hot

Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Cyberbullying assignment
Cyberbullying assignmentCyberbullying assignment
Cyberbullying assignmentMichelle Urdiales
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Parenting & Education
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08E Robertson
 
E safety training for staff who work with children and young people - Stephe...
E  safety training for staff who work with children and young people - Stephe...E  safety training for staff who work with children and young people - Stephe...
E safety training for staff who work with children and young people - Stephe...Stevecd
 
April27 dyc
April27 dycApril27 dyc
April27 dycAlex Wills
 
Social media responsibility
Social media responsibilitySocial media responsibility
Social media responsibilityShwetaSBhatia
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican GuardApostolos Syropoulos
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Lesson 1
Lesson 1Lesson 1
Lesson 1danielle93
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bullingderekdreak
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingAntolduvai
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?""Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"DefinetheLine at McGill
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying griehl
 

What's hot (20)

Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Cyberbullying assignment
Cyberbullying assignmentCyberbullying assignment
Cyberbullying assignment
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
E safety training for staff who work with children and young people - Stephe...
E  safety training for staff who work with children and young people - Stephe...E  safety training for staff who work with children and young people - Stephe...
E safety training for staff who work with children and young people - Stephe...
 
April27 dyc
April27 dycApril27 dyc
April27 dyc
 
Social media responsibility
Social media responsibilitySocial media responsibility
Social media responsibility
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican Guard
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Parents must know about cyber bullying 1
Parents must know about cyber bullying 1Parents must know about cyber bullying 1
Parents must know about cyber bullying 1
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?""Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 

Viewers also liked

August 9 et
August 9  etAugust 9  et
August 9 etLive Angga
 
Webdesign
WebdesignWebdesign
WebdesignLive Angga
 
Hyperlinking
HyperlinkingHyperlinking
HyperlinkingLive Angga
 
Sketch up
Sketch upSketch up
Sketch upLive Angga
 
August 3, 2016 et
August 3, 2016 etAugust 3, 2016 et
August 3, 2016 etLive Angga
 
Infographics
InfographicsInfographics
InfographicsLive Angga
 
Presentation: K12 Teacher Empowerment and Professional Development
Presentation: K12 Teacher Empowerment and Professional DevelopmentPresentation: K12 Teacher Empowerment and Professional Development
Presentation: K12 Teacher Empowerment and Professional DevelopmentIntelCAG
 
Social Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional TracksSocial Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional Tracksglairerabida
 
Dll empowerment technologies
Dll empowerment technologiesDll empowerment technologies
Dll empowerment technologieswacasr12
 
Empowerment Technology
Empowerment TechnologyEmpowerment Technology
Empowerment TechnologyReygie Fabro
 
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...Arniel Ping
 
12 stages of film making
12 stages of film making12 stages of film making
12 stages of film makingharrisryan34
 
Film making powerpoint
Film making powerpointFilm making powerpoint
Film making powerpointlucyfroud999
 
EMPOWERMENT POWERPOINT
EMPOWERMENT POWERPOINT EMPOWERMENT POWERPOINT
EMPOWERMENT POWERPOINT Andrew Schwartz
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Arniel Ping
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologiesDeped
 

Viewers also liked (18)

August 9 et
August 9  etAugust 9  et
August 9 et
 
Webdesign
WebdesignWebdesign
Webdesign
 
Hyperlinking
HyperlinkingHyperlinking
Hyperlinking
 
Sketch up
Sketch upSketch up
Sketch up
 
August 3, 2016 et
August 3, 2016 etAugust 3, 2016 et
August 3, 2016 et
 
Infographics
InfographicsInfographics
Infographics
 
Presentation: K12 Teacher Empowerment and Professional Development
Presentation: K12 Teacher Empowerment and Professional DevelopmentPresentation: K12 Teacher Empowerment and Professional Development
Presentation: K12 Teacher Empowerment and Professional Development
 
Making short films
Making short filmsMaking short films
Making short films
 
Social Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional TracksSocial Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional Tracks
 
Dll empowerment technologies
Dll empowerment technologiesDll empowerment technologies
Dll empowerment technologies
 
Empowerment Technology
Empowerment TechnologyEmpowerment Technology
Empowerment Technology
 
Lesson 1 Empowerment Technology
Lesson 1 Empowerment TechnologyLesson 1 Empowerment Technology
Lesson 1 Empowerment Technology
 
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...
 
12 stages of film making
12 stages of film making12 stages of film making
12 stages of film making
 
Film making powerpoint
Film making powerpointFilm making powerpoint
Film making powerpoint
 
EMPOWERMENT POWERPOINT
EMPOWERMENT POWERPOINT EMPOWERMENT POWERPOINT
EMPOWERMENT POWERPOINT
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologies
 

Similar to Cyber bullying gr8

Teens on the net
Teens on the netTeens on the net
Teens on the nettalandronmmp
 
Social networking for schools
Social networking for schoolsSocial networking for schools
Social networking for schoolsElectricshepherds
 
Your Digital Footprint
Your Digital FootprintYour Digital Footprint
Your Digital FootprintMike Fisher
 
1 Cyberbullying introduction.pdf
1 Cyberbullying introduction.pdf1 Cyberbullying introduction.pdf
1 Cyberbullying introduction.pdfAryaStark56
 
Lesson 2 Netizenship and Netiquette in Online Communities
Lesson 2 Netizenship and Netiquette in Online CommunitiesLesson 2 Netizenship and Netiquette in Online Communities
Lesson 2 Netizenship and Netiquette in Online CommunitiesBadayosKarenJoyD
 
Etiquette in the Digital World
Etiquette in the Digital WorldEtiquette in the Digital World
Etiquette in the Digital Worldmgastgoodman
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
Fb training for student council
Fb training for student councilFb training for student council
Fb training for student councilJBridgeway
 
6 8-unit3-cyberbullyingcrossingtheline
6 8-unit3-cyberbullyingcrossingtheline6 8-unit3-cyberbullyingcrossingtheline
6 8-unit3-cyberbullyingcrossingthelinesgarza05
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette13sh
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette13sh
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette13sh
 
Slideshare netiquette p5
Slideshare netiquette p5Slideshare netiquette p5
Slideshare netiquette p5Jiggy-T
 
Dwe m4 cyber bullying and conflict resolution
Dwe m4   cyber bullying and conflict resolutionDwe m4   cyber bullying and conflict resolution
Dwe m4 cyber bullying and conflict resolutionData-Set
 
Digital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for GoodDigital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for GoodMindMake - Parenting & Education
 

Similar to Cyber bullying gr8 (20)

Teens on the net
Teens on the netTeens on the net
Teens on the net
 
Social networking for schools
Social networking for schoolsSocial networking for schools
Social networking for schools
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Skype lesson
Skype lessonSkype lesson
Skype lesson
 
Your Digital Footprint
Your Digital FootprintYour Digital Footprint
Your Digital Footprint
 
1 Cyberbullying introduction.pdf
1 Cyberbullying introduction.pdf1 Cyberbullying introduction.pdf
1 Cyberbullying introduction.pdf
 
Lesson 2 Netizenship and Netiquette in Online Communities
Lesson 2 Netizenship and Netiquette in Online CommunitiesLesson 2 Netizenship and Netiquette in Online Communities
Lesson 2 Netizenship and Netiquette in Online Communities
 
Etiquette in the Digital World
Etiquette in the Digital WorldEtiquette in the Digital World
Etiquette in the Digital World
 
ETECH Q1 Wk2.pptx
ETECH Q1 Wk2.pptxETECH Q1 Wk2.pptx
ETECH Q1 Wk2.pptx
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Fb training for student council
Fb training for student councilFb training for student council
Fb training for student council
 
6 8-unit3-cyberbullyingcrossingtheline
6 8-unit3-cyberbullyingcrossingtheline6 8-unit3-cyberbullyingcrossingtheline
6 8-unit3-cyberbullyingcrossingtheline
 
Digital SelfBLbd (1).pdf
Digital SelfBLbd (1).pdfDigital SelfBLbd (1).pdf
Digital SelfBLbd (1).pdf
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
NetiquetteOaks.pptx
NetiquetteOaks.pptxNetiquetteOaks.pptx
NetiquetteOaks.pptx
 
Slideshare netiquette p5
Slideshare netiquette p5Slideshare netiquette p5
Slideshare netiquette p5
 
Dwe m4 cyber bullying and conflict resolution
Dwe m4   cyber bullying and conflict resolutionDwe m4   cyber bullying and conflict resolution
Dwe m4 cyber bullying and conflict resolution
 
Digital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for GoodDigital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for Good
 

Recently uploaded

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Cyber bullying gr8

  • 1. Cyber Bullying Level 7
  • 2. Hey It’s Me Again! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be safe online. We want you to recognize and avoid dangerous, destructive or unlawful online behavior. Also, we hope to empower you to communicate what you learn from i-SAFE with others.
  • 3. All right – Let’s talk Empowerment Remember - Empowerment means you own what you learn and can use it to teach others and make a difference.
  • 4. i-SAFE includes an empowerment activity in every lesson. By completing the activity you may be eligible for neat incentives and prizes. Check it out at www.isafe.org – Click on the link to contests and Incentives. So not only are you learning and sharing, you are getting rewarded for doing so! Empowerment is the Key to Learning!
  • 5. The Plan In this lesson, you will be learning about cyber bullying and netiquette. You will be developing articles or brochures on the concepts of being considerate online, etc.
  • 6. All Right – Let’s Get Started Make sure you have a copy of the activity page called The Cyber Bullying Fact Sheet We will be using it to learn more about Cyber Bullying.
  • 7. Time to Brainstorm 1. What is bullying? 3. Why do people act as bullies? 5. What are some things that a bully might do? 7. What are examples of things a cyber bully might do? 9. Have any of you had incidents in which you were bullied? 11. Have you had experiences with a cyber bully?
  • 8. Let’s Take a Closer Look at the Cyber Bullying Fact Sheet
  • 9. "All cruelty springs from weakness.” (Seneca, 4BC- AD65) Bullying has become an online event as well as a physical one. Intimidation online can be just as bad, and in some cases worse, than when bullying occurs in the physical community.
  • 10. Bullying Bullies are those people who gain gratification (a sense of happiness) when they have provoked or tormented others. They feel better by making others feel worse. Cyber bullies are those bullies who use the Internet to be mean to others.
  • 11. Bullying E-mail provides one method of communication for these bullies. Flame mail – mail designed to make another person mad – is used along with hate mail – mail that shows racism, sexism, or other prejudices. Another way bullies use the Internet is through bulletin boards and chat sites to make their comments public. Finally, some cyber bullies build websites devoted to making a person or persons feel bad.
  • 12. Think About It! Do you think it’s a sign of strength or weakness to use the Internet for bullying? Why?
  • 13. Tell someone. Don’t keep this to yourself. Tell a trusted adult about the bullying. Don’t open or read messages by Cyber bullies. Tell the police if threatened. Tell your Internet Service Provider. Tell your school if it is school related. Schools have a bullying plan in place. Don’t erase the messages – they may be needed to take action. Instead, put them in a folder unread. Protect yourself – never agree to meet with the person or with anyone you meet online. If bullied through chat or instant messaging, the “bully” can often be blocked. Tell someone!
  • 14. Don’t give out private information such as passwords, pins, name, address, phone number, school name, or family and friends names. This information can be used by bullies and other harmful people on the Internet. Use Netiquette. Be polite online and others will tend to do the same. If someone does get angry or bullies you, ignore them – online Cyber bullies want a reaction just like other bullies. Don’t send a message when you are angry – it is hard to undo things that are said in anger. Delete messages from people you don’t know or from people who seem angry or mean. When something doesn’t seem right, it probably isn’t. Get out of the site, chat, etc.
  • 15. The best defense to keep from being a bully online: Use Netiquette. Be polite online and others will tend to do the same. If someone does get angry or bullies, ignore them – online bullies want a reaction. Think about ways to apply E-mail netiquette to the following: Subject lineS AttAchmentS ForwArded meSSAgeS SpAm chAin letterS hoAxeS Your originAl meSSAgeS
  • 16. Chatroom Netiquette Many of the same conventions that apply to newsgroups and e-mail are also relevant in chatrooms. You're still just typing your thoughts and sending them to people, but in a chatroom they're just a little quicker to respond.
  • 17. While chatting: 1. Avoid Using ALL CAPS - It’s considered yelling. 3. Decide What Tone the Conversation Has Before Posting - Don't use offensive language or nicknames. Always avoid making personal attacks and calling names. 5. Don't "Flood" the Chatroom - Flooding is repeating messages over and over, or filling the screen with gibberish, in order to impede communication in the chatroom. 7. Be Nice to Newbies - Remember your first chats? If someone stumbles into your chat, who is obviously new to this medium, show some patience and help him or her get the hang of it.
  • 18. Resources for your Community What resources are available at your school level? What is your school’s anti-bullying plan? What are resources in your community?
  • 19. Time for Group Work Your teacher will divide you into groups for the next activity. In your small groups, read the activity page and follow the directions to complete it. 1st - Read the letters you received. Some will be from bullies and some from victims. 2nd - Each group should then draft a response letter advising one of the letter writers. Incorporate information on local resources, help, advice, etc. 3rd - Once the responses are drafted, design an advice article or informational brochure about how to recognize and handle Cyber bullying.
  • 20. Presentation Time Present your advice letters and brochure/article to the class. Then Discuss: How could you make a difference in other peoples lives and help both cyber bullies and victims. Refer to the Point to Ponder at the end of the Activity page: If the problem of online bullying grows, what might be some consequences to freedom on the Internet? How would those consequences affect you personally?
  • 21. So How Do you Know When You’re Done??? Have you: 1. Covered all the reference sheets? 2. Discussed with your class what you have learned? 3. Completed the Online And Helpless worksheet? 4. Completed and shared your article or brochure?
  • 22. It doesn’t have to end here! Find out about DRiVE!
  • 23. Take Action It’s Easy with the i-Mentor Training Network! Visit the Kids and Teens section at www.isafe.org to learn about the i-Mentor Training Network. It’s all online! The i-Mentor Training Network has short informative videos that will take you step by step through the process of accomplishing any of the i-SAFE Outreach activities you can do in your school and community. To watch the videos go to the i-Mentor Network located in the Kids and Teens section of the i-SAFE website at www.isafe.org.
  • 24. Take Action It’s Easy with the i-Mentor Training Network! The i-Mentor Training Network videos were produced for students like you, who care about online safety and want to DRiVE the message to other students, parents, and community members. By watching the training videos you will become a Certified i-Mentor and will be able to teach students, conduct the i-SAFE assembly experience, or be that important link to parents and community leaders by presenting the i- Parent Programs and Community Leaders Meetings.
  • 25. Get the recognition you deserve as an i-SAFE Mentor • Enroll online at www.isafe.org by clicking on Create an Account. • Go to the Kids and Teens Section and Submit the Online Mentor Menu. • Receive your own Student Toolkit and materials to get started. Take Action www.isafe.org

Editor's Notes

  1. The i-Mentor Training Network has short informative videos that will take you step by step through the process of accomplishing any of the i-SAFE Outreach activities. To watch the videos go to the i-Mentor Network located in the Kids and Teens section of the i-SAFE website at www.isafe.org.
  2. The i-Mentor Training Network videos were produced for students like you, who care about online safety and want to DRiVE the message to other students, parents, and community members.  By watching the training videos you will become a Certified i-Mentor and will be able to teach students, conduct the i-SAFE assembly experience, or be that important link to parents and community leaders by presenting the i-Parent Programs and Community Leaders Meetings. 
  3. Get recognized as a Student Mentor? Sign up online at www.isafe.org in the Kids and Teens section of the website Fill out the Online Mentor Menu located in the Kids and Teens Section of the i-SAFE website. Student Tool kits complete with a DVD and CD will be sent to you with the information you need to get started. If a mentor group has not been established at your school, consider starting one yourself. Contact i-SAFE at www.isafe.org and an i-SAFE Representative will help you get one started. You now have the keys for success. It’s your turn to DR i VE . Join the DRiVE Campaign today. Â