Cyber Bullying

1,246 views

Published on

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,246
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cyber Bullying

  1. 1. Cyber-Bullying on School Grounds Created By: Catheryn Bueche
  2. 2. Introduction <ul><li>As technology advances, cyber-bullying is becoming more apparent in the lives of young students. Although preventative measures have been taken this problem is far from being solved. </li></ul>
  3. 3. <ul><li>It is important to know what children are doing on the internet and other technological devices, because another child could bullied and abused. Teachers need to be aware of cyber-bullying for the well being of their students. </li></ul>izzymunchted +
  4. 4. Background Information <ul><li>Cyber-Bullying occurs when a child or teen is harassed, threatened, or made fun of ruthlessly through a form of technology. This form of bullying can occur inside or outside of a school or classroom setting. </li></ul>
  5. 5. <ul><li>Some examples of cyber-bullying can include harassment through instant messages, emails, websites, or social-networking sites. Cyber-Bullying can also take place during online gaming. Aside from online bullying , harassment can also take place in other technologies. For instance, bullying is known to have occurred through mobile devices in text messages and voicemail </li></ul>+
  6. 6. <ul><li>Laws applying to cyber-bullying are not always black and white. Educators must take into consideration the degree of the harassment itself, the frequency of the harassment, the nature of the harassment, and the source from which the harassment begins. After these areas are assessed the teacher can take appropriate action. </li></ul>+
  7. 7. Impact of Cyber-Bullying Cyber-Bullying usually begins when a student is in the 7th grade, peaks in the 8th grade, and sometimes carries into high school and college years. This can severely emotionally damage a student.
  8. 8. jessica mullen + Cyber-Bullying has been known to impact students so negatively that it has lead to self mutilation and in some instances even suicide.
  9. 9. Preventative Measures <ul><li>Although cyber-bullying has increased over the past several years, so has the teacher and parent awareness of this very serious problem. Many things are being done to ensure that cyber-bullying is kept at a minimum. </li></ul>
  10. 10. <ul><li>In the past it was almost impossible for school systems to interfere with cyber-bullying that occurred outside of the building. Now, teachers are being offered workshops and classes to learn how to talk to effectively lecture students on the seriousness of cyber-bullying. </li></ul>Julie Lindsay +
  11. 11. <ul><li>Teaching students that there are consequences to cyber-bullying is key to prevention . Giving students plenty of after school activities is another way to limit cyber-bullying. Lastly, encouraging students to discuss feelings and issues with their peers will greatly reduce instances of cyber-bullying. </li></ul>jdanvers +
  12. 12. Conclusion Although there is no way to eliminate cyber-bullying in schools for good, having an understanding of the seriousness of this harassment is key to down-sizing this growing issue. Identifying and communicating that cyber-bullying is in fact a problem will help keep this problem out of the classroom.
  13. 13. References <ul><li>Hinduja, S., & Patchin, J.W. (2009). Cyberbllying research center. Retrieved from http://www.cyberbullying.us/ </li></ul><ul><li>Sutton, S. (2009). School solutions for cyber bullying. Principal Leadership (Middle School Ed.), 9(6), Retrieved from http://0-newfirstsearch.oclc.org.catalog.lib.cmich.edu/WebZ/FTFETCH?sessionid=fsapp3-53106-g7716jdn-fon2w2:entitypagenum=3:0:rule=100:fetchtype=fulltext:dbname=WilsonSelectPlus_FT:recno=7:resultset=1:ftformat=HTML:format=BI:isbillable=TRUE:numrecs=1:isdirectarticle=FALSE:entityemailfullrecno=7:entityemailfullresultset=1:entityemailftfrom=WilsonSelectPlus_FT: </li></ul><ul><li>Whitaker, J.L. (2009). Online dangers: keeping children and adolescents safe. Washington and Lee Law Review , 66(3), Retrieved from http://0-newfirstsearch.oclc.org.catalog.lib.cmich.edu/WebZ/FTFETCH?sessionid=fsapp3-59569-g76wpgmo-gr8t57:entitypagenum=5:0:rule=100:fetchtype=fulltext:dbname=WilsonSelectPlus_FT:recno=1:resultset=2:ftformat=HTML:format=BI:isbillable=TRUE:numrecs=1:isdirectarticle=FALSE:entityemailfullrecno=1:entityemailfullresultset=2:entityemailftfrom=WilsonSelectPlus_FT: </li></ul>
  14. 14. Image References <ul><li>Title :_DSC0070 </li></ul><ul><li>Author: jdanvers </li></ul><ul><li>Source: http://www.flickr.com/photos/jdanvers/4461340606/ </li></ul><ul><li>Title: Create the Future PD Qatar Academy </li></ul><ul><li>Author: Julie Lindsay </li></ul><ul><li>Source: http://www.flickr.com/photos/julielindsay/3321008397/ </li></ul><ul><li>Title: Serene Computer Lab at Seward Montessori School </li></ul><ul><li>Author: Izzymunchted </li></ul><ul><li>Source: http://www.flickr.com/photos/izzymunchted/1419115048/ </li></ul><ul><li>Title: Working on meeting recap post in computer lab </li></ul><ul><li>Author: jessica mullen </li></ul><ul><li>Source: http://www.flickr.com/photos/jessicamullen/4109596882/ </li></ul>

×