Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
CYBER BULLYING   BULLYING 2.0
CYBER BULLYING                            ISNew                      OldImage:                                     Pervasi...
“Cyberbullying involves                                       using communication                                       te...
PROPORTIONS• Figure 3.3 Proportion (%) of those that have been the targets of cyber-bullying  the past 12 months. (Joint S...
Image:http://www.flickr.com/photos/gi                      bsonsgolfer/6300856067/in/photostreaIS:        Technology    m/...
CharacteristicsUbiquityAnonymityPredatorsWellbeing                  Image:http://www.flickr.com/photos/m                  ...
ALTERNAT                                                              BullyingIVES                                        ...
BULLY VICTIMS• Proportion (%) of those that cyber-bullied who have also been  targets of cyber-bullying by others aged 13 ...
RECOMMENDATIONS                       A combination of                        approaches to                            use...
CONCLUSION                          Different                            Action                       PermanentImage:http:...
QUESTIONS1. Can we reduce or control cyber     bullying by    focusing onbullying in general   2. Is banningtechnology (su...
RECOMMENDED READINGS• Kids Helpline    http://www.kidshelp.com.au/grownups/news-    research/hot-topics/cyber-bullying.php...
Upcoming SlideShare
Loading in …5
×

Cyber bullying presentation

582 views

Published on

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

Cyber bullying presentation

  1. 1. CYBER BULLYING BULLYING 2.0
  2. 2. CYBER BULLYING ISNew OldImage: Pervasivehttp://www.flickr.com/photos/novemberborn/136365368/in/photostream/
  3. 3. “Cyberbullying involves using communication technology to harass, intimidate, threat en, or otherwise harmImage:http://www.flickr.com/photos/a others” (Hinduja &ndrewrennie/5207163798/in/photostream/ Patchin, 2010, p. 21).
  4. 4. PROPORTIONS• Figure 3.3 Proportion (%) of those that have been the targets of cyber-bullying the past 12 months. (Joint Select Committee on Cyber-Safety, 2011)
  5. 5. Image:http://www.flickr.com/photos/gi bsonsgolfer/6300856067/in/photostreaIS: Technology m/ Non Violent Spatial Annoymous “UNTIL RECENTLY, THE VICTIMS OF BULLYINGCONSIDERED THEIR HOMES A PLACE OF SAFETY, A SANCTUARY WHICH THEY COULD TAKE FROM ABUSIVE PEERS.” STROM AND STROM 2005
  6. 6. CharacteristicsUbiquityAnonymityPredatorsWellbeing Image:http://www.flickr.com/photos/m rwoodnz/5077221324/in/photostream/
  7. 7. ALTERNAT BullyingIVES Named Retaliation Image: http://www.flickr.com/photos/jdhancock/3420540107/in/p hotostream/
  8. 8. BULLY VICTIMS• Proportion (%) of those that cyber-bullied who have also been targets of cyber-bullying by others aged 13 years and over Figure 3.2 (Joint Select Committee on Cyber-Safety, 2011)
  9. 9. RECOMMENDATIONS A combination of approaches to use: Education and Tougher Laws Technological intervention and Policies Measures programs Practical Policies
  10. 10. CONCLUSION Different Action PermanentImage:http://www.flickr.com/photos/bubbo-tubbo/1074429847/in/photostream/
  11. 11. QUESTIONS1. Can we reduce or control cyber bullying by focusing onbullying in general 2. Is banningtechnology (such as phones) an overreaction or justified3. Can a schoolrealistically dealwith these issues? Image:http://www.flickr.com/photos/pi mkie_fotos/2513823082/
  12. 12. RECOMMENDED READINGS• Kids Helpline http://www.kidshelp.com.au/grownups/news- research/hot-topics/cyber-bullying.php• Digital Citizenship http://www.digitalcitizenship.nsw.edu.au/• Joint Select Committee on Cyber-Safety (2011) High- Wire Act Cyber-Safety and the Young Interim Report. Canberra: The Parliament of the Commonwealth of Australia• Internet Safety Technical Task Force http://cyber.law.harvard.edu/research/isttf• Chadwick, R. (2010) Education The Key To Keeping Kids Safe Online. FYI Autumn 14-16

×