Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.



Published on

  • Be the first to comment

  • Be the first to like this


  1. 1. Cyber – Bullying on School Grounds<br />Kasi Huver<br />EDU 290<br />Author: wsilver<br />
  2. 2. What is Cyber – Bullying?<br />According to <br />“Tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child…”<br />“…minor on both sides, or at least have been instigated by a minor against another minor.”<br />
  3. 3. Different Types ofCyber – Bullying <br /><ul><li>Two kinds:
  4. 4. Direct attacks
  5. 5. By proxy</li></ul>Source:<br />
  6. 6. Ways in Which People Cyber – Bully Others<br />Texting<br />Emails or IMs<br />Chat Rooms<br />Facebook/Myspace<br />Signing the victim up for adult websites<br />Posting pictures of photo shopped images<br />Launching “hate” websites <br />Building fake profiles<br />Author: compujeramey<br />
  7. 7. Why Does It Happen?<br />A sense of underachievement <br />Sense of isolation<br />Attention<br />Oppression <br />Conflict in values/morals<br />Revenge <br />Easier with the use of technology <br /><br />
  8. 8. How Does it Affect the Classroom?<br />Constant awareness of what others think of them<br />Unable to focus/participate <br />Causes low self-esteem and lack of self-confidence<br />Causes “fear” of the classroom<br />
  9. 9. Current Laws<br />The following can be grounds for arrest and prosecution:<br />Making threats of violence to people or their property.<br />Engaging in coercion<br />Making obscene or harassing telephone calls <br />Harassment or stalking. <br />Hate or bias crimes.<br />Creating or sending sexually explicit images of teens<br />Sexual exploitation<br />Taking a photo of someone in place where privacy is expected<br />
  10. 10. Current Laws<br />Author: mrbill<br />“Schools clearly have a duty to ensure that students are using school network or mobile devices in a manner that does not harm other students.”<br />Freedom of Speech violated? <br /><br />
  11. 11. What is Being Doneto Stop it?<br />Author: Vince Alongi<br />No law in Michigan that protects cyber bullying victims <br />2006 session – anti bullying legislation proposed <br />Reintroduced in 2007 <br /><br />
  12. 12. Recap<br />Common among preteens and teens<br />Comes in a variety of forms<br />Occurs for many reasons <br />Causes fear of the school setting<br />No current law in Michigan<br />Author: geerlingguy<br />
  13. 13. Sources Cited<br />Photos:<br />Alongi, Vince, “City Stamps: Stop Sign,”<br />compujeramey, “Cell Phone Cameras,”<br />mrbill, “Worshipful Master’s Gavel,”<br />wsilver, “Empty Swingset,”<br />Information<br />“What is Cyberbullying, exactly?” WiredKids Inc. 20 March 2010. <>.<br />Younces, Wiam. “Cyber Bullying.” Carnegie Mellon University. 2007. 20 March 2010. <>.<br />Mason, Kimberly. “Cyberbullying: Legal Issues.” The Creative Department. 19 March 2010. <>.<br />High, Brenda. “Michigan: No Law.” 20 March 2010. <>. <br />