SlideShare a Scribd company logo
1 of 9
Download to read offline
Cyberbullying

By Samara and Michelle
How does cyberbullying connect to our
Central Idea?
❖
❖

❖

When the cyberbully uses his/her power to hurt others then it will affect
relationships as no one will like that particular person.
It affects access to opportunities because your employer could easily
trace your digital footprints. If you’ve been harmful then there’s a good
chance you won’t get accepted.
The cyberbully has the power, they can have consequences by getting in
trouble.

Our main inquiry is power through
cyberbullying.
Main Questions:

What is our responsibility if we get we get cyber bullied?
How does cyberbullying work?
What we found out
Answers to our questions (Samara)
When get cyber bullied you should/should not
● write back
● block cyberbullies from your computer
● if the cyberbully goes to your school contact the vice principal
● Tell a friend or adult you trust
This answer connects to our unit because:
● The cyberbully has the power
● If someone follows these tips
● Affecting relationships
● cyberbully can lose access to opportunities
What we found out
Answers to our questions (Michelle)
Cyberbullying comes in three different categoriesDirect Attacks consist of:
● Threatening texts, IMs or emails
● Creating websites that could be harmful to others
Cyberbullying-by-proxy attacks consist of:
● Misusing the internet by targeting others (accomplices) to do for them
● Stealing the password of others and locking them out of their own
account
Posting humiliating information and images
Video
Primary and secondary resources
Brain Pop video on Digital Etiquette:

www.brainpop.com/technology/computersandinternet/digitaletiquette/ Video
Taking Action
Reflecting on our learning:
Reflecting on our learning…

What we can do to take action...
Credits
Our Resources
www.brainpop.com/technology/computersandinternet/digitaletiquette/ Video for slide Finding Out (BrainPop) and Photo’s.
http://www.bullyingstatistics.org/content/text-bullying.html Information-Cyber Bullying
http://www.helpguide.org/mental/cyber-bullying.htm Information- Cyber Bullying
http://thumbs.dreamstime.com/z/computer-cyber-bullying-hands-security-theft-16479290.jpg Image (Title Page)
http://www.simplyclick.net/sc/website/cyberbullying_by_proxy.html Information-Cyber Bullying
http://www.webroot.com/us/en/home/resources/tips/cyberbullying-online-predators/safety-my-child-is-being-cyberbullied
Information-Cyber Bullying
Inquiry project presentation

More Related Content

Viewers also liked

5 4 the number e
5 4 the number e5 4 the number e
5 4 the number e
hisema01
 
Presentation ad rs_september2013
Presentation ad rs_september2013Presentation ad rs_september2013
Presentation ad rs_september2013
consumerenergy
 
Estructura contenidos
Estructura contenidosEstructura contenidos
Estructura contenidos
dljrobledo
 
GHardie.Resume (2)
GHardie.Resume (2)GHardie.Resume (2)
GHardie.Resume (2)
Gary Hardie
 
El jorobado de notre dame
El jorobado de notre dameEl jorobado de notre dame
El jorobado de notre dame
Pierina Vivanco
 

Viewers also liked (19)

Freeing Minds - Reduce waste, improve efficiency
Freeing Minds - Reduce waste, improve efficiencyFreeing Minds - Reduce waste, improve efficiency
Freeing Minds - Reduce waste, improve efficiency
 
Codes and conventions
Codes and conventionsCodes and conventions
Codes and conventions
 
RMRM
RMRMRMRM
RMRM
 
Educación Inicial: Estado del Arte
Educación  Inicial: Estado del ArteEducación  Inicial: Estado del Arte
Educación Inicial: Estado del Arte
 
comunicación integral
comunicación integralcomunicación integral
comunicación integral
 
5 4 the number e
5 4 the number e5 4 the number e
5 4 the number e
 
Argumento
ArgumentoArgumento
Argumento
 
Kobi's math
Kobi's mathKobi's math
Kobi's math
 
Presentation ad rs_september2013
Presentation ad rs_september2013Presentation ad rs_september2013
Presentation ad rs_september2013
 
Estructura contenidos
Estructura contenidosEstructura contenidos
Estructura contenidos
 
Bullying
BullyingBullying
Bullying
 
Komunikasi
KomunikasiKomunikasi
Komunikasi
 
Novena de navidad
Novena de navidadNovena de navidad
Novena de navidad
 
trabajo final tecnicas de comunicacio Barbara Ojeda Zaatini
trabajo final tecnicas de comunicacio Barbara Ojeda Zaatini trabajo final tecnicas de comunicacio Barbara Ojeda Zaatini
trabajo final tecnicas de comunicacio Barbara Ojeda Zaatini
 
GHardie.Resume (2)
GHardie.Resume (2)GHardie.Resume (2)
GHardie.Resume (2)
 
DSM-5 couverture
DSM-5 couvertureDSM-5 couverture
DSM-5 couverture
 
Grupo 1 y 2 fisioterapia soporte basico de vida para web
Grupo 1 y 2 fisioterapia soporte basico de vida para webGrupo 1 y 2 fisioterapia soporte basico de vida para web
Grupo 1 y 2 fisioterapia soporte basico de vida para web
 
Inquiry project presentation
Inquiry project presentationInquiry project presentation
Inquiry project presentation
 
El jorobado de notre dame
El jorobado de notre dameEl jorobado de notre dame
El jorobado de notre dame
 

Similar to Inquiry project presentation

Cyberbulling
CyberbullingCyberbulling
Cyberbulling
eliasfiad
 

Similar to Inquiry project presentation (20)

Cyberbulling
CyberbullingCyberbulling
Cyberbulling
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
CaddiganD
CaddiganDCaddiganD
CaddiganD
 
CaddiganD
CaddiganDCaddiganD
CaddiganD
 
Cyberbullying presentation Xander Cole
Cyberbullying presentation Xander ColeCyberbullying presentation Xander Cole
Cyberbullying presentation Xander Cole
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Ciberbullying
CiberbullyingCiberbullying
Ciberbullying
 
Erasmus+ group 6
Erasmus+ group 6Erasmus+ group 6
Erasmus+ group 6
 
A Case Study On Cyber Bullying
A Case Study On Cyber BullyingA Case Study On Cyber Bullying
A Case Study On Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Week7 assgn2suphaphonp
Week7 assgn2suphaphonpWeek7 assgn2suphaphonp
Week7 assgn2suphaphonp
 
Week7assgn2KwanHoY
Week7assgn2KwanHoYWeek7assgn2KwanHoY
Week7assgn2KwanHoY
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By Anamika
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullyng: Causes, Effects, and Possible Solutions
Cyberbullyng: Causes, Effects, and Possible SolutionsCyberbullyng: Causes, Effects, and Possible Solutions
Cyberbullyng: Causes, Effects, and Possible Solutions
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 

Recently uploaded

會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 

Recently uploaded (20)

How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 

Inquiry project presentation

  • 2. How does cyberbullying connect to our Central Idea? ❖ ❖ ❖ When the cyberbully uses his/her power to hurt others then it will affect relationships as no one will like that particular person. It affects access to opportunities because your employer could easily trace your digital footprints. If you’ve been harmful then there’s a good chance you won’t get accepted. The cyberbully has the power, they can have consequences by getting in trouble. Our main inquiry is power through cyberbullying.
  • 3. Main Questions: What is our responsibility if we get we get cyber bullied? How does cyberbullying work?
  • 4. What we found out Answers to our questions (Samara) When get cyber bullied you should/should not ● write back ● block cyberbullies from your computer ● if the cyberbully goes to your school contact the vice principal ● Tell a friend or adult you trust This answer connects to our unit because: ● The cyberbully has the power ● If someone follows these tips ● Affecting relationships ● cyberbully can lose access to opportunities
  • 5. What we found out Answers to our questions (Michelle) Cyberbullying comes in three different categoriesDirect Attacks consist of: ● Threatening texts, IMs or emails ● Creating websites that could be harmful to others Cyberbullying-by-proxy attacks consist of: ● Misusing the internet by targeting others (accomplices) to do for them ● Stealing the password of others and locking them out of their own account Posting humiliating information and images
  • 6. Video Primary and secondary resources Brain Pop video on Digital Etiquette: www.brainpop.com/technology/computersandinternet/digitaletiquette/ Video
  • 7. Taking Action Reflecting on our learning: Reflecting on our learning… What we can do to take action...
  • 8. Credits Our Resources www.brainpop.com/technology/computersandinternet/digitaletiquette/ Video for slide Finding Out (BrainPop) and Photo’s. http://www.bullyingstatistics.org/content/text-bullying.html Information-Cyber Bullying http://www.helpguide.org/mental/cyber-bullying.htm Information- Cyber Bullying http://thumbs.dreamstime.com/z/computer-cyber-bullying-hands-security-theft-16479290.jpg Image (Title Page) http://www.simplyclick.net/sc/website/cyberbullying_by_proxy.html Information-Cyber Bullying http://www.webroot.com/us/en/home/resources/tips/cyberbullying-online-predators/safety-my-child-is-being-cyberbullied Information-Cyber Bullying