This document discusses cyberbullying and how it relates to power. It defines three categories of cyberbullying: direct attacks through threatening texts or emails, cyberbullying by proxy where others are targeted to bully for the person, and posting humiliating information online. The document suggests that if someone is cyberbullied, they should not respond but rather block the bully, tell a trusted adult, and contact authorities if the bully attends their school. Cyberbullying affects relationships, opportunities, and consequences as the bully wields power through their actions online. The main questions are about responsibilities if cyberbullied and how cyberbullying works.
2. How does cyberbullying connect to our
Central Idea?
❖
❖
❖
When the cyberbully uses his/her power to hurt others then it will affect
relationships as no one will like that particular person.
It affects access to opportunities because your employer could easily
trace your digital footprints. If you’ve been harmful then there’s a good
chance you won’t get accepted.
The cyberbully has the power, they can have consequences by getting in
trouble.
Our main inquiry is power through
cyberbullying.
3. Main Questions:
What is our responsibility if we get we get cyber bullied?
How does cyberbullying work?
4. What we found out
Answers to our questions (Samara)
When get cyber bullied you should/should not
● write back
● block cyberbullies from your computer
● if the cyberbully goes to your school contact the vice principal
● Tell a friend or adult you trust
This answer connects to our unit because:
● The cyberbully has the power
● If someone follows these tips
● Affecting relationships
● cyberbully can lose access to opportunities
5. What we found out
Answers to our questions (Michelle)
Cyberbullying comes in three different categoriesDirect Attacks consist of:
● Threatening texts, IMs or emails
● Creating websites that could be harmful to others
Cyberbullying-by-proxy attacks consist of:
● Misusing the internet by targeting others (accomplices) to do for them
● Stealing the password of others and locking them out of their own
account
Posting humiliating information and images
6. Video
Primary and secondary resources
Brain Pop video on Digital Etiquette:
www.brainpop.com/technology/computersandinternet/digitaletiquette/ Video