Cyber Bullying


Published on

  • Be the first to comment

  • Be the first to like this

Cyber Bullying

  1. 1. CYBER BULLYING<br />Marjon Ricketts<br />April 14, 2010<br />
  2. 2. Table of Contents <br />What is cyber bullying?<br />Facts<br />Social Networks used <br />Different forms of cyber bullying?<br />Targeted groups<br />The effects of cyber bullying?<br />What can be done to stop cyber bullying?<br />Summary and Conclusion<br />References<br />
  3. 3. Cyber bullying<br />Cyber bullying is the harmful application of technology by parties wishing to extend the reach and impact of their behaviour. <br />It is the use of communication technologies to support repeated acts by an individual or group. <br />Acts carried out are intended to embarrass, humiliate or intimidate their victim.<br />
  4. 4. Facts<br />Over 40% of those bullied by way of information technology mediums are teenagers with internet access.<br />Females are more likely than males to be targeted by way of harmful technological acts<br />Currently the most common virtual locations for cyber bullying are chat rooms, social networking sites, e mail and instant message systems.<br />Only 15% of those who experience this form of harassment seek help<br />60% of those who experience the act of cyber bullying experience this act in the home<br />Psychological and emotional outcomes of cyber bullying are similar to that of being bullied face to face; however you may be able to end physical contact whereas the attempt to end cyber bullying is much more difficult.<br />Of offenders interviewed most consider this act fun or instructive using this act as a means of trying to strengthening their victims.<br />
  5. 5. Social Networking Service<br />Social networking services are primarily used to aid in building social <br />relations. <br />Networks generally consist of individual profiles and or member representation <br />Networking sites currently used in the process of cyber bullying<br />Bebo<br />Facebook<br /><br />My Space<br />Twitter<br />Bebo and My Space Services now employ security officers to search account holder <br />profiles for inappropriate content, resulting in the freezing of a members account.<br />
  6. 6. Forms of cyber bullying<br />Sexting – the act of sending sexually explicit messages or photographs electronically<br />primarily between mobile phones<br />The story of Jessica LoganJessica Logan was an 18 year old teenager from Ohio. Her only crime was sending nude images of herself to her boyfriend’s mobile phone.When they broke up, he sent the images to other girls, who started harassing her, calling her a slut and a whore.Jessica, an only child, became miserable and depressed and stopped going to school.In May 2008 Jessica appeared on Cincinnati TV to tell her story "to make sure no one else will have to go through this again".Two months later, Jessica hanged herself in her bedroom.<br /><br />
  7. 7. Forms of cyber bullying<br />General - threats and intimidation sent via e mail, networking sites, cellular phone and message boards.<br />Cyber stalking – repeated and prolonged unwanted texting, e mail, or instant messaging whether explicitly offensive or not; online stalking involves the process of constantly monitoring a parties online activities.<br />Defamation – the posting of upsetting or defamatory remarks as it pertains to an individual online, insults may be general or include prejudice or religious based bullying.<br />Peer rejection or exclusion – the act of excluding someone by refusing to return or acknowledge messages.<br />Unauthorized access and impersonation by way of identity theft – accessing and copying someone’s information, e.g. e mails, or pictures in order to harass or humiliate them. <br />
  8. 8. Forms of cyber bullying<br />Impersonation – by hacking into an individual account profile, parties are able to pretend to be the person whose account has been hacked.<br />Sending or forwarding of private of personal information which include text, photograph and video.<br />Manipulation – using online friendship status’ to suggest that a genuine friend would release personal information.<br />Manipulation is also used by way of adults who have a sexual interest in children, to groom children adults have contacted them online in hopes of being able to set up a meeting.<br />Gaming sites and virtual world – Live text or voice chat during online gaming, players repeatedly pick on weaker or less experienced players, at time killing their opponents players.<br />
  9. 9. Targeted groups<br />Youth aged 12 to 18, generally students<br />Members of various cultural and ethnic backgrounds<br />Those with expressed sexual preference for the same sex<br />Workplace employers<br />Teachers<br />Children under the age of 12 for the purposes of sexual exploitation<br />Patrons with strong religious beliefs often designated to specified religious groups<br />
  10. 10. The effects of cyber bullying<br />Undermining of one’s confidence, self esteem and sense of security<br />Limits social interactions, individuals choose to isolate themselves and avoid social forums<br />Professional and peer interaction are impacted<br />Distress – feeling highly anxious, unsafe and inadequate as a person<br />Eating or sleeping disorders<br />A desire to seek revenge<br />Development of social phobias<br />Self infliction of pain or scarring<br />Loss of hope which may compound into a decision that life is not worth living<br />;photovideo<br />
  11. 11. What can be done to prevent cyber bullying?<br />Education and awareness of cyber bullying and its impact<br />Promote the positive use of technology<br />Place computers with internet access in an open space<br />Never give out personal information such as passwords <br />Do not believe everything that you read<br />Do not open a message from someone you do not know<br />If it does not look or feel right it probably isn’t, trust your instincts<br />
  12. 12. What can be done to prevent cyber bullying<br />Do not erase or delete messages from cyber bullies as an investigation may lead you to<br />your bully <br />Protect yourself, try not to arrange meetings with someone you met online<br />Some anti virus programs such as McAffee offer chat messaging protection for both instant messaging and chat rooms<br />Making the reporting of cyber bullying easier as it is often difficult for victims to <br />communicate this stress<br /> dedicated to prevention and counselling for those in need<br />
  13. 13. Summary and Conclusion<br />Technology is great as it provides a means to mass communication, social engagement and a wealth of insight and knowledge. <br />Though there are many positive facets, the misuse of technology through cyber bullying is painful for those targeted.<br />Seeking an end to the hate epidemic deemed cyber bullying is an ongoing process as technology continues to evolve; however education is the first step in prevention<br />
  14. 14. References<br />Images <br />1 and 2<br /><br />3<br /><br />4<br /><br />5<br /><br />Video<br />1<br /><br />2<br />;photovideo<br />
  15. 15. References<br />Definition<br /><br /> <br />Facts<br /><br />Social Networking<br /><br />Forms of Cyber bullying/Targeted Groups/Effects/Prevention<br /><br /><br /><br /><br /><br /><br />