Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
What is Cyberbullying?
<ul><li>What do you use the Internet for? </li></ul>
<ul><li>How private do you think information </li></ul><ul><li>posted on the Internet is? </li></ul>
<ul><li>What do you do to respect other </li></ul><ul><li>people’s rights while online? </li></ul>
<ul><li>‘… aggressive behavior or intentional “harm doing” by one person or a group, generally carried out repeatedly over...
<ul><li>‘… willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices.’ <...
MySpace PSP YouTube iPod Facebook blogging e-mail mp3 player texting instant messaging SMS chat Napster Flickr video game ...
Image Source:  Flickr.com  UtopianLibrary IM
30% Instant messaging is growing 30% faster than e-mailing did at its inception
Image Source:  flickr.com  jessamyn chatrooms
Image Source: Flickr.com  sameold2008 polling site
blogs
email
Image Source: Flickr.com  another.point.in.time   text messaging
Screen capture from: http://www.go2web20.net/#tag:most-popular social networks
Types of Cyberbullying
flaming harassment cyberstalking denigration masquerade outing & trickery exclusion
Why? 22.5% - revenge 18.7% - ‘victim deserved it’ 10.6% - ‘fun’ Hinjurja and Patching (2009)
<ul><li>93% use the Internet  </li></ul><ul><li>61% go online daily </li></ul><ul><li>Pew Internet & American Life Project...
<ul><li>63% have cell phones  </li></ul><ul><li>35% talk to friends daily  </li></ul><ul><li>27% send text messages daily ...
<ul><li>‘ The perception of invisibility can </li></ul><ul><li>influence behavioral choices.  It </li></ul><ul><li>undermi...
Upcoming SlideShare
Loading in …5
×

What is cyberbullying

955 views

Published on

Unit 12 EDIT 605

Published in: Education
  • Be the first to comment

  • Be the first to like this

What is cyberbullying

  1. 1. What is Cyberbullying?
  2. 2. <ul><li>What do you use the Internet for? </li></ul>
  3. 3. <ul><li>How private do you think information </li></ul><ul><li>posted on the Internet is? </li></ul>
  4. 4. <ul><li>What do you do to respect other </li></ul><ul><li>people’s rights while online? </li></ul>
  5. 5. <ul><li>‘… aggressive behavior or intentional “harm doing” by one person or a group, generally carried out repeatedly over time and involving a power differential.’ </li></ul><ul><li>Nansel (2001) </li></ul>Traditional Bullying - Definition
  6. 6. <ul><li>‘… willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices.’ </li></ul><ul><li>Hinduja and Patchin, 2009 </li></ul>Cyberbullying - Definition
  7. 7. MySpace PSP YouTube iPod Facebook blogging e-mail mp3 player texting instant messaging SMS chat Napster Flickr video game internet wiki xBox computer PSP photosharing Venues
  8. 8. Image Source: Flickr.com UtopianLibrary IM
  9. 9. 30% Instant messaging is growing 30% faster than e-mailing did at its inception
  10. 10. Image Source: flickr.com jessamyn chatrooms
  11. 11. Image Source: Flickr.com sameold2008 polling site
  12. 12. blogs
  13. 13. email
  14. 14. Image Source: Flickr.com another.point.in.time text messaging
  15. 15. Screen capture from: http://www.go2web20.net/#tag:most-popular social networks
  16. 16. Types of Cyberbullying
  17. 17. flaming harassment cyberstalking denigration masquerade outing & trickery exclusion
  18. 18. Why? 22.5% - revenge 18.7% - ‘victim deserved it’ 10.6% - ‘fun’ Hinjurja and Patching (2009)
  19. 19. <ul><li>93% use the Internet </li></ul><ul><li>61% go online daily </li></ul><ul><li>Pew Internet & American Life Project, 2006 </li></ul>Teens & Technology - Statistics
  20. 20. <ul><li>63% have cell phones </li></ul><ul><li>35% talk to friends daily </li></ul><ul><li>27% send text messages daily </li></ul><ul><li>Lenhart et al., 2007 </li></ul>Teens & Technology - Statistics
  21. 21. <ul><li>‘ The perception of invisibility can </li></ul><ul><li>influence behavioral choices. It </li></ul><ul><li>undermines the impact of the </li></ul><ul><li>potential for negative consequence. </li></ul><ul><li>Makes it easier to rationalize an </li></ul><ul><li>irresponsible or harmful action due to </li></ul><ul><li>the lack of potential for detection.’ </li></ul><ul><li>(Willard, 2007) </li></ul>Quote of the Day

×