2. BETRAYAL
A clique of 8th grade girls sleeping over at one
friends house, pretend to be friend an unpopular
girl on Instant Messenger. They persuade her to
divulge her innermost feelings, secrets, and
crushes. The next day at school they show
everyone a print-out of the conversation, and she
is mortified
3. A BREACH OF PRIVACY
Marty, a junior high school, secretly takes a cell-
phone photo of Joseph, an over-weighted kid who
is undressing in the gym locker room. Within
minutes, the photo is sent to Marty’s friends in
English class. When Joseph finds out, he is so
embarrassed he refuses to return back to school.
4. UNVANTED AND THREATHENING
POSTINGS
14 year old Joy has created a Web Blog, all about
herself. An anonymous person starts posting
threatening sexual comments with links to porn
sites on her blog.
5. WHAT IS CYBERBULLYING?
•Using electronic mails, chat rooms, websites and
other form of electric communication to:
•Send mean-spirited messages
•Make cruel and harmful remarks about
individuals
•Post unflattering or derogatory photos
•Make direct threats or encourage acts of
violence
•Sexual harass
6. WHAT IS CYBERBULLYING?
•“Cyberbullying” is when a child or teen is
tormented, threatened, harassed, humiliated,
embarrassed or otherwise targeted by another
child or teen using the internet, interactive or
digital technologies or cell phones. It has to have
a minor on both sides, or at least have been a
minor against another minor. When adults
become involved it is classified as something
different.
7. TWO KINDS OF CYBERBULLYING
•Direct Attacks
- messages sent directly to the victim
•Cyberbullying by Proxy
- using someone else to cyberbully a victim,
this proxy may know they are cyberbullying and
they may not
8. DIRECT ATTACKS
• Instant Messaging • E-mailing Pictures
• Text Messaging • Stealing Passwords
• Blogs • Internet polling
• Websites • Hacking or Sending
Spyware
9. BY PROXY…
•Someone else does the dirty work for the main
cyberbully.
•Bullies may hack into the victim’s account or steal
their password. They may set up a new account
pretending to be with the victim.
•Friends get angry with the victim.
•This form of cyberbullying is very dangerous
because many people are involved, not just the
bully and the victim.
10. CYBERBULLYING TACTICS
•Gossip: posting or sending cruel gossip to damage
a person’s reputation and relationship with others
•Exclusion: deliberately excluding someone from an
online group
•Impersonation: breaking into someone’s online
account and sending messages or making post
that will cause embarrassment or damage to the
person’s reputation and affect his or her
relationships with others
•Harassment: repeatedly posting or sending
11. CYBERBULLYING TACTICS
•Cyberstalking: posting or sending unwanted or
intimidating messages, which may include threats
•Flaming: online fights where scornful and offensive
messages are posted on websites, forums or blogs
•Outing or Trickery: tricking someone into revealing
secrets or embarrassing information, which is then
shared online
•Cyber threats: remarks on the internet threatening
or implying violent behavior, displaying suicidal
12. WHY DO PEOPLE BULLY?
•Continuation of face-to-face bullying
•Anger
•Jealousy
•Peer-pressure
•Fun/Entertainment
•Revenge
•Attention seeker
13. EFFECTS OF CYBERBULLYING
•Anxiety
•Depression
•Withdrawal from friends
and activities
•Change in mood,
behavior and appetite
•Emotional distress
•Anger
•Shame
•Fear
•Frustrations
•Low self-esteem
•Trust issues
•Bullying others
•SUICIDE
14. WAYS TO PREVENT
CYBERBULLYING
•Be privative
•Take time
•Stop, block and tell
•Save the evidence
•Google yourself
•Teach students about the damages of
cyberbullying