Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cyberbullying year7

1,999 views

Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

Cyberbullying year7

  1. 1. Cyberbullying
  2. 2. What is bullying? <ul><li>Behaviour by an individual or group, repeated over time, that intentionally hurts another individual or group. </li></ul>
  3. 3. What is cyberbullying? <ul><li>The use of phones or the internet to deliberately upset someone else. </li></ul>
  4. 4. Is there a difference? <ul><li>Cyberbullying has a much bigger audience, no closure and no escape from the bully. Other people might not know the impact they have. </li></ul>
  5. 5. Who is a cyberbully? <ul><li>Someone who deliberately sends this hurtful information. Why do you think they do this? </li></ul><ul><li>Someone who passes the message/image on to someone else. (An ‘accessory’) What is a ‘bystander to bullying’? </li></ul><ul><li>Someone who sends the message thinking it is only a joke. </li></ul>
  6. 6. Examples of cyberbullying <ul><li>Threats </li></ul><ul><li>Harassment repeatedly sending unwanted messages </li></ul><ul><li>Sending nasty messages </li></ul><ul><li>Impersonation </li></ul><ul><li>Sending upsetting images </li></ul>
  7. 7. Direct cyberbulling <ul><li>Direct attack to the victim via email, IM, blog </li></ul><ul><li>Warning war – fake squealing on someone </li></ul><ul><li>Text war </li></ul><ul><li>Photoshopped pictures sent or posted as real pics </li></ul><ul><li>Using a stolen password to lock out the rightful owner and then hijack the account for nasty purposes </li></ul><ul><li>Create a poll or survey to vote on who is nice or ugly </li></ul><ul><li>Ganging up against a player in a game </li></ul>
  8. 8. Direct cyberbulling <ul><li>Post pictures without permission and ask others to rate who is fat or ugly </li></ul><ul><li>Ridiculing on web sites, blogs, IM </li></ul><ul><li>Pretend to be a friend, share secrets and publicise the secrets </li></ul><ul><li>Arrange to socially ostracise or ignore someone </li></ul><ul><li>Create and share insulting code names for people (uf=ugly face) </li></ul>
  9. 9. Direct cyberbulling <ul><li>Tease </li></ul><ul><li>Taunt </li></ul><ul><li>Insult </li></ul><ul><li>Threaten the victim or a member of the victim's family </li></ul><ul><li>Impersonate someone else </li></ul><ul><li>Spread rumours (true or not) </li></ul><ul><li>Post clips on YouTube without permission </li></ul>
  10. 10. Cyber-bullying by proxy <ul><li>The bully instigates others by creating indignation or strong emotion, and then lets others do their dirty work. </li></ul><ul><li>The “ forwarding” accomplice </li></ul>
  11. 11. Characteristics of Cyberbullying <ul><li>Unequal power </li></ul><ul><li>Hurtful actions </li></ul><ul><li>Repetitive behaviours </li></ul><ul><li>Bully can remain anonymous </li></ul><ul><li>Bully can pretend to be another person </li></ul><ul><li>Bullying can happen anywhere,anytime , given that cyber-space is everywhere all of the time </li></ul><ul><li>Bullying can take many forms within the cyberspace environment </li></ul><ul><li>Capacity for instant and limitless dissemination of words and images </li></ul><ul><ul><li>Kids Help Phone Cyber--bullying Study, April 2007 </li></ul></ul>
  12. 12. How common is cyberbullying ? <ul><li>90% of middle school students have had their feelings hurt online. </li></ul><ul><li>75% have visited a Web site bashing another student. </li></ul><ul><li>40% have had their password(s) stolen and changed by a bully. </li></ul><ul><li>Only 15% of parents asked knew what cyberbullying was. </li></ul>Source: wiredsafety.org
  13. 13. Vehicles for cyberbullying <ul><li>Email </li></ul><ul><li>IM – MSN </li></ul><ul><li>Social networking sites – Facebook </li></ul><ul><li>Web sites </li></ul><ul><li>Chat rooms </li></ul><ul><li>Virtual learning environments – school work sites </li></ul><ul><li>Mobile phones </li></ul><ul><li>Camera phones </li></ul><ul><li>On line and interactive games </li></ul><ul><li>Blogs & Wikis </li></ul><ul><li>Bashing site – Rate My School </li></ul><ul><li>Internet polling – Doodle </li></ul>
  14. 14. Divagirl: Hey, loser, watch your back. tmt323: What r u talking about? Divagirl: Why don't you kill yourself while u r ahead? tmt323: Why can't you just leave me alone? Divagirl: Ugly girls like u need to be put in their place. Example of cyberbullying on iChat (Apple’s instant messaging)
  15. 15. If you receive a nasty message… <ul><li>Save it. </li></ul><ul><li>Do not reply. </li></ul><ul><li>Block future messages. </li></ul><ul><li>Show it to your parents/carer or teacher . </li></ul>
  16. 16. Cyberbullying can be reported through: <ul><li>Mobile phone companies, </li></ul><ul><li>Internet service providers and </li></ul><ul><li>Social networking sites –myspace </li></ul>
  17. 17. The Law <ul><li>There are laws which may apply in terms of: </li></ul><ul><ul><li>harassment and </li></ul></ul><ul><ul><li>threatening and menacing communications. </li></ul></ul><ul><li>Your school could contact the police if they feel a law has been broken </li></ul>
  18. 18. The Anti-Cyberbullying Code <ul><li>Always respect others. </li></ul><ul><li>Think before you send. </li></ul><ul><li>Block the Bully. </li></ul><ul><li>Don’t retaliate or reply. </li></ul><ul><li>Save the evidence. </li></ul><ul><li>Make sure you tell. </li></ul><ul><li>Treat your password like your toothbrush. </li></ul><ul><li>From DCSF guidance on Cyberbullying </li></ul>

×