Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Cyberbullying   <ul><li>Baluch, Saad  </li></ul><ul><li>Bogner, Laurence  </li></ul><ul><li>November 27, 2009 </li></ul>(1...
Table of contents: <ul><li>What is cyberbullying? </li></ul><ul><li>Who are the people involved? </li></ul><ul><li>Why is ...
1-What is cyberbullying? (2) HHOJ LOL YRDM YBS SOHF
“ Cyberbullying: High-Tech Harassment in the Net Neighborhood”(3) <ul><li>Getting the target to reveal sensitive personal ...
<ul><li>I shall remember forever and will never forget </li></ul><ul><li>Monday: My money was taken. </li></ul><ul><li>Tue...
Who is being cyber bullied?  <ul><li>“ Targeted youth  are at risk for joining online communities of youth or adults who n...
Who is the cyberbully? <ul><li>-Anonymous bully </li></ul><ul><ul><li>Internet gaming: </li></ul></ul><ul><ul><ul><li>Play...
Focus on the “bystanders” <ul><li>Bystanders become anonymous :  You don’t know who else has seen the hurtful messages sin...
3-Why is cyber bullying hard to stop? <ul><li>Bullies can reach you  any time and any place  as long as one computer or on...
Cyberbullying by “proxy”  or cyberbullied “spammed”? <ul><ul><li>the “bystanders”  </li></ul></ul><ul><ul><li>an Internet ...
Summary Conclusion  <ul><li>Cyber bulling could be affecting everybody: it is hard to stop because it is anonymous, fast a...
References <ul><li>http://news.cnet.com/newsblog/?keyword=cyberbullying  </li></ul><ul><li>http://putastoptobullyingnow.co...
Sources <ul><li>http://www.connectsafely.org/Safety-Advice-Articles/about-cyberbullying-for-parents-educators.html </li></...
<ul><li>Thank you. </li></ul><ul><li>            </li></ul><ul><ul><ul><ul><ul><li>   Are there any questions? </li></ul><...
Upcoming SlideShare
Loading in …5
×

Cyberbullying No27 2009 Laurence And Saad

1,181 views

Published on

Cyberbullying Presentation

Published in: Health & Medicine, Technology
  • Be the first to comment

  • Be the first to like this

Cyberbullying No27 2009 Laurence And Saad

  1. 1. Cyberbullying <ul><li>Baluch, Saad </li></ul><ul><li>Bogner, Laurence </li></ul><ul><li>November 27, 2009 </li></ul>(1) Why should you be concerned?
  2. 2. Table of contents: <ul><li>What is cyberbullying? </li></ul><ul><li>Who are the people involved? </li></ul><ul><li>Why is it hard to stop? </li></ul>
  3. 3. 1-What is cyberbullying? (2) HHOJ LOL YRDM YBS SOHF
  4. 4. “ Cyberbullying: High-Tech Harassment in the Net Neighborhood”(3) <ul><li>Getting the target to reveal sensitive personal information </li></ul><ul><ul><li>Stealing password and impersonating them online </li></ul></ul><ul><ul><li>Using accomplices </li></ul></ul><ul><li>Flaming to enrage the target: </li></ul><ul><ul><li>Sending or posting hateful emails, instant messages or text messages </li></ul></ul><ul><ul><li>Developing a website that rates someone’s appearance or popularity (private or embarrassing photos online) </li></ul></ul><ul><li>Hurting by humiliating the target </li></ul><ul><ul><li>Using a buddy list to threat someone via instant messaging or e-mailing </li></ul></ul><ul><ul><li>Spreading lies, rumours or secrets online </li></ul></ul><ul><ul><li>Making false complaints to a website administrator, cell phone provider or Internet service provider about someone else’s online behaviour </li></ul></ul><ul><li>Example(4 ) </li></ul><ul><li> </li></ul>
  5. 5. <ul><li>I shall remember forever and will never forget </li></ul><ul><li>Monday: My money was taken. </li></ul><ul><li>Tuesday: names called. </li></ul><ul><li>Wednesday: my uniform torn. </li></ul><ul><li>Thursday: my body pouring with blood. </li></ul><ul><li>Friday: it’s ended. </li></ul><ul><li>Saturday: Freedom. ( 6 ) </li></ul>2- Who are involved? Every body is affected… (5)
  6. 6. Who is being cyber bullied? <ul><li>“ Targeted youth are at risk for joining online communities of youth or adults who normalize, encourage, reinforce unhealthy, harmful or antisocial activities” (7). </li></ul><ul><li>The “ new” on the block, on work </li></ul><ul><li>The “ youngest” in the school, college or university </li></ul><ul><li>The “ submissive” , anxious and lacking self confidence </li></ul><ul><li>The “ poor” who can’t conform to norm </li></ul><ul><li>The “fat guy”, thin, acne, skin condition </li></ul><ul><li>The “ different ” gifted, with physical/mental disabilities. </li></ul><ul><li>The “immigrant” coming from an ethnicity minority </li></ul><ul><li>The “gay”: the one with gender/sexual orientation </li></ul>
  7. 7. Who is the cyberbully? <ul><li>-Anonymous bully </li></ul><ul><ul><li>Internet gaming: </li></ul></ul><ul><ul><ul><li>Players from around the world can play with or against one another </li></ul></ul></ul><ul><ul><li>Internet polling </li></ul></ul><ul><ul><ul><li>“ Who is the biggest slut in your College?” </li></ul></ul></ul><ul><ul><ul><li>“ Who is the ugliest in your class?” </li></ul></ul></ul><ul><ul><ul><li>“ Who should die?”(8) </li></ul></ul></ul><ul><ul><li>Message board </li></ul></ul><ul><ul><ul><li>Chatting online about a common interest </li></ul></ul></ul>(9)
  8. 8. Focus on the “bystanders” <ul><li>Bystanders become anonymous : You don’t know who else has seen the hurtful messages since the Internet is public </li></ul><ul><li>Do not defend the one being bullied. </li></ul><ul><li>Can carry an allegiance to the bully who looks popular, strong, daring role model </li></ul><ul><li>Involved in 85% of the bullying episode, becoming a bunch of bullies </li></ul><ul><li>Reinforced the antisocial behavior of the bully in 81 % of the episodes (10) </li></ul>
  9. 9. 3-Why is cyber bullying hard to stop? <ul><li>Bullies can reach you any time and any place as long as one computer or one cell phone is on </li></ul><ul><li>Cyber bullying by proxy </li></ul><ul><li>Manipulation of language make us confused who is who </li></ul>(10)
  10. 10. Cyberbullying by “proxy” or cyberbullied “spammed”? <ul><ul><li>the “bystanders” </li></ul></ul><ul><ul><li>an Internet service provider with “Warning” and “Notify wars” </li></ul></ul><ul><ul><li>The parent’s target or the school, college, university personnel </li></ul></ul><ul><ul><li>“ A hate group or sex solicitation chat rooms”(12) </li></ul></ul>(11)
  11. 11. Summary Conclusion <ul><li>Cyber bulling could be affecting everybody: it is hard to stop because it is anonymous, fast and sometimes vicious. </li></ul><ul><li>Report abusive behaviour is not an eventuality: it should be immediate </li></ul><ul><li>“ It is not tattling, snitching, ratting, or squealing to tell (…) that their friend who has been tormented by peers is giving his possessions away and saying subtle good-byes to classmates.” (14) </li></ul>(13)
  12. 12. References <ul><li>http://news.cnet.com/newsblog/?keyword=cyberbullying </li></ul><ul><li>http://putastoptobullyingnow.com/images/cyberbullying2_05.jpg </li></ul><ul><li>Coloroso, Barbara. The Bully, the Bullied, and the Bystander: From Pre-school to High School: How parents and Teachers Can Help Break the Cycle of Violence. Chapter 10 (Title). 2008. New York. ISBN 978-006-1744600 HarperCollins Publishers Ltd. http://browseinside.harpercollins.com/index.aspx?isbn13=9780061744600 </li></ul><ul><li>http://www.youtube.com/watch?v=amueaVHIZ6A </li></ul><ul><li>http://www.thepicky.com/images/2009/07/cyberbullying.jpg </li></ul><ul><li>Neil Marr and Tim Field ,Bullycide, Death and Playtime: An Expose of Child Suicide Caused by Bullying.(2)2. “ The Bully, The bullied , and the Bystander” copy right 2006 Barbara Coloroso ISBN- 13:978-0-00-639420-4 </li></ul><ul><li>Coloroso, Barbara. Ibid. Page 207. </li></ul><ul><li>Ibid . Page 66 </li></ul><ul><li>http://bobmccarty.com/wp-content/uploads/2009/05/bmw-cyber-bully.jpg </li></ul><ul><li>http://www.techdigest.tv/bullying.jpg </li></ul><ul><li>http://www.mediabistro.com/agencyspy/original/cyberbully.jpg </li></ul><ul><li>Ibid . Page 217. </li></ul><ul><li>http://www.tamaleaver.net/wordpress/wp-content/uploads/2007/03/windowslivewriterstopcyberbullyingday-cba902cyberbully2501.jpg </li></ul><ul><li>Ibid . page 135 </li></ul>
  13. 13. Sources <ul><li>http://www.connectsafely.org/Safety-Advice-Articles/about-cyberbullying-for-parents-educators.html </li></ul><ul><li>Kowalski, Limber and Agatston. Cyber Bullying in the Digital Age. Blackwell Publishing. 2007. http://www.cyberbullyhelp.com/index.htm Web November 24, 2009. </li></ul><ul><li>http://parentingmethods.suite101.com/article.cfm/cyberbullying#ixzz0XcDK7Plh </li></ul><ul><li>“ Mom in MySpace hoax pleads not guilty” CNET News. June 16, 2008. http://news.cnet.com/newsblog/?keyword=cyberbullying Web. November 24, 2009. </li></ul><ul><li>http://www.kidshelpphone.ca/en/informed/cyberbullying/ </li></ul><ul><li>http://videos.torontosun.com/video/featured/toronto-and-gta/5745370001/study-on-cyber-bullying/9917606001 </li></ul><ul><li>http://www.cyberbullyhelp.com/ABCsofCyberBullyingforStudents.pdf </li></ul><ul><li>http://www.cyberbullying.ca/pdf/Cyberbullying_Information.pdf </li></ul><ul><li>-- </li></ul>
  14. 14. <ul><li>Thank you. </li></ul><ul><li>            </li></ul><ul><ul><ul><ul><ul><li>   Are there any questions? </li></ul></ul></ul></ul></ul>

×