SlideShare a Scribd company logo
Victoria County Community Access Program Society

Cyber bullying
What is Cyber Bullying?
"Cyber bullying" is when a child or teen is
tormented, threatened, harassed, humiliated, embarra
ssed or otherwise targeted by another child or teen
using the Internet, interactive or digital technologies or
cell phones. It has to have a minor on both sides, or at
least have been instigated by a minor against another
minor. When adults become involved it is classified as
something different.
http://www.stopcyberbullying.org/what_is_cyberbullying_exactly.html
Cyber bullies often also become victims of cyber
bullying. People frequently change roles when it comes
to cyber bullying.
It can only be limited by a child’s imagination or their
access to cyber technology.
Direct Attacks…
Instant Messaging
Text Messaging
Blogs
Websites
Emailing Pictures
Stealing Passwords
Internet Polling- Hot or Not!
Hacking or sending spyware
Teen Bullying Prevention
Don't Just Stand There!
Do Something!
Watch this video of Ryan's dad. Ryan killed himself because of being
bullied.

Video was not exported from SlideRocket

5
Bullying
"By Proxy"…
Someone else does the dirty work for the main cyber
bully.
Bullies may hack into the victim’s account or steal their
password. They may set up a new account pretending
to be the victim.
Friends get angry with the victim.
This form of cyber bullying is very dangerous because
many people are involved, not just the bully and the
victim.
Why do children and teenagers
Cyber Bully?
Anger
Frustration
Revenge
Entertainment
To get Laughs or Reactions
Power Hungry
Because all motives for bullying are different so are the
solutions and responses.
Who Does This Affect?
As hinted at previously, Cyber Bullying only impacts
children.
Children of all ages can be victims of cyber bullying,
Young children, Preteens and Teenagers.
Once adults get involved with Cyber Bullying it
becomes Cyber Stalking or Cyber Harassment.
Consequences of Cyber Bullying
Anxiety
Depression
Stress Related Disorders
Suicide
Withdrawal from Friends and Activities
Changes in mood, behaviour and appetite
Emotional Distress during and after using technology
http://kidshealth.org/parent/positive/talk/cyberbullying.html#
Bullying

Video was not exported from SlideRocket
Show What You Know
Now it's time to show what you learned in
this Internet Safety Topic
You CAN come back and view any of the videos and resources in this presentation
while you complete the quiz!

IMPORTANT
Click on the link below to download and save the test.

Cyber Bullying Quiz
SAVE AS - (save to your 6th Grade Multimedia Folder)
File name: Your Last Name _ Cyber Bully Quiz

11
This presentation has been produced by Shannon
MacFadyen through Victoria County Community
Access Program’s Summer Youth Initiative (CAP YI), a
part of Canada’s Youth Employment Strategy

More Related Content

What's hot

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Zekhaya Sithole
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
Kwazi Communications
 
Cyber Bulling On School Grounds
Cyber Bulling On School GroundsCyber Bulling On School Grounds
Cyber Bulling On School Grounds
kerr1va
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
ktast
 
E safety training for staff who work with children and young people - Stephe...
E  safety training for staff who work with children and young people - Stephe...E  safety training for staff who work with children and young people - Stephe...
E safety training for staff who work with children and young people - Stephe...
Stevecd
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
Rodolfo Salazar
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
Larry Magid
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
jordan-and-haden
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2
bigmike18
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
samhauck
 
The Digital Playground
The Digital  PlaygroundThe Digital  Playground
The Digital Playground
Kim Cofino
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
bundyboy123
 
Huff591 interactivepresentationinternetclass
Huff591 interactivepresentationinternetclassHuff591 interactivepresentationinternetclass
Huff591 interactivepresentationinternetclass
chuff10
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Antolduvai
 
Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
ConnectSafely
 
Bullying [autosaved]
Bullying [autosaved]Bullying [autosaved]
Bullying [autosaved]
timlong13
 
Safer Internet Day PowerPoint
Safer Internet Day PowerPointSafer Internet Day PowerPoint
Safer Internet Day PowerPoint
Webwise
 
Pink Pecha kucha
Pink Pecha kuchaPink Pecha kucha
Pink Pecha kucha
mrparslow
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
derekdreak
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
jaenjenny
 

What's hot (20)

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Cyber Bulling On School Grounds
Cyber Bulling On School GroundsCyber Bulling On School Grounds
Cyber Bulling On School Grounds
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
E safety training for staff who work with children and young people - Stephe...
E  safety training for staff who work with children and young people - Stephe...E  safety training for staff who work with children and young people - Stephe...
E safety training for staff who work with children and young people - Stephe...
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
The Digital Playground
The Digital  PlaygroundThe Digital  Playground
The Digital Playground
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Huff591 interactivepresentationinternetclass
Huff591 interactivepresentationinternetclassHuff591 interactivepresentationinternetclass
Huff591 interactivepresentationinternetclass
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
 
Bullying [autosaved]
Bullying [autosaved]Bullying [autosaved]
Bullying [autosaved]
 
Safer Internet Day PowerPoint
Safer Internet Day PowerPointSafer Internet Day PowerPoint
Safer Internet Day PowerPoint
 
Pink Pecha kucha
Pink Pecha kuchaPink Pecha kucha
Pink Pecha kucha
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 

Similar to 6 mm cyberbullying

Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02
Joyce Hirsh
 
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
cyberbullyingisreal
 
Cyber bullying project
Cyber bullying projectCyber bullying project
Cyber bullying project
volpila
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
seswear9388
 
Sarah doty cyber bullying
Sarah doty cyber bullyingSarah doty cyber bullying
Sarah doty cyber bullying
Sarah Doty
 
Edp 279 unit 2.4
Edp 279 unit 2.4Edp 279 unit 2.4
Edp 279 unit 2.4
MadelineReidV
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
kgoldberg01
 
cyberbullying among teenagers .pdf
cyberbullying among teenagers .pdfcyberbullying among teenagers .pdf
cyberbullying among teenagers .pdf
awatefalshehhi2
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Marisol Herrera
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
pardolopez
 
Powerpoint
PowerpointPowerpoint
Powerpoint
ctbagnieski
 
Powerpoint
PowerpointPowerpoint
Powerpoint
ctbagnieski
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
21rahul1999
 
Powerpoint
PowerpointPowerpoint
Powerpoint
ctbagnieski
 
Cyber bullying ppt11 02-12
Cyber bullying ppt11 02-12Cyber bullying ppt11 02-12
Cyber bullying ppt11 02-12
caroline2012cox
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
Karen Brooks
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and Technology
Di Doersch
 
Social justice
Social justiceSocial justice
Social justice
km03john
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The Internet
Debra Boardman
 
How to stop cyber bullying
How to stop cyber bullyingHow to stop cyber bullying
How to stop cyber bullying
Bullyvention
 

Similar to 6 mm cyberbullying (20)

Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02
 
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
 
Cyber bullying project
Cyber bullying projectCyber bullying project
Cyber bullying project
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
 
Sarah doty cyber bullying
Sarah doty cyber bullyingSarah doty cyber bullying
Sarah doty cyber bullying
 
Edp 279 unit 2.4
Edp 279 unit 2.4Edp 279 unit 2.4
Edp 279 unit 2.4
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
cyberbullying among teenagers .pdf
cyberbullying among teenagers .pdfcyberbullying among teenagers .pdf
cyberbullying among teenagers .pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Cyber bullying ppt11 02-12
Cyber bullying ppt11 02-12Cyber bullying ppt11 02-12
Cyber bullying ppt11 02-12
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and Technology
 
Social justice
Social justiceSocial justice
Social justice
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The Internet
 
How to stop cyber bullying
How to stop cyber bullyingHow to stop cyber bullying
How to stop cyber bullying
 

More from lisamholden

6 mm protect_yourself_protect_others
6 mm protect_yourself_protect_others6 mm protect_yourself_protect_others
6 mm protect_yourself_protect_others
lisamholden
 
6 kb educate_yourself_connect_with_others
6 kb educate_yourself_connect_with_others6 kb educate_yourself_connect_with_others
6 kb educate_yourself_connect_with_others
lisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
lisamholden
 
6 mm protect_yourself_protect_others
6 mm protect_yourself_protect_others6 mm protect_yourself_protect_others
6 mm protect_yourself_protect_others
lisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
lisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
lisamholden
 
6 kb educate_yourself_connect_with_others
6 kb educate_yourself_connect_with_others6 kb educate_yourself_connect_with_others
6 kb educate_yourself_connect_with_others
lisamholden
 
6 mm protect_yourself_protect_others
6 mm protect_yourself_protect_others6 mm protect_yourself_protect_others
6 mm protect_yourself_protect_others
lisamholden
 
6 kb educate_yourself_connect_with_others
6 kb educate_yourself_connect_with_others6 kb educate_yourself_connect_with_others
6 kb educate_yourself_connect_with_others
lisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
lisamholden
 

More from lisamholden (10)

6 mm protect_yourself_protect_others
6 mm protect_yourself_protect_others6 mm protect_yourself_protect_others
6 mm protect_yourself_protect_others
 
6 kb educate_yourself_connect_with_others
6 kb educate_yourself_connect_with_others6 kb educate_yourself_connect_with_others
6 kb educate_yourself_connect_with_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
6 mm protect_yourself_protect_others
6 mm protect_yourself_protect_others6 mm protect_yourself_protect_others
6 mm protect_yourself_protect_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
6 kb educate_yourself_connect_with_others
6 kb educate_yourself_connect_with_others6 kb educate_yourself_connect_with_others
6 kb educate_yourself_connect_with_others
 
6 mm protect_yourself_protect_others
6 mm protect_yourself_protect_others6 mm protect_yourself_protect_others
6 mm protect_yourself_protect_others
 
6 kb educate_yourself_connect_with_others
6 kb educate_yourself_connect_with_others6 kb educate_yourself_connect_with_others
6 kb educate_yourself_connect_with_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 

Recently uploaded

labb123456789123456789123456789123456789
labb123456789123456789123456789123456789labb123456789123456789123456789123456789
labb123456789123456789123456789123456789
Ghh
 
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
GabrielleSinaga
 
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAANBUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
cahgading001
 
Leadership Ambassador club Adventist module
Leadership Ambassador club Adventist moduleLeadership Ambassador club Adventist module
Leadership Ambassador club Adventist module
kakomaeric00
 
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
NWEXAM
 
Introducing Gopay Mobile App For Environment.pptx
Introducing Gopay Mobile App For Environment.pptxIntroducing Gopay Mobile App For Environment.pptx
Introducing Gopay Mobile App For Environment.pptx
FauzanHarits1
 
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
2zjra9bn
 
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
dsnow9802
 
Learnings from Successful Jobs Searchers
Learnings from Successful Jobs SearchersLearnings from Successful Jobs Searchers
Learnings from Successful Jobs Searchers
Bruce Bennett
 
Tape Measure Training & Practice Assessments.pdf
Tape Measure Training & Practice Assessments.pdfTape Measure Training & Practice Assessments.pdf
Tape Measure Training & Practice Assessments.pdf
KateRobinson68
 
A Guide to a Winning Interview June 2024
A Guide to a Winning Interview June 2024A Guide to a Winning Interview June 2024
A Guide to a Winning Interview June 2024
Bruce Bennett
 
Leave-rules.ppt CCS leave rules 1972 for central govt employees
Leave-rules.ppt CCS leave rules 1972 for central govt employeesLeave-rules.ppt CCS leave rules 1972 for central govt employees
Leave-rules.ppt CCS leave rules 1972 for central govt employees
Sreenivas702647
 
IT Career Hacks Navigate the Tech Jungle with a Roadmap
IT Career Hacks Navigate the Tech Jungle with a RoadmapIT Career Hacks Navigate the Tech Jungle with a Roadmap
IT Career Hacks Navigate the Tech Jungle with a Roadmap
Base Camp
 
Job Finding Apps Everything You Need to Know in 2024
Job Finding Apps Everything You Need to Know in 2024Job Finding Apps Everything You Need to Know in 2024
Job Finding Apps Everything You Need to Know in 2024
SnapJob
 
Resumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineResumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying Online
Bruce Bennett
 
0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf
Thomas GIRARD BDes
 
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
taqyea
 
lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789
Ghh
 
thyroid case presentation.pptx Kamala's Lakshaman palatial
thyroid case presentation.pptx Kamala's Lakshaman palatialthyroid case presentation.pptx Kamala's Lakshaman palatial
thyroid case presentation.pptx Kamala's Lakshaman palatial
Aditya Raghav
 
5 Common Mistakes to Avoid During the Job Application Process.pdf
5 Common Mistakes to Avoid During the Job Application Process.pdf5 Common Mistakes to Avoid During the Job Application Process.pdf
5 Common Mistakes to Avoid During the Job Application Process.pdf
Alliance Jobs
 

Recently uploaded (20)

labb123456789123456789123456789123456789
labb123456789123456789123456789123456789labb123456789123456789123456789123456789
labb123456789123456789123456789123456789
 
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
 
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAANBUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
 
Leadership Ambassador club Adventist module
Leadership Ambassador club Adventist moduleLeadership Ambassador club Adventist module
Leadership Ambassador club Adventist module
 
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
 
Introducing Gopay Mobile App For Environment.pptx
Introducing Gopay Mobile App For Environment.pptxIntroducing Gopay Mobile App For Environment.pptx
Introducing Gopay Mobile App For Environment.pptx
 
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
 
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
 
Learnings from Successful Jobs Searchers
Learnings from Successful Jobs SearchersLearnings from Successful Jobs Searchers
Learnings from Successful Jobs Searchers
 
Tape Measure Training & Practice Assessments.pdf
Tape Measure Training & Practice Assessments.pdfTape Measure Training & Practice Assessments.pdf
Tape Measure Training & Practice Assessments.pdf
 
A Guide to a Winning Interview June 2024
A Guide to a Winning Interview June 2024A Guide to a Winning Interview June 2024
A Guide to a Winning Interview June 2024
 
Leave-rules.ppt CCS leave rules 1972 for central govt employees
Leave-rules.ppt CCS leave rules 1972 for central govt employeesLeave-rules.ppt CCS leave rules 1972 for central govt employees
Leave-rules.ppt CCS leave rules 1972 for central govt employees
 
IT Career Hacks Navigate the Tech Jungle with a Roadmap
IT Career Hacks Navigate the Tech Jungle with a RoadmapIT Career Hacks Navigate the Tech Jungle with a Roadmap
IT Career Hacks Navigate the Tech Jungle with a Roadmap
 
Job Finding Apps Everything You Need to Know in 2024
Job Finding Apps Everything You Need to Know in 2024Job Finding Apps Everything You Need to Know in 2024
Job Finding Apps Everything You Need to Know in 2024
 
Resumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineResumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying Online
 
0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf
 
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
 
lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789
 
thyroid case presentation.pptx Kamala's Lakshaman palatial
thyroid case presentation.pptx Kamala's Lakshaman palatialthyroid case presentation.pptx Kamala's Lakshaman palatial
thyroid case presentation.pptx Kamala's Lakshaman palatial
 
5 Common Mistakes to Avoid During the Job Application Process.pdf
5 Common Mistakes to Avoid During the Job Application Process.pdf5 Common Mistakes to Avoid During the Job Application Process.pdf
5 Common Mistakes to Avoid During the Job Application Process.pdf
 

6 mm cyberbullying

  • 1. Victoria County Community Access Program Society Cyber bullying
  • 2. What is Cyber Bullying? "Cyber bullying" is when a child or teen is tormented, threatened, harassed, humiliated, embarra ssed or otherwise targeted by another child or teen using the Internet, interactive or digital technologies or cell phones. It has to have a minor on both sides, or at least have been instigated by a minor against another minor. When adults become involved it is classified as something different. http://www.stopcyberbullying.org/what_is_cyberbullying_exactly.html
  • 3. Cyber bullies often also become victims of cyber bullying. People frequently change roles when it comes to cyber bullying. It can only be limited by a child’s imagination or their access to cyber technology.
  • 4. Direct Attacks… Instant Messaging Text Messaging Blogs Websites Emailing Pictures Stealing Passwords Internet Polling- Hot or Not! Hacking or sending spyware
  • 5. Teen Bullying Prevention Don't Just Stand There! Do Something! Watch this video of Ryan's dad. Ryan killed himself because of being bullied. Video was not exported from SlideRocket 5
  • 6. Bullying "By Proxy"… Someone else does the dirty work for the main cyber bully. Bullies may hack into the victim’s account or steal their password. They may set up a new account pretending to be the victim. Friends get angry with the victim. This form of cyber bullying is very dangerous because many people are involved, not just the bully and the victim.
  • 7. Why do children and teenagers Cyber Bully? Anger Frustration Revenge Entertainment To get Laughs or Reactions Power Hungry Because all motives for bullying are different so are the solutions and responses.
  • 8. Who Does This Affect? As hinted at previously, Cyber Bullying only impacts children. Children of all ages can be victims of cyber bullying, Young children, Preteens and Teenagers. Once adults get involved with Cyber Bullying it becomes Cyber Stalking or Cyber Harassment.
  • 9. Consequences of Cyber Bullying Anxiety Depression Stress Related Disorders Suicide Withdrawal from Friends and Activities Changes in mood, behaviour and appetite Emotional Distress during and after using technology http://kidshealth.org/parent/positive/talk/cyberbullying.html#
  • 10. Bullying Video was not exported from SlideRocket
  • 11. Show What You Know Now it's time to show what you learned in this Internet Safety Topic You CAN come back and view any of the videos and resources in this presentation while you complete the quiz! IMPORTANT Click on the link below to download and save the test. Cyber Bullying Quiz SAVE AS - (save to your 6th Grade Multimedia Folder) File name: Your Last Name _ Cyber Bully Quiz 11
  • 12.
  • 13. This presentation has been produced by Shannon MacFadyen through Victoria County Community Access Program’s Summer Youth Initiative (CAP YI), a part of Canada’s Youth Employment Strategy