SlideShare a Scribd company logo
Cyber
Bullying

  United Against Violence
  Of Greater Dayton
What is Cyber
Bullying?
 Cyber Bullying is when a child is tormented,
  threatened, harassed, humiliated,
  embarrassed or otherwise targeted by
  another child using the Internet, interactive
  and digital technologies or cell phones. It
  has to have a minor on both sides, or at
  least have been instigated by a minor
  against another minor.
Cyber Bullies
    use…
 Social Networks : Facebook, My
  Space, Chat rooms
 E-mail
 Cell phones
 Instant messaging
 Bashing web sites
Bullying -Versus-
      Cyber Bullying
    Bullying                  Cyber Bullying
 Direct                     Can be anonymous
 Occurs on school           Usually occurs off school
  property                    property
 Poor relationships with    Good relationships with
  teachers                    teachers
 Fear retribution           Fear loss of privileges
  (Physical, Verbal and       (computer and cell
  Nonverbal)                  phones taken away)
                             Farther under the radar
                              than bullying
Types of Cyber
                      Bullying
 Cyber stalking: Repeatedly sending messages that
  include threats of harm or are highly intimidating
 Denigration: “Dissing” someone online. Sending or
  posting cruel gossip or rumors about a person
 Flaming: Online fights using messages with angry and
  vulgar language
 Harassment: Repeatedly sending offensive, rude, and
  insulting messages
 Impersonation: Pretending to be someone else and
  sending or posting material that makes a person look
  bad, gets them in trouble, or damages that person’s
  reputation or friendships
What
   Statistics say
 65% of kids between 8-14 have been involved directly or
  indirectly in a cyber bullying incident as the cyber bully,
  victim or friend.
 42% of kids have been bullied online. 35% have been
  threatened online.
 53% of kids admit to saying mean or hurtful things to
  someone online.
 50% has seen or heard of a website that bashes another
  student. 75% has visited a bashing website.
 90% of middle school students polled have had their
  feelings hurt online.
 58% of victims have not told their parents about the cyber
  bullying.
Why do kids cyber
        bully?
 They are often motivated by anger, revenge or frustration.
 Sometimes they do it for entertainment or because they
  are bored and have too much time on their hands.
 Many do it for laughs or to get a reaction.
 Some do it by accident, and either send a message to the
  wrong recipient or didn't think before they did something.
 The Power-hungry do it to torment others and for their ego.
 Mean girls do it to help boost or remind people of their own
  social standing.
 Some think they are righting wrong and standing up for
  others.
Preventing cyber
     bullying
-What parents can do-
  Discuss cyber bullying with your child.
  Educating the kids about the consequences (losing
   their cell phone and/or computer privileges) helps.
  Teaching them to respect others and to take a stand
   against bullying of all kinds helps too.

  Supervise and increase effective monitoring of the
   internet
  Know what your child is doing online and with their cell
   phones.
  Get to know your children's friends, are they the type of
   kids that are positive influences.
Preventing cyber
     bullying
-what kids can do -
 Block the cyber bully. You do not have to have
  them on your friends list.
 Ignore them. If you do not respond to a negative
  text, email, or comment online then the person
  may just calm down. It might take a while but be
  patient.
 Tell an adult if messages are continuous,
  threatening, or it’s affecting your daily routine.
 Talk, talk, talk to your parents or a trusted adult.
Preventing cyber
             bullying
     -what schools can do -
 Focus on values of kindness, respect,
  compassion, tolerance, and forgiveness.
 Develop problem solving skills.
 Provide staff, parent, and student
  education.
 Empower bystanders to speak up.
 Have written policies that address all types
  of bullying.
Help for victims of
      bullying
 Family supports, communication is the
  key to being supportive, listening to them
  and being there to talk.
 In-School counseling.
 Outside referral counseling.
 Anger management groups.
 Conflict resolution education.
What are the                         laws?
   House Bill                         276
 Sec. 3313.666. (A) As used in this section,
  "harassment, intimidation, or bullying" means any
  intentional written, verbal, or physical act that a
  student has exhibited toward another particular
  student more than once and the behavior both:
 (1) Causes mental or physical harm to the other
  student;
 (2) Is sufficiently severe, persistent, or pervasive
  that it creates an intimidating, threatening, or
  abusive educational environment for the other
  student.
What are the laws?
   Senate Bill 126(Pending)
      Introduced to senate in March 2011

 Sec. 3313.666. (A) As used in this section,
  "harassment:
 (1) "Electronic act" means an act committed through
  the use of a cellular telephone, computer, pager,
  personal communication device, or other electronic
  communication device.
 (2) "Harassment, intimidation, or bullying" means any
  intentional written, verbal, electronic, or physical act
  that a student has exhibited toward another particular
  student more than once and the behavior both:
 (1)(a) Causes mental or physical harm to the other
  student;
 (2)(b) Is sufficiently severe, persistent, or pervasive
  that it creates an intimidating, threatening, or abusive
  educational environment for the other student.
www.stopviolence.
      org
Works Sited-

               www.stopcyberbullying.org
              www.stopbullyingnow.hrsa.gov
                     www.isafe.org
                  www.facs.pppst.com
               www.legislature.state.oh.us

       Demysifying and Deescalating Cyber Bullying
                  Barbara Trolly, Ph.D. CRC
      Connie Hanel, M.S.E.d & Linda Shields, M.S.E.d
                   McKenna & Bargh, 2004
                   Ybarra & Mitchell, 2004
                  Nancy Willard, M.S., J.D.,
Director of the Center for Safe and Responsible Internet Use
Images sited
     Microsoft Clip Art
  Captaincollo.blogspot.com
          My.hsj.org
   Nikkihut.blogspot.com
    bullyingpictures.com
    Mainstreethardy.com
        Clipartof.com
  Healthylifestyles-news.org

More Related Content

What's hot

Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
Bonnie Martinez
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
kgoldberg01
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
Larry Magid
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Yumna Ali
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
Karissa Joy Daculap
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
mcgeet
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
bgmartinez1971
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Veronica Alejandro
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
SearchLock
 
Anti-bullying Presentation #1
Anti-bullying Presentation #1Anti-bullying Presentation #1
Anti-bullying Presentation #1
itunaschool
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
CarlosE15
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
Department of Defense
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power point
mb29thom
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
harriscountypubliclibrary
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Regina Marbun
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
Pamela Moeai
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
CoachElrod
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
br03wood
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Andreareyeshdz
 
Bullying
BullyingBullying
Bullying
coolmum4u
 

What's hot (20)

Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Anti-bullying Presentation #1
Anti-bullying Presentation #1Anti-bullying Presentation #1
Anti-bullying Presentation #1
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power point
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Bullying
BullyingBullying
Bullying
 

Viewers also liked

Cyberbullying power pot student copy
Cyberbullying  power pot student copyCyberbullying  power pot student copy
Cyberbullying power pot student copy
brlewis1971
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
zackkay
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
bl03cook
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Luísa Lima
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
wirsi
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
buech1cj
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?
AJ Tivol
 
Cyber Bullying Presentation
Cyber Bullying PresentationCyber Bullying Presentation
Cyber Bullying Presentation
amate1cl
 
Aet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingAet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullying
cschoeneman
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullying
Melissa
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
digitalworld12
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
Miriam Pananaliksik
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
Ziar Khan
 
The Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingThe Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber Bullying
Katie_Waters
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
tackleglass54
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
HDCH
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
katnaylan
 
cyber bullying parent workshop 2012
cyber bullying parent workshop 2012cyber bullying parent workshop 2012
cyber bullying parent workshop 2012
atomikey
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
bolan1jt
 

Viewers also liked (20)

Cyberbullying power pot student copy
Cyberbullying  power pot student copyCyberbullying  power pot student copy
Cyberbullying power pot student copy
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?
 
Cyber Bullying Presentation
Cyber Bullying PresentationCyber Bullying Presentation
Cyber Bullying Presentation
 
Aet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingAet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullying
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
The Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingThe Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber Bullying
 
491 nasilje na internetu
491 nasilje na internetu491 nasilje na internetu
491 nasilje na internetu
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
 
cyber bullying parent workshop 2012
cyber bullying parent workshop 2012cyber bullying parent workshop 2012
cyber bullying parent workshop 2012
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 

Similar to Cyber Bullying

Olmv cyberbullying
Olmv cyberbullyingOlmv cyberbullying
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
Karen Brooks
 
Sarah doty cyber bullying
Sarah doty cyber bullyingSarah doty cyber bullying
Sarah doty cyber bullying
Sarah Doty
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
sepulvedamd
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
damarissepulveda
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
Carla Hockenbury
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
Central Queensland University
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
Central Queensland University
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
Doctora2017
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
John Field
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
John Field
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
R Smith
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
R Smith
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
TechnoArmor Consulting
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
alanrgibson41217
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
CharanBobby69CB
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
R Smith
 
Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshare
Erickson Martinez
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
drumcut
 

Similar to Cyber Bullying (20)

Olmv cyberbullying
Olmv cyberbullyingOlmv cyberbullying
Olmv cyberbullying
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Sarah doty cyber bullying
Sarah doty cyber bullyingSarah doty cyber bullying
Sarah doty cyber bullying
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshare
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

More from Joe Gauder

UAVGD - Violent Crime Update Q4 2017
UAVGD - Violent Crime Update Q4 2017UAVGD - Violent Crime Update Q4 2017
UAVGD - Violent Crime Update Q4 2017
Joe Gauder
 
SBH Stop Violence Crime Stats Q3 2016
SBH Stop Violence Crime Stats Q3 2016SBH Stop Violence Crime Stats Q3 2016
SBH Stop Violence Crime Stats Q3 2016
Joe Gauder
 
Uav gun crime 2016 q1-2 update_mcsoupdatefromnancy
Uav gun crime 2016 q1-2 update_mcsoupdatefromnancyUav gun crime 2016 q1-2 update_mcsoupdatefromnancy
Uav gun crime 2016 q1-2 update_mcsoupdatefromnancy
Joe Gauder
 
UAVGD Crime Stats - 4th Quarter 2015
UAVGD Crime Stats - 4th Quarter 2015UAVGD Crime Stats - 4th Quarter 2015
UAVGD Crime Stats - 4th Quarter 2015
Joe Gauder
 
United Against Violence - Gun Crime 2014 Q4 Update
United Against Violence - Gun Crime 2014 Q4 UpdateUnited Against Violence - Gun Crime 2014 Q4 Update
United Against Violence - Gun Crime 2014 Q4 Update
Joe Gauder
 
SBH UAV Gun Crime 2014 Q3 Stats
SBH UAV Gun Crime 2014 Q3 StatsSBH UAV Gun Crime 2014 Q3 Stats
SBH UAV Gun Crime 2014 Q3 Stats
Joe Gauder
 
United Against Violence - Gun Crime - 2014 - Q2
United Against Violence - Gun Crime - 2014 - Q2United Against Violence - Gun Crime - 2014 - Q2
United Against Violence - Gun Crime - 2014 - Q2
Joe Gauder
 
Uav gun-crime-2013-eoy-update
Uav gun-crime-2013-eoy-updateUav gun-crime-2013-eoy-update
Uav gun-crime-2013-eoy-update
Joe Gauder
 
Uav gun crime 2013_q3 update
Uav gun crime 2013_q3 updateUav gun crime 2013_q3 update
Uav gun crime 2013_q3 update
Joe Gauder
 
Uav gun crime 2013_q2 update
Uav gun crime 2013_q2 updateUav gun crime 2013_q2 update
Uav gun crime 2013_q2 update
Joe Gauder
 
Dayton Gun and Violent Crime Statistics
Dayton Gun and Violent Crime StatisticsDayton Gun and Violent Crime Statistics
Dayton Gun and Violent Crime Statistics
Joe Gauder
 

More from Joe Gauder (11)

UAVGD - Violent Crime Update Q4 2017
UAVGD - Violent Crime Update Q4 2017UAVGD - Violent Crime Update Q4 2017
UAVGD - Violent Crime Update Q4 2017
 
SBH Stop Violence Crime Stats Q3 2016
SBH Stop Violence Crime Stats Q3 2016SBH Stop Violence Crime Stats Q3 2016
SBH Stop Violence Crime Stats Q3 2016
 
Uav gun crime 2016 q1-2 update_mcsoupdatefromnancy
Uav gun crime 2016 q1-2 update_mcsoupdatefromnancyUav gun crime 2016 q1-2 update_mcsoupdatefromnancy
Uav gun crime 2016 q1-2 update_mcsoupdatefromnancy
 
UAVGD Crime Stats - 4th Quarter 2015
UAVGD Crime Stats - 4th Quarter 2015UAVGD Crime Stats - 4th Quarter 2015
UAVGD Crime Stats - 4th Quarter 2015
 
United Against Violence - Gun Crime 2014 Q4 Update
United Against Violence - Gun Crime 2014 Q4 UpdateUnited Against Violence - Gun Crime 2014 Q4 Update
United Against Violence - Gun Crime 2014 Q4 Update
 
SBH UAV Gun Crime 2014 Q3 Stats
SBH UAV Gun Crime 2014 Q3 StatsSBH UAV Gun Crime 2014 Q3 Stats
SBH UAV Gun Crime 2014 Q3 Stats
 
United Against Violence - Gun Crime - 2014 - Q2
United Against Violence - Gun Crime - 2014 - Q2United Against Violence - Gun Crime - 2014 - Q2
United Against Violence - Gun Crime - 2014 - Q2
 
Uav gun-crime-2013-eoy-update
Uav gun-crime-2013-eoy-updateUav gun-crime-2013-eoy-update
Uav gun-crime-2013-eoy-update
 
Uav gun crime 2013_q3 update
Uav gun crime 2013_q3 updateUav gun crime 2013_q3 update
Uav gun crime 2013_q3 update
 
Uav gun crime 2013_q2 update
Uav gun crime 2013_q2 updateUav gun crime 2013_q2 update
Uav gun crime 2013_q2 update
 
Dayton Gun and Violent Crime Statistics
Dayton Gun and Violent Crime StatisticsDayton Gun and Violent Crime Statistics
Dayton Gun and Violent Crime Statistics
 

Recently uploaded

Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 

Cyber Bullying

  • 1. Cyber Bullying United Against Violence Of Greater Dayton
  • 2. What is Cyber Bullying?  Cyber Bullying is when a child is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child using the Internet, interactive and digital technologies or cell phones. It has to have a minor on both sides, or at least have been instigated by a minor against another minor.
  • 3. Cyber Bullies use…  Social Networks : Facebook, My Space, Chat rooms  E-mail  Cell phones  Instant messaging  Bashing web sites
  • 4. Bullying -Versus- Cyber Bullying Bullying Cyber Bullying  Direct  Can be anonymous  Occurs on school  Usually occurs off school property property  Poor relationships with  Good relationships with teachers teachers  Fear retribution  Fear loss of privileges (Physical, Verbal and (computer and cell Nonverbal) phones taken away)  Farther under the radar than bullying
  • 5. Types of Cyber Bullying  Cyber stalking: Repeatedly sending messages that include threats of harm or are highly intimidating  Denigration: “Dissing” someone online. Sending or posting cruel gossip or rumors about a person  Flaming: Online fights using messages with angry and vulgar language  Harassment: Repeatedly sending offensive, rude, and insulting messages  Impersonation: Pretending to be someone else and sending or posting material that makes a person look bad, gets them in trouble, or damages that person’s reputation or friendships
  • 6. What Statistics say  65% of kids between 8-14 have been involved directly or indirectly in a cyber bullying incident as the cyber bully, victim or friend.  42% of kids have been bullied online. 35% have been threatened online.  53% of kids admit to saying mean or hurtful things to someone online.  50% has seen or heard of a website that bashes another student. 75% has visited a bashing website.  90% of middle school students polled have had their feelings hurt online.  58% of victims have not told their parents about the cyber bullying.
  • 7. Why do kids cyber bully?  They are often motivated by anger, revenge or frustration.  Sometimes they do it for entertainment or because they are bored and have too much time on their hands.  Many do it for laughs or to get a reaction.  Some do it by accident, and either send a message to the wrong recipient or didn't think before they did something.  The Power-hungry do it to torment others and for their ego.  Mean girls do it to help boost or remind people of their own social standing.  Some think they are righting wrong and standing up for others.
  • 8. Preventing cyber bullying -What parents can do-  Discuss cyber bullying with your child.  Educating the kids about the consequences (losing their cell phone and/or computer privileges) helps.  Teaching them to respect others and to take a stand against bullying of all kinds helps too.  Supervise and increase effective monitoring of the internet  Know what your child is doing online and with their cell phones.  Get to know your children's friends, are they the type of kids that are positive influences.
  • 9. Preventing cyber bullying -what kids can do -  Block the cyber bully. You do not have to have them on your friends list.  Ignore them. If you do not respond to a negative text, email, or comment online then the person may just calm down. It might take a while but be patient.  Tell an adult if messages are continuous, threatening, or it’s affecting your daily routine.  Talk, talk, talk to your parents or a trusted adult.
  • 10. Preventing cyber bullying -what schools can do -  Focus on values of kindness, respect, compassion, tolerance, and forgiveness.  Develop problem solving skills.  Provide staff, parent, and student education.  Empower bystanders to speak up.  Have written policies that address all types of bullying.
  • 11. Help for victims of bullying  Family supports, communication is the key to being supportive, listening to them and being there to talk.  In-School counseling.  Outside referral counseling.  Anger management groups.  Conflict resolution education.
  • 12. What are the laws? House Bill 276  Sec. 3313.666. (A) As used in this section, "harassment, intimidation, or bullying" means any intentional written, verbal, or physical act that a student has exhibited toward another particular student more than once and the behavior both:  (1) Causes mental or physical harm to the other student;  (2) Is sufficiently severe, persistent, or pervasive that it creates an intimidating, threatening, or abusive educational environment for the other student.
  • 13. What are the laws? Senate Bill 126(Pending) Introduced to senate in March 2011  Sec. 3313.666. (A) As used in this section, "harassment:  (1) "Electronic act" means an act committed through the use of a cellular telephone, computer, pager, personal communication device, or other electronic communication device.  (2) "Harassment, intimidation, or bullying" means any intentional written, verbal, electronic, or physical act that a student has exhibited toward another particular student more than once and the behavior both:  (1)(a) Causes mental or physical harm to the other student;  (2)(b) Is sufficiently severe, persistent, or pervasive that it creates an intimidating, threatening, or abusive educational environment for the other student.
  • 15. Works Sited- www.stopcyberbullying.org www.stopbullyingnow.hrsa.gov www.isafe.org www.facs.pppst.com www.legislature.state.oh.us Demysifying and Deescalating Cyber Bullying Barbara Trolly, Ph.D. CRC Connie Hanel, M.S.E.d & Linda Shields, M.S.E.d McKenna & Bargh, 2004 Ybarra & Mitchell, 2004 Nancy Willard, M.S., J.D., Director of the Center for Safe and Responsible Internet Use
  • 16. Images sited Microsoft Clip Art Captaincollo.blogspot.com My.hsj.org Nikkihut.blogspot.com bullyingpictures.com Mainstreethardy.com Clipartof.com Healthylifestyles-news.org