SlideShare a Scribd company logo
Answer these questions:
•How many of you have ever received a mean or threatening
e-mail or IM (FB, BBM, SMS, etc)?
•If so, did you tell anyone? Who?
•Have you ever received e-mails or IM’s from someone you
did not know?
•Did you respond to them? Why? Or why not?
•What would you do if you knew a friend of yours was
sending threatening anonymous e-mails or IM’s to someone?
•What is your theory about why people send bad messages
via the Internet?
•How would you propose that this type of “bullying” be
stopped?
Answer these questions on a Word document:
•What are one or two words to describe your feelings about his
film?
•Have you ever been frightened like Susan was from a message
being sent to you via-email or through an IM?
•What would you guess are the reasons why Amanda decided to
threaten Susan through the Internet?
•How can “just teasing” your friends this way be dangerous?
•What do you think would have happened if Susan had told her
parents what was being e-mailed to her?
•What do you think should happen to Amanda for what she did?
•If you were one of Susan’s friends, what action would you take
considering what happened to your friend?
•If you were to write a conclusion to this film, how would you have
it end?
Create a Digital Poster (Glogster)that will include:
1. Statistics of abductions(kidnaps) or deaths due to cyber bullying. Include
some examples of the most known stories.
2. Trace the history of internet usage and abuse over the past 10 years. You
may show it as a timeline.
3. Create a mind map with all the CC values(
trustworthiness, respect, responsibility, fairness, caring, citizenship) and
how each of them can be applied to cyber bullying
4. Generate a list of rules on basic safety for students in the correct use of the
internet.
5. Show some ways of cyber bullying
6. Say a message to ALL the world about how and why we should stop Cyber
bullying. And what can you do if it happens
• You may include:
a. a speaking avatar
b. Images
c. Videos
d. Sounds
http://wiigamer.glogster.com/Whats-Bullying/
http://xxroboticzxx.glogster.com/Stop-Cyberbullying/
Assignment
Possible tools
or web 2.0
options to use
1. Statistics of abductions(kidnaps) or deaths due to cyber
bullying. Include some examples of the most known stories.
You tube
videos, Voki
,sound recorder
2. Trace the history of internet usage and abuse over the past 10
years. You may show it as a timeline.
timetoast, dipity, ex
cel
3. Create a mind map with all the CC values(
trustworthiness, respect, responsibility, fairness, caring, citizens
hip) and how each of them can be applied to cyber bullying
Popplet, mindomo
4. Generate a list of rules on basic safety for students in the
correct use of the internet.
Prezi, voki, text,
sound recorder
5. Show some ways of cyberbullying Wordle, tagul,
tagxedo, text,
image
6. Say a message to ALL the world about how and why we should
stop Cyber bullying. And what can you do if it happens.
Doppel me, voki
Resources
Computer history
• http://www.computerhistory.org/highlights/publicweb20th/
Cyberbullying resources:
• https://docs.google.com/a/cag.edu.gt/viewer?a=v&pid=gmail&attid=0.2&thid=12f073
13ff3049ed&mt=application/pdf&url=https://mail.google.com/mail/u/0/?ui%3D2%26ik
%3Db8ddbf4b50%26view%3Datt%26th%3D12f07313ff3049ed%26attid%3D0.2%26
disp%3Dsafe%26realattid%3D3cf3305559982028_0.2%26zw&sig=AHIEtbR_qE_gF
7kdGGuNZ85wIRuZMb-Yxg
• http://charactercounts.org/pdf/bullying/CyberbullyingOnlineResources.pdf
• http://charactercounts.org/chron/2011/01/07/decreasebullying/
• http://www.edweek.org/tm/articles/2011/09/06/bullying_bb.html
Web 2.0 Tools
• http://edu.glogster.com/
• http://www.doppelme.com/
• http://prezi.com/
• http://www.voki.com/
• http://www.youtube.com/
• http://cooltext.com/
• http://www.wordle.net/
• http://www.popplet.com/
• http://www.mindomo.com/
• http://www.tagxedo.com/
• http://tagul.com/
• http://www.timetoast.com/
“Cyber bullying involves the use of
information and communication
technologies to support deliberate,
repeated, and hostile behavior by
an individual or group, that is
intended to harm others.“
Bill Belsey
http://www.youtube.com/watch?v=pmD8OKl8vVM – Kitchen bullying..
http://www.youtube.com/watch?v=CE2Ru-jqyrY – Once posted…
http://www.youtube.com/watch?v=sZPDjz7L0Uw&feature=related – Words hurt
Word:
Description:
Drawing:
My understanding: 1 2 3 4 5

More Related Content

What's hot

Evans,Vinces,Coles I.S.1
Evans,Vinces,Coles I.S.1Evans,Vinces,Coles I.S.1
Evans,Vinces,Coles I.S.1guest1d951ee
 
Digital etiquette 2[1]
Digital etiquette 2[1]Digital etiquette 2[1]
Digital etiquette 2[1]
putnamca
 
Teens on the net
Teens on the netTeens on the net
Teens on the net
talandronmmp
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquetteklknight79
 
Digital citizenship for Elementary Students
Digital citizenship for Elementary StudentsDigital citizenship for Elementary Students
Digital citizenship for Elementary Students
kgilliard13
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Leslie Witten
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
Michael Richards
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
Kati W
 
Etiquette in the Digital World
Etiquette in the Digital WorldEtiquette in the Digital World
Etiquette in the Digital World
mgastgoodman
 
The 10 core rules of netiqutte
The 10 core rules of netiqutteThe 10 core rules of netiqutte
The 10 core rules of netiqutteMudgeoTorso1091
 
Cyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and ParentsCyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and Parents
Ben Woelk, CISSP, CPTC
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
Cyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of InternetCyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of Internetbeh yong hua
 
Internet safty
Internet saftyInternet safty
Internet safty
guestce38b330
 
The essential rules of netiquette by Halina
The essential rules of netiquette by HalinaThe essential rules of netiquette by Halina
The essential rules of netiquette by Halina
Self-employed
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
KanelandSvihlik
 

What's hot (20)

Evans,Vinces,Coles I.S.1
Evans,Vinces,Coles I.S.1Evans,Vinces,Coles I.S.1
Evans,Vinces,Coles I.S.1
 
Digital etiquette 2[1]
Digital etiquette 2[1]Digital etiquette 2[1]
Digital etiquette 2[1]
 
Teens on the net
Teens on the netTeens on the net
Teens on the net
 
What Is Spam
What Is SpamWhat Is Spam
What Is Spam
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquette
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Digital citizenship for Elementary Students
Digital citizenship for Elementary StudentsDigital citizenship for Elementary Students
Digital citizenship for Elementary Students
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Etiquette in the Digital World
Etiquette in the Digital WorldEtiquette in the Digital World
Etiquette in the Digital World
 
The 10 core rules of netiqutte
The 10 core rules of netiqutteThe 10 core rules of netiqutte
The 10 core rules of netiqutte
 
Cyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and ParentsCyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and Parents
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Cyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of InternetCyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of Internet
 
Internet safty
Internet saftyInternet safty
Internet safty
 
The essential rules of netiquette by Halina
The essential rules of netiquette by HalinaThe essential rules of netiquette by Halina
The essential rules of netiquette by Halina
 
Bully
BullyBully
Bully
 
Internet Safty
Internet SaftyInternet Safty
Internet Safty
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 

Similar to Cyberbullying Assignment - Inbox The movie

Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
Karan Veer Singh
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
Rodolfo Salazar
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
Cathleen Richardson
 
Social Media - It Can Be Good, Bad, and Ugly
Social Media  - It Can Be Good, Bad, and UglySocial Media  - It Can Be Good, Bad, and Ugly
Social Media - It Can Be Good, Bad, and Ugly
Zarb School of Business, Hofstra University
 
Social Media - The Good, The Bad, and The Ugly
Social Media  - The Good, The Bad, and The UglySocial Media  - The Good, The Bad, and The Ugly
Social Media - The Good, The Bad, and The Ugly
Dr. Joel Evans
 
Internet safety-presentation(1)
Internet safety-presentation(1)Internet safety-presentation(1)
Internet safety-presentation(1)andreburtont
 
Internet 1 lesson plan
Internet 1 lesson planInternet 1 lesson plan
Internet 1 lesson planQuennith
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
Erica Reid
 
Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1Quennith
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 
Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYING
Rene Ge
 
Web 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesWeb 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected Consequences
Frances Harris
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
mkinzie
 
Social Media Training for Youth Leaders, for York Diocese, November 2014.
Social Media Training for Youth Leaders, for York Diocese, November 2014.Social Media Training for Youth Leaders, for York Diocese, November 2014.
Social Media Training for Youth Leaders, for York Diocese, November 2014.
Bex Lewis
 
Internet Safety - Judi Calhoun
Internet Safety - Judi CalhounInternet Safety - Judi Calhoun
Internet Safety - Judi Calhoun
University of Wisconsin - Superior
 
Internet safety guide
Internet safety guide Internet safety guide
Internet safety guide
Dee Tutino
 
The Social Safety Guide
The Social Safety GuideThe Social Safety Guide
The Social Safety Guide
Dee Tutino
 

Similar to Cyberbullying Assignment - Inbox The movie (20)

Cyberbullying assignment
Cyberbullying assignmentCyberbullying assignment
Cyberbullying assignment
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Myspace
MyspaceMyspace
Myspace
 
Social Media - It Can Be Good, Bad, and Ugly
Social Media  - It Can Be Good, Bad, and UglySocial Media  - It Can Be Good, Bad, and Ugly
Social Media - It Can Be Good, Bad, and Ugly
 
Social Media - The Good, The Bad, and The Ugly
Social Media  - The Good, The Bad, and The UglySocial Media  - The Good, The Bad, and The Ugly
Social Media - The Good, The Bad, and The Ugly
 
Internet safety-presentation(1)
Internet safety-presentation(1)Internet safety-presentation(1)
Internet safety-presentation(1)
 
Internet 1 lesson plan
Internet 1 lesson planInternet 1 lesson plan
Internet 1 lesson plan
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYING
 
Web 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesWeb 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected Consequences
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Social Media Training for Youth Leaders, for York Diocese, November 2014.
Social Media Training for Youth Leaders, for York Diocese, November 2014.Social Media Training for Youth Leaders, for York Diocese, November 2014.
Social Media Training for Youth Leaders, for York Diocese, November 2014.
 
Internet Safety - Judi Calhoun
Internet Safety - Judi CalhounInternet Safety - Judi Calhoun
Internet Safety - Judi Calhoun
 
Internet safety guide
Internet safety guide Internet safety guide
Internet safety guide
 
The Social Safety Guide
The Social Safety GuideThe Social Safety Guide
The Social Safety Guide
 

Recently uploaded

Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 

Recently uploaded (20)

Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 

Cyberbullying Assignment - Inbox The movie

  • 1.
  • 2. Answer these questions: •How many of you have ever received a mean or threatening e-mail or IM (FB, BBM, SMS, etc)? •If so, did you tell anyone? Who? •Have you ever received e-mails or IM’s from someone you did not know? •Did you respond to them? Why? Or why not? •What would you do if you knew a friend of yours was sending threatening anonymous e-mails or IM’s to someone? •What is your theory about why people send bad messages via the Internet? •How would you propose that this type of “bullying” be stopped?
  • 3. Answer these questions on a Word document: •What are one or two words to describe your feelings about his film? •Have you ever been frightened like Susan was from a message being sent to you via-email or through an IM? •What would you guess are the reasons why Amanda decided to threaten Susan through the Internet? •How can “just teasing” your friends this way be dangerous? •What do you think would have happened if Susan had told her parents what was being e-mailed to her? •What do you think should happen to Amanda for what she did? •If you were one of Susan’s friends, what action would you take considering what happened to your friend? •If you were to write a conclusion to this film, how would you have it end?
  • 4. Create a Digital Poster (Glogster)that will include: 1. Statistics of abductions(kidnaps) or deaths due to cyber bullying. Include some examples of the most known stories. 2. Trace the history of internet usage and abuse over the past 10 years. You may show it as a timeline. 3. Create a mind map with all the CC values( trustworthiness, respect, responsibility, fairness, caring, citizenship) and how each of them can be applied to cyber bullying 4. Generate a list of rules on basic safety for students in the correct use of the internet. 5. Show some ways of cyber bullying 6. Say a message to ALL the world about how and why we should stop Cyber bullying. And what can you do if it happens • You may include: a. a speaking avatar b. Images c. Videos d. Sounds http://wiigamer.glogster.com/Whats-Bullying/ http://xxroboticzxx.glogster.com/Stop-Cyberbullying/
  • 5. Assignment Possible tools or web 2.0 options to use 1. Statistics of abductions(kidnaps) or deaths due to cyber bullying. Include some examples of the most known stories. You tube videos, Voki ,sound recorder 2. Trace the history of internet usage and abuse over the past 10 years. You may show it as a timeline. timetoast, dipity, ex cel 3. Create a mind map with all the CC values( trustworthiness, respect, responsibility, fairness, caring, citizens hip) and how each of them can be applied to cyber bullying Popplet, mindomo 4. Generate a list of rules on basic safety for students in the correct use of the internet. Prezi, voki, text, sound recorder 5. Show some ways of cyberbullying Wordle, tagul, tagxedo, text, image 6. Say a message to ALL the world about how and why we should stop Cyber bullying. And what can you do if it happens. Doppel me, voki
  • 6. Resources Computer history • http://www.computerhistory.org/highlights/publicweb20th/ Cyberbullying resources: • https://docs.google.com/a/cag.edu.gt/viewer?a=v&pid=gmail&attid=0.2&thid=12f073 13ff3049ed&mt=application/pdf&url=https://mail.google.com/mail/u/0/?ui%3D2%26ik %3Db8ddbf4b50%26view%3Datt%26th%3D12f07313ff3049ed%26attid%3D0.2%26 disp%3Dsafe%26realattid%3D3cf3305559982028_0.2%26zw&sig=AHIEtbR_qE_gF 7kdGGuNZ85wIRuZMb-Yxg • http://charactercounts.org/pdf/bullying/CyberbullyingOnlineResources.pdf • http://charactercounts.org/chron/2011/01/07/decreasebullying/ • http://www.edweek.org/tm/articles/2011/09/06/bullying_bb.html Web 2.0 Tools • http://edu.glogster.com/ • http://www.doppelme.com/ • http://prezi.com/ • http://www.voki.com/ • http://www.youtube.com/ • http://cooltext.com/ • http://www.wordle.net/ • http://www.popplet.com/ • http://www.mindomo.com/ • http://www.tagxedo.com/ • http://tagul.com/ • http://www.timetoast.com/
  • 7. “Cyber bullying involves the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm others.“ Bill Belsey http://www.youtube.com/watch?v=pmD8OKl8vVM – Kitchen bullying.. http://www.youtube.com/watch?v=CE2Ru-jqyrY – Once posted… http://www.youtube.com/watch?v=sZPDjz7L0Uw&feature=related – Words hurt