SlideShare a Scribd company logo
Harmful actions that are
communicated via
electronic media and are
intended to embarrass ,
harm, or slander another
individual.
Internet safety
• Don’t share personal information
• Keep passwords safe
• Don’t communicate with stranger
• Tell an adult if you come across information
that makes you feel uncomfortable
• Teat people with respect and dignity
•18% of students in grades 6-8 said they had been cyberbullied at least
once
in the last couple of months; and 6% said it had happened to them 2 or
more
times (Kowalski et al., 2005).
•11% of students in grades 6-8 said they had cyberbullied another
person
at least once in the last couple of months, and 2% said they had done it
two
or more times (Kowalski et al., 2005).
•19% of regular Internet users between the ages of 10 and 17 reported
being
involved in online aggression; (Ybarra & Mitchell, 2004).
•17% of 6-11 year-olds and 36% of 12-17-year-olds reported that
someone
said threatening or embarrassing things about them through e-mail,
instant messages, web sites, chat rooms, or text messages
(Fight Crime: Invest in Kids, 2006).
Statistics
How to recognize cyber bullying
Everyone seems to be participating
in the same joke
Changes in behavior or mood, especially
after or during the use of technology
Increased or decreased frequency of
technology use
Increased defensiveness or secrecy when
using technology
Changes in relationships between
friends
·People can Cyber Bully through:
·Texting
·Emails
·Instant messages
·Chat rooms
·Web pages
·Social Networks
·I touch
·DS
Types of Cyberbullying
Preventing Cyber bullying
Inform
Educate
Consider
Protect
Let people know what cyber bullying is, how
they can report cyber bullying
educate people that joking around can be harmful.
Emphasize the power bystanders have to take a stance
against bullying
Think before sending! Consider that any
message or images that you
take, post, or send can become public very
quickly and stay online forever
Never share your passwords
Make them hard to guess
Change passwords regularly
How to respond to Cyber bullies
Block
the
Bully
Collect
Evidence
Report
It
Don't
Retaliate
Most application have a method of blocking
unwanted contact
You can take away their power by blocking
them
An Angry reply gives the bully the satisfaction
of knowing they upset you.
Bully can also collect your reply as evidence
Keep a record of bully incidents,
conversations, e-mails, or IMs
Most applications you can report
bullying
Tell an adult

More Related Content

What's hot

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
John Dale Cruz
 
Cyberbullying- Assignment 8
Cyberbullying- Assignment 8Cyberbullying- Assignment 8
Cyberbullying- Assignment 8
jbpruden1
 
Cyber stalking
Cyber stalking Cyber stalking
Cyber stalking
hirakhalid2394
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
samhauck
 
Cyberbullying and Cybercrime
Cyberbullying and CybercrimeCyberbullying and Cybercrime
Cyberbullying and Cybercrime
Apostolos Syropoulos
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
carlasoruco
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
Reynante Tagum
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
FrenzyPurisima
 
Bully
BullyBully
Bully
malah53560
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentation
clifforddyyy
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
CoachElrod
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
Miriam Pananaliksik
 
Geek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingGeek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® Cyberbullying
Melissa McDonald
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
chocogyrl098
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
pardolopez
 
Cyberbullying: A Technology Issue Affecting Adolescents and What Needs to Be...
Cyberbullying:  A Technology Issue Affecting Adolescents and What Needs to Be...Cyberbullying:  A Technology Issue Affecting Adolescents and What Needs to Be...
Cyberbullying: A Technology Issue Affecting Adolescents and What Needs to Be...
samhauck
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
Rishabh Kataria
 
Cyber Bullying on Social Media Sites
Cyber Bullying on Social Media SitesCyber Bullying on Social Media Sites
Cyber Bullying on Social Media Sites
Swapnil Shahade
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
larsselect
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
drogt1mm
 

What's hot (20)

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying- Assignment 8
Cyberbullying- Assignment 8Cyberbullying- Assignment 8
Cyberbullying- Assignment 8
 
Cyber stalking
Cyber stalking Cyber stalking
Cyber stalking
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying and Cybercrime
Cyberbullying and CybercrimeCyberbullying and Cybercrime
Cyberbullying and Cybercrime
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Bully
BullyBully
Bully
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentation
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 
Geek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingGeek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying: A Technology Issue Affecting Adolescents and What Needs to Be...
Cyberbullying:  A Technology Issue Affecting Adolescents and What Needs to Be...Cyberbullying:  A Technology Issue Affecting Adolescents and What Needs to Be...
Cyberbullying: A Technology Issue Affecting Adolescents and What Needs to Be...
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber Bullying on Social Media Sites
Cyber Bullying on Social Media SitesCyber Bullying on Social Media Sites
Cyber Bullying on Social Media Sites
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 

Similar to Cyberbullying power pot student copy

Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
HDCH
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
smeech
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
R Smith
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
R Smith
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
CharanBobby69CB
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
R Smith
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Veronica Alejandro
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
kschermerhorn
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Joe Gauder
 
Huff591 interactivepresentationinternetclass
Huff591 interactivepresentationinternetclassHuff591 interactivepresentationinternetclass
Huff591 interactivepresentationinternetclass
chuff10
 
Cyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItCyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent It
FeliciaDixon5
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
Desiree Caskey
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Yumna Ali
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
guestb1fb9
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
lheikkila
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
Karen Brooks
 
Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)
SMA BRUDERAN PURWOREJO
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
TeamBanana
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
mribera87
 
Abhishek cyber bullying
Abhishek   cyber bullyingAbhishek   cyber bullying
Abhishek cyber bullying
parulata
 

Similar to Cyberbullying power pot student copy (20)

Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Huff591 interactivepresentationinternetclass
Huff591 interactivepresentationinternetclassHuff591 interactivepresentationinternetclass
Huff591 interactivepresentationinternetclass
 
Cyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItCyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent It
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Abhishek cyber bullying
Abhishek   cyber bullyingAbhishek   cyber bullying
Abhishek cyber bullying
 

More from brlewis1971

President project
President projectPresident project
President project
brlewis1971
 
Edmodotrainingpresentationbacktoschool2013
Edmodotrainingpresentationbacktoschool2013Edmodotrainingpresentationbacktoschool2013
Edmodotrainingpresentationbacktoschool2013
brlewis1971
 
Fmms qr code guidem
Fmms qr code guidemFmms qr code guidem
Fmms qr code guidem
brlewis1971
 
Anthony fitzpatrick white_out
Anthony fitzpatrick white_outAnthony fitzpatrick white_out
Anthony fitzpatrick white_out
brlewis1971
 
Edmodo training powerpoint
Edmodo training powerpointEdmodo training powerpoint
Edmodo training powerpoint
brlewis1971
 
Lan vs wan
Lan vs wanLan vs wan
Lan vs wan
brlewis1971
 
Budgets 8th grade ppt.
Budgets  8th grade ppt.Budgets  8th grade ppt.
Budgets 8th grade ppt.
brlewis1971
 
Rogue agents f
Rogue agents fRogue agents f
Rogue agents f
brlewis1971
 
Wolff anima
Wolff animaWolff anima
Wolff anima
brlewis1971
 
Animal presentation
Animal presentationAnimal presentation
Animal presentation
brlewis1971
 
Employers
EmployersEmployers
Employers
brlewis1971
 
Account types
Account typesAccount types
Account types
brlewis1971
 
Work place expectations
Work place expectationsWork place expectations
Work place expectations
brlewis1971
 
Types of bullying with pic
Types of bullying with picTypes of bullying with pic
Types of bullying with pic
brlewis1971
 

More from brlewis1971 (14)

President project
President projectPresident project
President project
 
Edmodotrainingpresentationbacktoschool2013
Edmodotrainingpresentationbacktoschool2013Edmodotrainingpresentationbacktoschool2013
Edmodotrainingpresentationbacktoschool2013
 
Fmms qr code guidem
Fmms qr code guidemFmms qr code guidem
Fmms qr code guidem
 
Anthony fitzpatrick white_out
Anthony fitzpatrick white_outAnthony fitzpatrick white_out
Anthony fitzpatrick white_out
 
Edmodo training powerpoint
Edmodo training powerpointEdmodo training powerpoint
Edmodo training powerpoint
 
Lan vs wan
Lan vs wanLan vs wan
Lan vs wan
 
Budgets 8th grade ppt.
Budgets  8th grade ppt.Budgets  8th grade ppt.
Budgets 8th grade ppt.
 
Rogue agents f
Rogue agents fRogue agents f
Rogue agents f
 
Wolff anima
Wolff animaWolff anima
Wolff anima
 
Animal presentation
Animal presentationAnimal presentation
Animal presentation
 
Employers
EmployersEmployers
Employers
 
Account types
Account typesAccount types
Account types
 
Work place expectations
Work place expectationsWork place expectations
Work place expectations
 
Types of bullying with pic
Types of bullying with picTypes of bullying with pic
Types of bullying with pic
 

Recently uploaded

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 

Recently uploaded (20)

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 

Cyberbullying power pot student copy

  • 1. Harmful actions that are communicated via electronic media and are intended to embarrass , harm, or slander another individual.
  • 2. Internet safety • Don’t share personal information • Keep passwords safe • Don’t communicate with stranger • Tell an adult if you come across information that makes you feel uncomfortable • Teat people with respect and dignity
  • 3. •18% of students in grades 6-8 said they had been cyberbullied at least once in the last couple of months; and 6% said it had happened to them 2 or more times (Kowalski et al., 2005). •11% of students in grades 6-8 said they had cyberbullied another person at least once in the last couple of months, and 2% said they had done it two or more times (Kowalski et al., 2005). •19% of regular Internet users between the ages of 10 and 17 reported being involved in online aggression; (Ybarra & Mitchell, 2004). •17% of 6-11 year-olds and 36% of 12-17-year-olds reported that someone said threatening or embarrassing things about them through e-mail, instant messages, web sites, chat rooms, or text messages (Fight Crime: Invest in Kids, 2006). Statistics
  • 4. How to recognize cyber bullying Everyone seems to be participating in the same joke Changes in behavior or mood, especially after or during the use of technology Increased or decreased frequency of technology use Increased defensiveness or secrecy when using technology Changes in relationships between friends
  • 5. ·People can Cyber Bully through: ·Texting ·Emails ·Instant messages ·Chat rooms ·Web pages ·Social Networks ·I touch ·DS Types of Cyberbullying
  • 6. Preventing Cyber bullying Inform Educate Consider Protect Let people know what cyber bullying is, how they can report cyber bullying educate people that joking around can be harmful. Emphasize the power bystanders have to take a stance against bullying Think before sending! Consider that any message or images that you take, post, or send can become public very quickly and stay online forever Never share your passwords Make them hard to guess Change passwords regularly
  • 7. How to respond to Cyber bullies Block the Bully Collect Evidence Report It Don't Retaliate Most application have a method of blocking unwanted contact You can take away their power by blocking them An Angry reply gives the bully the satisfaction of knowing they upset you. Bully can also collect your reply as evidence Keep a record of bully incidents, conversations, e-mails, or IMs Most applications you can report bullying Tell an adult