SlideShare a Scribd company logo
Cyberbullying
    By Josie Day
What is cyberbullying?
  Cyberbullying is when a student use the
       internet, cell phones, or other
 technological devices to send or post text
  or images intended to hurt, embarrass,
threaten, torment, humiliate, or intimidate
                their victim.
Cyberbullying Tactics
Gossip: posting or sending cruel gossip to damage a person’s reputation and relationships with others

Exclusion: deliberately excluding someone from an online group
Impersonation: breaking into someone’s online account and sending messages or making post that will
cause embarrassment or damage to the person’s reputation and affect his or her relationships with
others

Harassment: repeatedly posting or sending offensive, rude, and insulting messages or posts

Cyberstalking: posting or sending unwanted or intimidating messages, which may include threats

Flaming: online fights where scornful and offensive messages are posted on websites, forums, or blogs

Outing and Trickery: tricking someone into revealing secrets or embarrassing information, which is then
shared online

Cyberthreats: remarks on the internet threatening or implying violent behavior, displaying suicidal
tendencies
Students Take on Cyberbullying
http://www.youtube.com/watch?v=3WoP0y3Syl
Q
What are the effects of Cyberbullying?
•   Hurt Feelings
•   Sadness
•   Anxiety
•   Depression
•   Anger
•   Shame
•   Fear
•   Frustration
•   Low Self Esteem
•   Trust Issues
•   Poor academic performance
•   Suicide
•   Bullying others
Why is cyberbullying so hurtful?
Cyberbullying is more harmful than face-to-face bullying for many reasons:
• Permanence: The insults, comments or images can be preserved by the
   person who was bullied or by others so that the victim may read or view
   them over and over again and the harm is re-inflicted with each reading or
   viewing.
• Audience size: The size of the audience that is able to view or access the
   damaging material increases the victim’s humiliation.
• Familiarity: Many young people are friends with or know their cyber bully
   either through school or other personal connections, increasing the
   potential for embarrassment and humiliation.
• Social Networking: Social networking sites such as Facebook and MySpace
   allow cyber bullies to engage in campaigns against a particular person
   which may involve many others.
• Speed: The speed at which harmful messages can reach large audiences
   also plays a major part in making cyberbullying so damaging to the targets.
Cyberbullying 101
http://www.youtube.com/watch?feature=player
_embedded&v=0iwWxGNAMr0#!
Rachael Neblett
Rachael Neblett, a seventeen-year old student at Bullitt East High School. At less than 5 feet tall, her
small stature was an advantage in gymnastics and cheerleading. It seemed Rachael could tell her
parents anything. Or so they thought.

Because of her small size, Rachael was an easy target for bullies. In the summer of 2006, she began
receiving threatening emails through her MySpace account. Rachael would keep this from her
parents, maybe fearing they would make her close her MySpace account, or maybe she didn't want
them to worry.

The emails were not the usual type of bullying. These notes had a stalking terroristic nature. Also,
the person sending the emails was anonymous. Why Rachael kept going back and reading the
emails no one will ever know. Maybe the fear of the unknown was worse than knowing the threat.
Mark and Donna didn't ignore the problem. They went into action, taking the emails to the principal
at Bullitt East High School. It was obvious that the bully was another student at the school, since the
emails contained details of her movements during class and after school. The bully knew when she
caught the bus and where she lived. The principal had school officials watch Rachael as she got off
the bus and walked to class. But this did nothing to relieve Rachael's fear.

Desperation came early in October when Rachael received an email stating " I am not going to put
you in the hospital, I am going to put you in the morgue." After receiving that email, Rachael did not
want to go to school or go out with her friends.

On October 9, shortly after receiving the threatening email, Rachael took her own life.

Since Rachael had been receiving threats, her death was put under investigation by the Mt.
Washington police. In the end, it was ruled a suicide. The toxicology report show no drugs or
alcohol. No chemical reason for depression.

Mark and Donna feel certain that it was the cyberstalking that caused Rachael to end her life. No
person was ever arrested. Even though the police know the computer from which the emails were
sent there was not enough evidence to press charges
How to help prevent
   cyberbullying?
Encourage your students to…
• Block all communication with cyberbullies
• Do not forward any messages, comments, etc.
  that involve cyberbulling
• Always report any cyberbulling taking place to an
  adult
• Educate your students about the damages of
  cyberbullyig
How to prevent cyberbullying
             continued…
Encourage parents to…
• Get involved in their child’s cyberspace
• Open an account wherever your child has an
  account
• Know all your child’s passwords in order to
  have access to all your child’s accounts
• Check in weekly on your child’s Facebook page
  or other social media pages
References
• www.ncpc.org
• http://www.niot.org/front
• http://www.internetsafety101.org/cyberbullying.
  htm
• http://www.makeadifferenceforkids.org/index.ph
  p?id=8
• http://www.puresight.com/Cyberbullying/the-
  dangers-of-cyber-bullying.html
• Google Images

More Related Content

What's hot

Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
CarlosE15
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Marisol Herrera
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
pscl
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentationSally Garza
 
Digital Citizenship Powerpoint 1
Digital Citizenship Powerpoint 1Digital Citizenship Powerpoint 1
Digital Citizenship Powerpoint 1
HamadRabban
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
mcmullan
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
Apostolos Syropoulos
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
Christine Hui Jun Zhong
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power pointmb29thom
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Marc Kuhn
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
jessy0121
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Andreareyeshdz
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
kscheidy
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Regina Marbun
 
Cyberbullying and social media
Cyberbullying and social mediaCyberbullying and social media
Cyberbullying and social media
evieasmedia
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Veronica Alejandro
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
Arah Louise
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
Mary Alice Osborne
 

What's hot (20)

Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
Digital Citizenship Powerpoint 1
Digital Citizenship Powerpoint 1Digital Citizenship Powerpoint 1
Digital Citizenship Powerpoint 1
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power point
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying and social media
Cyberbullying and social mediaCyberbullying and social media
Cyberbullying and social media
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 

Viewers also liked

Bullying virtual
Bullying virtualBullying virtual
Bullying virtual
iesfa
 
Bullying verbal
Bullying verbalBullying verbal
Bullying verbal
Segundo Henao
 
Unit 1 Representations
Unit 1 RepresentationsUnit 1 Representations
Unit 1 Representations
colesmedia
 
Outfoxed
OutfoxedOutfoxed
Outfoxedbganter
 
Representation of Women in Disney
Representation of Women in DisneyRepresentation of Women in Disney
Representation of Women in Disney
Department of English MKBU
 
Representation slideshare
Representation slideshareRepresentation slideshare
Representation slideshare
Jersey College for Girls
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
Bennet Kelley
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
bl03cook
 
Bullying apresentação
Bullying apresentaçãoBullying apresentação
Bullying apresentação
-
 
Trabalho sobre bullying
Trabalho sobre bullyingTrabalho sobre bullying
Trabalho sobre bullying
jackzeus
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
Rishabh Kataria
 
Agenda Setting Theory
Agenda Setting TheoryAgenda Setting Theory
Agenda Setting TheoryTaylerEaston
 
Research thesis (effects of bullying)
Research thesis (effects of bullying)Research thesis (effects of bullying)
Research thesis (effects of bullying)frncsm13
 
Representation of gender and stereotypes
Representation of gender and stereotypesRepresentation of gender and stereotypes
Representation of gender and stereotypesLiz Davies
 

Viewers also liked (20)

CyberBullying
CyberBullyingCyberBullying
CyberBullying
 
Bullying
BullyingBullying
Bullying
 
Bullying virtual
Bullying virtualBullying virtual
Bullying virtual
 
Bullying verbal
Bullying verbalBullying verbal
Bullying verbal
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Unit 1 Representations
Unit 1 RepresentationsUnit 1 Representations
Unit 1 Representations
 
Outfoxed
OutfoxedOutfoxed
Outfoxed
 
Representation of Women in Disney
Representation of Women in DisneyRepresentation of Women in Disney
Representation of Women in Disney
 
Representation slideshare
Representation slideshareRepresentation slideshare
Representation slideshare
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
 
Microsoft Power Point Bullying
Microsoft Power Point   BullyingMicrosoft Power Point   Bullying
Microsoft Power Point Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Bullying
BullyingBullying
Bullying
 
Bullying apresentação
Bullying apresentaçãoBullying apresentação
Bullying apresentação
 
Trabalho sobre bullying
Trabalho sobre bullyingTrabalho sobre bullying
Trabalho sobre bullying
 
Dystopian Genre
Dystopian GenreDystopian Genre
Dystopian Genre
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Agenda Setting Theory
Agenda Setting TheoryAgenda Setting Theory
Agenda Setting Theory
 
Research thesis (effects of bullying)
Research thesis (effects of bullying)Research thesis (effects of bullying)
Research thesis (effects of bullying)
 
Representation of gender and stereotypes
Representation of gender and stereotypesRepresentation of gender and stereotypes
Representation of gender and stereotypes
 

Similar to Cyberbullying powerpoint

School Cyber Bullying Among Students .pptx.pptx
School Cyber Bullying Among Students .pptx.pptxSchool Cyber Bullying Among Students .pptx.pptx
School Cyber Bullying Among Students .pptx.pptx
ROSALIEBASA1
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
R Smith
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
CharanBobby69CB
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
R Smith
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentationSally Garza
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Serene Yee
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
R Smith
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying PresentationMegan Townes
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010adewolfe
 
Geek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingGeek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® Cyberbullying
Melissa McDonald
 
Digital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyDigital Citizenship by Mann Rentoy
Digital Citizenship by Mann Rentoy
Mann Rentoy
 
Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By Anamika
Gisha Mathyari
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The Internet
Debra Boardman
 
Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jfJohn Field
 
Pencegahan Cyberbullying saat Sekolah Daring
Pencegahan Cyberbullying saat Sekolah DaringPencegahan Cyberbullying saat Sekolah Daring
Pencegahan Cyberbullying saat Sekolah Daring
Ismail Fahmi
 

Similar to Cyberbullying powerpoint (20)

School Cyber Bullying Among Students .pptx.pptx
School Cyber Bullying Among Students .pptx.pptxSchool Cyber Bullying Among Students .pptx.pptx
School Cyber Bullying Among Students .pptx.pptx
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying Presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cbp
CbpCbp
Cbp
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
Geek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingGeek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® Cyberbullying
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Digital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyDigital Citizenship by Mann Rentoy
Digital Citizenship by Mann Rentoy
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By Anamika
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The Internet
 
Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jf
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Pencegahan Cyberbullying saat Sekolah Daring
Pencegahan Cyberbullying saat Sekolah DaringPencegahan Cyberbullying saat Sekolah Daring
Pencegahan Cyberbullying saat Sekolah Daring
 

Recently uploaded

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

Cyberbullying powerpoint

  • 1. Cyberbullying By Josie Day
  • 2. What is cyberbullying? Cyberbullying is when a student use the internet, cell phones, or other technological devices to send or post text or images intended to hurt, embarrass, threaten, torment, humiliate, or intimidate their victim.
  • 3. Cyberbullying Tactics Gossip: posting or sending cruel gossip to damage a person’s reputation and relationships with others Exclusion: deliberately excluding someone from an online group Impersonation: breaking into someone’s online account and sending messages or making post that will cause embarrassment or damage to the person’s reputation and affect his or her relationships with others Harassment: repeatedly posting or sending offensive, rude, and insulting messages or posts Cyberstalking: posting or sending unwanted or intimidating messages, which may include threats Flaming: online fights where scornful and offensive messages are posted on websites, forums, or blogs Outing and Trickery: tricking someone into revealing secrets or embarrassing information, which is then shared online Cyberthreats: remarks on the internet threatening or implying violent behavior, displaying suicidal tendencies
  • 4. Students Take on Cyberbullying http://www.youtube.com/watch?v=3WoP0y3Syl Q
  • 5. What are the effects of Cyberbullying? • Hurt Feelings • Sadness • Anxiety • Depression • Anger • Shame • Fear • Frustration • Low Self Esteem • Trust Issues • Poor academic performance • Suicide • Bullying others
  • 6. Why is cyberbullying so hurtful? Cyberbullying is more harmful than face-to-face bullying for many reasons: • Permanence: The insults, comments or images can be preserved by the person who was bullied or by others so that the victim may read or view them over and over again and the harm is re-inflicted with each reading or viewing. • Audience size: The size of the audience that is able to view or access the damaging material increases the victim’s humiliation. • Familiarity: Many young people are friends with or know their cyber bully either through school or other personal connections, increasing the potential for embarrassment and humiliation. • Social Networking: Social networking sites such as Facebook and MySpace allow cyber bullies to engage in campaigns against a particular person which may involve many others. • Speed: The speed at which harmful messages can reach large audiences also plays a major part in making cyberbullying so damaging to the targets.
  • 8. Rachael Neblett Rachael Neblett, a seventeen-year old student at Bullitt East High School. At less than 5 feet tall, her small stature was an advantage in gymnastics and cheerleading. It seemed Rachael could tell her parents anything. Or so they thought. Because of her small size, Rachael was an easy target for bullies. In the summer of 2006, she began receiving threatening emails through her MySpace account. Rachael would keep this from her parents, maybe fearing they would make her close her MySpace account, or maybe she didn't want them to worry. The emails were not the usual type of bullying. These notes had a stalking terroristic nature. Also, the person sending the emails was anonymous. Why Rachael kept going back and reading the emails no one will ever know. Maybe the fear of the unknown was worse than knowing the threat. Mark and Donna didn't ignore the problem. They went into action, taking the emails to the principal at Bullitt East High School. It was obvious that the bully was another student at the school, since the emails contained details of her movements during class and after school. The bully knew when she caught the bus and where she lived. The principal had school officials watch Rachael as she got off the bus and walked to class. But this did nothing to relieve Rachael's fear. Desperation came early in October when Rachael received an email stating " I am not going to put you in the hospital, I am going to put you in the morgue." After receiving that email, Rachael did not want to go to school or go out with her friends. On October 9, shortly after receiving the threatening email, Rachael took her own life. Since Rachael had been receiving threats, her death was put under investigation by the Mt. Washington police. In the end, it was ruled a suicide. The toxicology report show no drugs or alcohol. No chemical reason for depression. Mark and Donna feel certain that it was the cyberstalking that caused Rachael to end her life. No person was ever arrested. Even though the police know the computer from which the emails were sent there was not enough evidence to press charges
  • 9. How to help prevent cyberbullying? Encourage your students to… • Block all communication with cyberbullies • Do not forward any messages, comments, etc. that involve cyberbulling • Always report any cyberbulling taking place to an adult • Educate your students about the damages of cyberbullyig
  • 10. How to prevent cyberbullying continued… Encourage parents to… • Get involved in their child’s cyberspace • Open an account wherever your child has an account • Know all your child’s passwords in order to have access to all your child’s accounts • Check in weekly on your child’s Facebook page or other social media pages
  • 11. References • www.ncpc.org • http://www.niot.org/front • http://www.internetsafety101.org/cyberbullying. htm • http://www.makeadifferenceforkids.org/index.ph p?id=8 • http://www.puresight.com/Cyberbullying/the- dangers-of-cyber-bullying.html • Google Images