Cyberbullying

By Samara and Michelle
How does cyberbullying connect to our
Central Idea?
❖
❖

❖

When the cyberbully uses his/her power to hurt others then it will affect
relationships as no one will like that particular person.
It affects access to opportunities because your employer could easily
trace your digital footprints. If you’ve been harmful then there’s a good
chance you won’t get accepted.
The cyberbully has the power, they can have consequences by getting in
trouble.

Our main inquiry is power through
cyberbullying.
Main Questions:

What is our responsibility if we get we get cyber bullied?
How does cyberbullying work?
What we found out
Answers to our questions (Samara)
When get cyber bullied you should/should not
● write back
● block cyberbullies from your computer
● if the cyberbully goes to your school contact the vice principal
● Tell a friend or adult you trust
This answer connects to our unit because:
● The cyberbully has the power
● If someone follows these tips
● Affecting relationships
● cyberbully can lose access to opportunities
What we found out
Answers to our questions (Michelle)
Cyberbullying comes in three different categoriesDirect Attacks consist of:
● Threatening texts, IMs or emails
● Creating websites that could be harmful to others
Cyberbullying-by-proxy attacks consist of:
● Misusing the internet by targeting others (accomplices) to do for them
● Stealing the password of others and locking them out of their own
account
Posting humiliating information and images
Video
Primary and secondary resources
Brain Pop video on Digital Etiquette:

www.brainpop.com/technology/computersandinternet/digitaletiquette/ Video
Taking Action
Reflecting on our learning:
Reflecting on our learning…

What we can do to take action...
Credits
Our Resources
www.brainpop.com/technology/computersandinternet/digitaletiquette/ Video for slide Finding Out (BrainPop) and Photo’s.
http://www.bullyingstatistics.org/content/text-bullying.html Information-Cyber Bullying
http://www.helpguide.org/mental/cyber-bullying.htm Information- Cyber Bullying
http://thumbs.dreamstime.com/z/computer-cyber-bullying-hands-security-theft-16479290.jpg Image (Title Page)
http://www.simplyclick.net/sc/website/cyberbullying_by_proxy.html Information-Cyber Bullying
http://www.webroot.com/us/en/home/resources/tips/cyberbullying-online-predators/safety-my-child-is-being-cyberbullied
Information-Cyber Bullying
Inquiry project presentation

Inquiry project presentation

  • 1.
  • 2.
    How does cyberbullyingconnect to our Central Idea? ❖ ❖ ❖ When the cyberbully uses his/her power to hurt others then it will affect relationships as no one will like that particular person. It affects access to opportunities because your employer could easily trace your digital footprints. If you’ve been harmful then there’s a good chance you won’t get accepted. The cyberbully has the power, they can have consequences by getting in trouble. Our main inquiry is power through cyberbullying.
  • 3.
    Main Questions: What isour responsibility if we get we get cyber bullied? How does cyberbullying work?
  • 4.
    What we foundout Answers to our questions (Samara) When get cyber bullied you should/should not ● write back ● block cyberbullies from your computer ● if the cyberbully goes to your school contact the vice principal ● Tell a friend or adult you trust This answer connects to our unit because: ● The cyberbully has the power ● If someone follows these tips ● Affecting relationships ● cyberbully can lose access to opportunities
  • 5.
    What we foundout Answers to our questions (Michelle) Cyberbullying comes in three different categoriesDirect Attacks consist of: ● Threatening texts, IMs or emails ● Creating websites that could be harmful to others Cyberbullying-by-proxy attacks consist of: ● Misusing the internet by targeting others (accomplices) to do for them ● Stealing the password of others and locking them out of their own account Posting humiliating information and images
  • 6.
    Video Primary and secondaryresources Brain Pop video on Digital Etiquette: www.brainpop.com/technology/computersandinternet/digitaletiquette/ Video
  • 7.
    Taking Action Reflecting onour learning: Reflecting on our learning… What we can do to take action...
  • 8.
    Credits Our Resources www.brainpop.com/technology/computersandinternet/digitaletiquette/ Videofor slide Finding Out (BrainPop) and Photo’s. http://www.bullyingstatistics.org/content/text-bullying.html Information-Cyber Bullying http://www.helpguide.org/mental/cyber-bullying.htm Information- Cyber Bullying http://thumbs.dreamstime.com/z/computer-cyber-bullying-hands-security-theft-16479290.jpg Image (Title Page) http://www.simplyclick.net/sc/website/cyberbullying_by_proxy.html Information-Cyber Bullying http://www.webroot.com/us/en/home/resources/tips/cyberbullying-online-predators/safety-my-child-is-being-cyberbullied Information-Cyber Bullying