Cyberbullying
What is cyberbullying? Cyberbullying in any kind of negative virtual communication.
There are many ways to bully someone other than just sending them a message.
Ways of Cyberbullying Instant Messaging  Stealing passwords Blogs Web Sites Sending pictures through phones and email Sending malicious code Impersonations Prevention
Instant messaging Sending threatening messages through IM’s or texting.  Sending warning messages not to tell on them. Creating screen names that are 1 letter away from someone else’s screen name and sending offensive messages Texting wars and death threats
Stealing passwords Student’s may steal passwords and access other’s accounts to send offensive messages to anger them. Students may gain access to an account and then change the settings to lock them out.
Blogs Blogs are used as online journals to write damaging thing about someone’s reputation.
Web Sites Web sites are created to insult another student or a group of students.  Students also post pictures and personal information about other students.
Sending pictures through cell phones and email Sending degrading photos through e-mails; the emails can then be passed around to hundreds of emails within hours. New cell phones are now able to send photos and can be spread to an entire address book at once.
Sending Malicious Code Student send viruses, spyware and hacking programs to other computers as a form of harassment. Some programs can even give the student access to a victims computer.
Impersonation When a student impersonates another students they usually do this in a chat room.  The students reveals personal information that could include name, address and phone number.  This could lead to an attack on the victim.
Prevention Understand that teasing, threats and taking over someone’s identity are all forms of bullying. If this happens to you report the behaviors to an adult. Parents
Parents Tell you parents. Parents need to inform you school counselor of the cyberbullying. Parents need to tell your doctor. It may be necessary to have counseling until the problems are resolved. Netiquette
Netiquette Never send your name, address or phone number to someone on the internet Don’t send out an email when you are mad; wait and reread it when you are calm.  Go to Quiz
What is one way that someone could use their cell phone to cyberbully? Call their mom Send you a threatening message Call information
Go read for the answer again. Read here
Instant messaging Sending threatening messages through IM’s or texting.  Sending warning messages not to tell on them. Creating screen names that are 1 letter away from someone else’s screen name and sending offensive messages Texting wars and death threats Go back to question
NEXT QUESTION
Stealing passwords could not allow someone to: Access my account   Be good at playing games Send emails under my account without my knowledge
Go read for the answer again. Read here
Stealing passwords Student’s may steal passwords and access other’s accounts to send offensive messages to anger them. Students may gain access to an account and then change the settings to lock them out.  Go back to question
NEXT QUESTION
These can be created to post pictures on the internet: Channels Web sites Stations
Go read for the answer again. Read here
Web Sites Web sites are created to insult another student or a group of students.  Students also post pictures and personal information about other students.  Go back to question
NEXT QUESTION
What can spread pictures and information the fastest? Mail Word of Mouth Computers Cell Phones Both C & D
Go read for the answer again. Read here
Sending pictures through cell phones and email Sending degrading photos through e-mails; the emails can then be passed around to hundreds of emails within hours. New cell phones are now able to send photos and can be spread to an entire address book at once.  Go back to question
NEXT QUESTION
What can happen if someone gets into your computer? They can send your personal information to other recipients A virus could be sent to infect your computer Someone would be able to act like you in a chat room. A & C All of the above
Go read for the answer again. Read here
Sending Malicious Code Student send viruses, spyware and hacking programs to other computers as a form of harassment. Some programs can even give the student access to a victims computer.  Go back to question  Impersonation When a student impersonates another students they usually do this in a chat room.  The students reveals personal information that could include name, address and phone number.  This could lead to an attack on the victim.
NEXT PAGE
Congratulations  you have just finished  your Cyberbullying training.

Keenright591 Interactive Presentation

  • 1.
  • 2.
    What is cyberbullying?Cyberbullying in any kind of negative virtual communication.
  • 3.
    There are manyways to bully someone other than just sending them a message.
  • 4.
    Ways of CyberbullyingInstant Messaging Stealing passwords Blogs Web Sites Sending pictures through phones and email Sending malicious code Impersonations Prevention
  • 5.
    Instant messaging Sendingthreatening messages through IM’s or texting. Sending warning messages not to tell on them. Creating screen names that are 1 letter away from someone else’s screen name and sending offensive messages Texting wars and death threats
  • 6.
    Stealing passwords Student’smay steal passwords and access other’s accounts to send offensive messages to anger them. Students may gain access to an account and then change the settings to lock them out.
  • 7.
    Blogs Blogs areused as online journals to write damaging thing about someone’s reputation.
  • 8.
    Web Sites Websites are created to insult another student or a group of students. Students also post pictures and personal information about other students.
  • 9.
    Sending pictures throughcell phones and email Sending degrading photos through e-mails; the emails can then be passed around to hundreds of emails within hours. New cell phones are now able to send photos and can be spread to an entire address book at once.
  • 10.
    Sending Malicious CodeStudent send viruses, spyware and hacking programs to other computers as a form of harassment. Some programs can even give the student access to a victims computer.
  • 11.
    Impersonation When astudent impersonates another students they usually do this in a chat room. The students reveals personal information that could include name, address and phone number. This could lead to an attack on the victim.
  • 12.
    Prevention Understand thatteasing, threats and taking over someone’s identity are all forms of bullying. If this happens to you report the behaviors to an adult. Parents
  • 13.
    Parents Tell youparents. Parents need to inform you school counselor of the cyberbullying. Parents need to tell your doctor. It may be necessary to have counseling until the problems are resolved. Netiquette
  • 14.
    Netiquette Never sendyour name, address or phone number to someone on the internet Don’t send out an email when you are mad; wait and reread it when you are calm. Go to Quiz
  • 15.
    What is oneway that someone could use their cell phone to cyberbully? Call their mom Send you a threatening message Call information
  • 16.
    Go read forthe answer again. Read here
  • 17.
    Instant messaging Sendingthreatening messages through IM’s or texting. Sending warning messages not to tell on them. Creating screen names that are 1 letter away from someone else’s screen name and sending offensive messages Texting wars and death threats Go back to question
  • 18.
  • 19.
    Stealing passwords couldnot allow someone to: Access my account Be good at playing games Send emails under my account without my knowledge
  • 20.
    Go read forthe answer again. Read here
  • 21.
    Stealing passwords Student’smay steal passwords and access other’s accounts to send offensive messages to anger them. Students may gain access to an account and then change the settings to lock them out. Go back to question
  • 22.
  • 23.
    These can becreated to post pictures on the internet: Channels Web sites Stations
  • 24.
    Go read forthe answer again. Read here
  • 25.
    Web Sites Websites are created to insult another student or a group of students. Students also post pictures and personal information about other students. Go back to question
  • 26.
  • 27.
    What can spreadpictures and information the fastest? Mail Word of Mouth Computers Cell Phones Both C & D
  • 28.
    Go read forthe answer again. Read here
  • 29.
    Sending pictures throughcell phones and email Sending degrading photos through e-mails; the emails can then be passed around to hundreds of emails within hours. New cell phones are now able to send photos and can be spread to an entire address book at once. Go back to question
  • 30.
  • 31.
    What can happenif someone gets into your computer? They can send your personal information to other recipients A virus could be sent to infect your computer Someone would be able to act like you in a chat room. A & C All of the above
  • 32.
    Go read forthe answer again. Read here
  • 33.
    Sending Malicious CodeStudent send viruses, spyware and hacking programs to other computers as a form of harassment. Some programs can even give the student access to a victims computer. Go back to question Impersonation When a student impersonates another students they usually do this in a chat room. The students reveals personal information that could include name, address and phone number. This could lead to an attack on the victim.
  • 34.
  • 35.
    Congratulations youhave just finished your Cyberbullying training.