SlideShare a Scribd company logo
Cyberbullying
Bullying Goes High Tech
Jim Masucci
November 10, 2010
“It’s one thing when you get made fun of at
school, but to be bullied in your own home, via
your computer, is a disgusting thing for people to
do.” Sixteen year old from Alabama
What is Cyberbullying?
Being cruel to others by sending or posting
harmful material using technological means
An individual or group that uses
information and communication involving
electronic technologies to facilitate
deliberate and repeated harassment or
threats to an individual or group.
Also known as:
‘Electronic Bullying’ &
‘Online Social Cruelty’
Tools for Cyberbullying
 Cell Phones – calls
or messages
 Internet
 Electronic Mail
 Instant Messaging
 Blogs
 Social Networks
 Chat Rooms
 Defamatory Web
Sites (Polling)
Why Cyberbullying?
The Internet has become a way of life
for most teens, and an easy tool
for harassing others.
91% of 12 – 15 year olds use the
Internet
99% of teens 16 – 18 use the Internet
Available 24 hrs/day, 7 days/wk
Victim is a perpetual target
Why Cyberbullying? (cont)
Traditional bullying – the bully is
usually stronger than his or her
victim either physically or
socially. Usually occurs in the
school setting (classroom,
playground, or bus).
Cyberbullying - Internet tends to
level the playing field, affording
less dominant teens the means
they need to bully others.
Sometimes used in revenge for
traditional bullying.
How Big a Problem Is It?
 42% of teens surveyed admitted to being
bullied on-line
 35% claim to have been threatened.
 53% confessed to having said something
mean or hurtful on-line. (I-Safe 2007)
 More girls than boys are cyberbullied.
 For teens that are regular visitors to
social networking sites, the chances of
them being cyberbullied goes up.
 Only 15% of parents knew what
cyberbullying was
Types of Cyberbullies
 Avenging Angel - use technical means to get
back at someone who has been bullying them,
or one of their friends.
 Power Hungry - Closest to traditional school
yard bully. Tends to feel superior, and exerts his
or her strengths over the victim.
Types of Cyberbullies (cont.)
 Mean Girls - Work in
groups, and need an
audience to play to. The
group tends to approve
of the actions, or do
nothing about them.
 Inadvertent Bully –
Probably don’t even
realize they are doing
something wrong. Ex :
passing on gossip or
pictures or answering
polls.
Forms of Cyberbullying
 Flaming – Saying mean or hurtful things
 Harassment and cyberstalking - repeated
actions such as sending messages, or threats to
a victim.
 Denigration – putting someone down
 Outing – spreading secret or embarrassing
information or pictures
 Exclusion - intentionally excluding a person by
leaving them off of the list.
 Impersonation – pretending to be someone else
Cyberbullying – It’s Illegal
All of the following forms of cyberbulling
can lead to arrest & prosecution:
 Making threats of violence to people or
their property
 Making obscene or harassing phone
calls
 Harassment or stalking
 Hate or bias crimes
 Creating or sending sexually explicit
images of teens
 Posting real or doctored photos of
someone without their permission
 Taking a photo of someone in place
where privacy expected
Impacts of Cyberbullying
 Feelings of guilt or self
blame
 Sleep difficulties
 Poor performance in
school
 Violence against
tormentors. Victims are
8X more likely to bring a
weapon to school
 Suicide
What Should You Do?
Teens
 Do not respond in a similar
manner. Block the screen names if
possible.
 Do not forward anything
 Do not delete messages
 Consult an adult
 Safeguard user ID’s and
passwords.
“A password is like a tooth brush.
Choose a good one, and don’t
share it.” (Yahoo Security Center)
What Should You Do?
Parents
 Take the situation seriously,
and be supportive.
 Don’t blame the victim.
 Increase tech awareness.
 Monitor computer use.
(Software & placement of
computer)
 Contact ISP and cell phone
provider. Contact law
enforcement, if threatened.
What Should You Do?
Teachers and Schools
If the incident occurs during
school, investigate and
respond.
Otherwise :
 Respond if the incident
causes disruptions.
 Provide counseling to the
perpetrators and the
victims
 Develop anti-bulllying
programs to educate
students
Teach Our Children
 All actions have consequences
 Cyber bullying hurts
 They are just being used and
manipulated by cyber bully
 Cyber bully and accomplices
often become the target of
cyber bullying themselves
 Care about others and stand
up for what’s right
Legal Issues for Schools
 Privacy Issue – Does a school have the right to
search a student’s computer for evidence.
 Free Speech Issue – Does the school have the
right to discipline a student for remarks published
on the Internet during non-school hours.
Sexting
Sending sexually suggestive messages or images to
others via cell phone, or posting them on social
websites.
Surveys of teenagers :
- 20 percent have sent or posted picture of themselves
- 40 percent of teenagers have sent sexually
suggestive messages.
- More girls than boys
Technology is much more far-reaching and permanent,
and teenagers are not consequential thinkers . . . They
Sexting – Legal
Consequenses
Worst Case scenario
 Possession or distribution of Child
Pornography
 Possible inclusion on sex offenders
registry.
More likely
 Suspension or expulsion from school.
 Probation and attend counseling
Additional Sources
http://www.scottmcleod.net/ties2006
http://www.stopcyberbulling.com
http://www.nertsmartz.org
http://www.isafe.org

More Related Content

What's hot

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
bl03cook
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
sus22
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
wirsi
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyinglarsselect
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
katnaylan
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
SuphaphonP
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
Suna Gurol
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Amir Shokri
 
Cyberbullying full
Cyberbullying fullCyberbullying full
Cyberbullying full
Liam1997
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Qazi Anwar
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Doha qaradeh
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
ktast
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingdrogt1mm
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
CoachElrod
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
carlasoruco
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingringw1sl
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
seswear9388
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
John Dale Cruz
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
Miriam Pananaliksik
 

What's hot (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying full
Cyberbullying fullCyberbullying full
Cyberbullying full
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 

Similar to Olmv cyberbullying

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Joe Gauder
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
sepulvedamd
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
damarissepulveda
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Marisol Herrera
 
Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshare
Erickson Martinez
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying John Field
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28thJohn Field
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
kschermerhorn
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
Doctora2017
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
HDCH
 
Parents Association Cyberbullying presentation
Parents Association Cyberbullying presentationParents Association Cyberbullying presentation
Parents Association Cyberbullying presentationColEanna
 
Angelo G. mendiola
Angelo G. mendiolaAngelo G. mendiola
Angelo G. mendiola
Angelo Mendiola
 
cyber bulling
 cyber bulling cyber bulling
cyber bulling
superior law college
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
Apostolos Syropoulos
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parents
damarissepulveda
 

Similar to Olmv cyberbullying (20)

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshare
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Parents Association Cyberbullying presentation
Parents Association Cyberbullying presentationParents Association Cyberbullying presentation
Parents Association Cyberbullying presentation
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Angelo G. mendiola
Angelo G. mendiolaAngelo G. mendiola
Angelo G. mendiola
 
cyber bulling
 cyber bulling cyber bulling
cyber bulling
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parents
 

Recently uploaded

Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 

Recently uploaded (20)

Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 

Olmv cyberbullying

  • 1. Cyberbullying Bullying Goes High Tech Jim Masucci November 10, 2010 “It’s one thing when you get made fun of at school, but to be bullied in your own home, via your computer, is a disgusting thing for people to do.” Sixteen year old from Alabama
  • 2. What is Cyberbullying? Being cruel to others by sending or posting harmful material using technological means An individual or group that uses information and communication involving electronic technologies to facilitate deliberate and repeated harassment or threats to an individual or group. Also known as: ‘Electronic Bullying’ & ‘Online Social Cruelty’
  • 3. Tools for Cyberbullying  Cell Phones – calls or messages  Internet  Electronic Mail  Instant Messaging  Blogs  Social Networks  Chat Rooms  Defamatory Web Sites (Polling)
  • 4. Why Cyberbullying? The Internet has become a way of life for most teens, and an easy tool for harassing others. 91% of 12 – 15 year olds use the Internet 99% of teens 16 – 18 use the Internet Available 24 hrs/day, 7 days/wk Victim is a perpetual target
  • 5. Why Cyberbullying? (cont) Traditional bullying – the bully is usually stronger than his or her victim either physically or socially. Usually occurs in the school setting (classroom, playground, or bus). Cyberbullying - Internet tends to level the playing field, affording less dominant teens the means they need to bully others. Sometimes used in revenge for traditional bullying.
  • 6. How Big a Problem Is It?  42% of teens surveyed admitted to being bullied on-line  35% claim to have been threatened.  53% confessed to having said something mean or hurtful on-line. (I-Safe 2007)  More girls than boys are cyberbullied.  For teens that are regular visitors to social networking sites, the chances of them being cyberbullied goes up.  Only 15% of parents knew what cyberbullying was
  • 7. Types of Cyberbullies  Avenging Angel - use technical means to get back at someone who has been bullying them, or one of their friends.  Power Hungry - Closest to traditional school yard bully. Tends to feel superior, and exerts his or her strengths over the victim.
  • 8. Types of Cyberbullies (cont.)  Mean Girls - Work in groups, and need an audience to play to. The group tends to approve of the actions, or do nothing about them.  Inadvertent Bully – Probably don’t even realize they are doing something wrong. Ex : passing on gossip or pictures or answering polls.
  • 9. Forms of Cyberbullying  Flaming – Saying mean or hurtful things  Harassment and cyberstalking - repeated actions such as sending messages, or threats to a victim.  Denigration – putting someone down  Outing – spreading secret or embarrassing information or pictures  Exclusion - intentionally excluding a person by leaving them off of the list.  Impersonation – pretending to be someone else
  • 10. Cyberbullying – It’s Illegal All of the following forms of cyberbulling can lead to arrest & prosecution:  Making threats of violence to people or their property  Making obscene or harassing phone calls  Harassment or stalking  Hate or bias crimes  Creating or sending sexually explicit images of teens  Posting real or doctored photos of someone without their permission  Taking a photo of someone in place where privacy expected
  • 11. Impacts of Cyberbullying  Feelings of guilt or self blame  Sleep difficulties  Poor performance in school  Violence against tormentors. Victims are 8X more likely to bring a weapon to school  Suicide
  • 12. What Should You Do? Teens  Do not respond in a similar manner. Block the screen names if possible.  Do not forward anything  Do not delete messages  Consult an adult  Safeguard user ID’s and passwords. “A password is like a tooth brush. Choose a good one, and don’t share it.” (Yahoo Security Center)
  • 13. What Should You Do? Parents  Take the situation seriously, and be supportive.  Don’t blame the victim.  Increase tech awareness.  Monitor computer use. (Software & placement of computer)  Contact ISP and cell phone provider. Contact law enforcement, if threatened.
  • 14. What Should You Do? Teachers and Schools If the incident occurs during school, investigate and respond. Otherwise :  Respond if the incident causes disruptions.  Provide counseling to the perpetrators and the victims  Develop anti-bulllying programs to educate students
  • 15. Teach Our Children  All actions have consequences  Cyber bullying hurts  They are just being used and manipulated by cyber bully  Cyber bully and accomplices often become the target of cyber bullying themselves  Care about others and stand up for what’s right
  • 16. Legal Issues for Schools  Privacy Issue – Does a school have the right to search a student’s computer for evidence.  Free Speech Issue – Does the school have the right to discipline a student for remarks published on the Internet during non-school hours.
  • 17. Sexting Sending sexually suggestive messages or images to others via cell phone, or posting them on social websites. Surveys of teenagers : - 20 percent have sent or posted picture of themselves - 40 percent of teenagers have sent sexually suggestive messages. - More girls than boys Technology is much more far-reaching and permanent, and teenagers are not consequential thinkers . . . They
  • 18. Sexting – Legal Consequenses Worst Case scenario  Possession or distribution of Child Pornography  Possible inclusion on sex offenders registry. More likely  Suspension or expulsion from school.  Probation and attend counseling