SlideShare a Scribd company logo
1 of 16
Cyberbullying
INTC 2610
What is Cyberbullying
 "Cyberbullying" is when a child, preteen or teen is

tormented, threatened, harassed, humiliated,
embarrassed or otherwise targeted by another
child, preteen or teen using the Internet,
interactive and digital technologies or mobile
phones.
KEY STATISTICS on CYBERBULLYING















Key Statistics on Cyberbullying
85% of middle schoolers polled reported being cyberbullied at least once.
70% of teens polled reported cyberbullying someone else.
86% of elementary school students share their password with their friend(s).
70% of teens polled said they share their password with their
boyfriend/girlfriend or best friend. Sharing your password is the digital
generation’s equivalent of a “friendship ring.”
Cyberbullying starts in 3rd and peaks in 4th grade and again in 7th-8th grade.
Only 5% of middle schoolers would tell their parents if they were cyberbullied.
Middle schoolers have identified 57 different reasons not to tell their parents.
Teens have identified 68 different ways to cyberbully someone.
Cellphones are used 38% of the time to cyberbully someone.
Social networks are used 39% of the time to cyberbully someone.
Password theft or misuse accounts for 27% of cyberbullying. (There is overlap
between this and social networking cyberbullying.)
44% of boys in high school reported having seen at least one nude image of a
classmate.
How Cyberbullying Works
 Direct attacks (messages sent to your kids directly)

and
 By proxy (using others to help cyberbully the victim,
either with or without the accomplice's knowledge).
TEXT Messaging Harassment
 Hateful or threatening messages to other kids
 Warning wars – ISP send warnings if a kid is caught

sending and then kick them off.
 A screen name that is very similar to another kid's
name..poses as another
 Text attacks-kids gang up –high volume of text =
higher cell phone charges
 Death threats – text, photos,
videos
Stealing passwords
 A kid may steal another child's password and begin to

chat with other people, pretending to be the other kid.

 A kid may also use another kid's password to change

his/her profile to include sexual, racist, and
inappropriate things that may attract unwanted attention
or offend people.

 A kid often steals the password and locks the victim out

of their own account.

 Once the password is stolen, hackers may use it to hack

into the victim's computer.
Blogs
 Blogs are online journals. Kids sometimes use these blogs

to damage other kids' reputations or invade their privacy.

 For example, in one case, a boy posted a bunch of blogs

about his breakup with his ex-girlfriend, explaining how
she destroyed his life, calling her degrading names. Their
mutual friends read about this and criticized her. She
was embarrassed and hurt, all because another kid
posted mean, private, and false information about her.

 Sometimes kids set up a blog or profile page pretending

to be their victim and saying things designed to humiliate
them.
Sending Pictures through E-mail
and Cell Phones
 There have been cases of teens sending

mass e-mails to other users, that
include nude or degrading pictures of
other teens. Once an e-mail like this is
sent, it is passed around to hundreds
of other people within hours; there is
no way of controlling where it goes.

 The kids receive the pictures directly

on their phones, and may send it to
everyone in their address books or post
in online photos websites.


 Kids often take a picture of someone in

a locker room, bathroom or dressing
room and post it online or send it to
others on cell phones.
Internet Polling
 Who's Hot? Who's Not? Who

is the biggest slut in the sixth
grade? These types of
questions run rampant on the
Internet polls, all created by
yours truly - kids and teens.
Such questions are often very
offensive to others and are yet
another way that kids can
"bully" other kids online.
Interactive Gaming
 Gaming allows chat and other interactivity
 Kids verbally abuse the other kids, using threats and lewd
language.
 Lock them out of games, passing false rumors about them or
hacking into their accounts.
Sending Malicious Code
 SEND….
 viruses,
 spyware and
 hacking programs to their victims.
 They do this to either destroy their computers or spy

on their victim.
 Trojan Horse programs allow the cyberbully to
control their victim's computer remote control, and
can be used to erase the hard drive of the victim.
Sending Porn and
Other Junk E-Mail
 Sign their victims up for e-mailing and IM marketing

lists, lots of them, especially to porn sites.
 Parents usually get involved, either blaming them
(assuming they have been visiting porn sites) or
making them change their e-mail.
Impersonation
 Post provocative messages in a hate group's chatroom posing

as the victim,
 inviting an attack against the victim,
 often giving the name, address and telephone number of the
victim to make the hate group's job easier. S
 Send a message to someone posing as the victim, saying
hateful or threatening things while masquerading as the
victim. They may also alter a message really from the victim,
making it appear that they have said nasty things or shared
secrets with others.
Why Cyberbully?
 Anger, revenge or frustration.
 For Entertainment
 Out of Boredom
 To intentionally torment
Help Stop Cyberbullying
 Educate students – cyberbullying is hurtful to the

victim. Don’t be a part of it.
 Encourage students not to respond if it happens to
them.
 Be aware of anonymous methods of reporting
cyberbullying…to administration or police.
NJ and the law
 In 2002, New Jersey adopted its first anti-bullying

legislation.
 In January 2011 that law was strengthened.








The appointment of specific people in each school and district to run
antibullying programs
the investigation of any episodes starting within a day after they
occur
Public school employees are required to take training courses on how
to pick up on cyberbullying, while forcing all districts to create
"school safety teams" to consider complaints of bullying.
School bullies to face suspension or expulsion, and requires school
superintendents to report all bullying incidents to the New Jersey
Board of Education
Schools and districts will receive grades on how well they handle and
defuse such incidents.

More Related Content

What's hot (20)

How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying Presentation
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?
 
21st Century Bullying Crueler Than Ever
21st Century Bullying   Crueler Than Ever21st Century Bullying   Crueler Than Ever
21st Century Bullying Crueler Than Ever
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
 
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?""Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
 
Parents must know about cyber bullying 2
Parents must know about cyber bullying  2Parents must know about cyber bullying  2
Parents must know about cyber bullying 2
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Parents must know about cyber bullying 1
Parents must know about cyber bullying 1Parents must know about cyber bullying 1
Parents must know about cyber bullying 1
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 

Viewers also liked

ADPL Media presentations
ADPL Media presentationsADPL Media presentations
ADPL Media presentationsADPLMedia
 
Scan 01 Dec 2015 17.38
Scan 01 Dec 2015 17.38Scan 01 Dec 2015 17.38
Scan 01 Dec 2015 17.38Łukasz Ozimek
 
Eating a healthy breakfast- Falicya Crace
Eating a healthy breakfast- Falicya CraceEating a healthy breakfast- Falicya Crace
Eating a healthy breakfast- Falicya CraceFalicya Crace
 
Economia internacional
Economia internacionalEconomia internacional
Economia internacionalKelvin2015
 
Agrapress - 19 novembre
Agrapress - 19 novembreAgrapress - 19 novembre
Agrapress - 19 novembrefuturpera
 
Propostas - CACOS 2013/14
Propostas - CACOS 2013/14Propostas - CACOS 2013/14
Propostas - CACOS 2013/14Jorge Moura
 
小金井市オープンデータOn e2d3
小金井市オープンデータOn e2d3小金井市オープンデータOn e2d3
小金井市オープンデータOn e2d3Koganei Triathlon
 
Tabla de virus (autoguardado)
Tabla de virus (autoguardado)Tabla de virus (autoguardado)
Tabla de virus (autoguardado)reynate
 
Encuentro de Orientadores 2013/Factores criticos de_exito_2013
Encuentro de Orientadores 2013/Factores criticos de_exito_2013Encuentro de Orientadores 2013/Factores criticos de_exito_2013
Encuentro de Orientadores 2013/Factores criticos de_exito_2013CedemInacap
 
Beshir ajvzogllu estetika islame
Beshir ajvzogllu estetika islameBeshir ajvzogllu estetika islame
Beshir ajvzogllu estetika islameLibra Islame
 
Competency demonstration report
Competency demonstration reportCompetency demonstration report
Competency demonstration reportSampleCDR
 
Эффективная и эффектная презентация
Эффективная и эффектная презентацияЭффективная и эффектная презентация
Эффективная и эффектная презентацияНастя Хамелеон
 
Geografia 2 grado primaria
Geografia 2 grado primariaGeografia 2 grado primaria
Geografia 2 grado primariaAlx Js
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpointjosiebrookeday
 

Viewers also liked (17)

ADPL Media presentations
ADPL Media presentationsADPL Media presentations
ADPL Media presentations
 
Scan 01 Dec 2015 17.38
Scan 01 Dec 2015 17.38Scan 01 Dec 2015 17.38
Scan 01 Dec 2015 17.38
 
Eating a healthy breakfast- Falicya Crace
Eating a healthy breakfast- Falicya CraceEating a healthy breakfast- Falicya Crace
Eating a healthy breakfast- Falicya Crace
 
Economia internacional
Economia internacionalEconomia internacional
Economia internacional
 
Agrapress - 19 novembre
Agrapress - 19 novembreAgrapress - 19 novembre
Agrapress - 19 novembre
 
Lecture 9
Lecture 9Lecture 9
Lecture 9
 
Caso raúl velarde
Caso raúl velardeCaso raúl velarde
Caso raúl velarde
 
Propostas - CACOS 2013/14
Propostas - CACOS 2013/14Propostas - CACOS 2013/14
Propostas - CACOS 2013/14
 
小金井市オープンデータOn e2d3
小金井市オープンデータOn e2d3小金井市オープンデータOn e2d3
小金井市オープンデータOn e2d3
 
Tabla de virus (autoguardado)
Tabla de virus (autoguardado)Tabla de virus (autoguardado)
Tabla de virus (autoguardado)
 
Encuentro de Orientadores 2013/Factores criticos de_exito_2013
Encuentro de Orientadores 2013/Factores criticos de_exito_2013Encuentro de Orientadores 2013/Factores criticos de_exito_2013
Encuentro de Orientadores 2013/Factores criticos de_exito_2013
 
Beshir ajvzogllu estetika islame
Beshir ajvzogllu estetika islameBeshir ajvzogllu estetika islame
Beshir ajvzogllu estetika islame
 
Competency demonstration report
Competency demonstration reportCompetency demonstration report
Competency demonstration report
 
Эффективная и эффектная презентация
Эффективная и эффектная презентацияЭффективная и эффектная презентация
Эффективная и эффектная презентация
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Geografia 2 grado primaria
Geografia 2 grado primariaGeografia 2 grado primaria
Geografia 2 grado primaria
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 

Similar to Ppt cyberbullying

Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptNaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptpurush203
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
CyberbullyingspecR Smith
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfCharanBobby69CB
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingR Smith
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaasofisalazar00
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying estegiulimazziotti96
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngmiliarguelles1
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaamiliarguelles
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngmiliarguelles1
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxIs Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxchristiandean12115
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GArissa Ablao
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 

Similar to Ppt cyberbullying (20)

Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Essays On Cyber Bullying
Essays On Cyber BullyingEssays On Cyber Bullying
Essays On Cyber Bullying
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying este
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxIs Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 

More from 3610Instructor

More from 3610Instructor (18)

Pln spr14
Pln spr14Pln spr14
Pln spr14
 
Flipped classroom project
Flipped classroom projectFlipped classroom project
Flipped classroom project
 
Communication tools
Communication tools Communication tools
Communication tools
 
Visual literacy ppt
Visual literacy pptVisual literacy ppt
Visual literacy ppt
 
Portfolio ppt
Portfolio pptPortfolio ppt
Portfolio ppt
 
Pln prof.org ppt_fa13
Pln prof.org ppt_fa13Pln prof.org ppt_fa13
Pln prof.org ppt_fa13
 
Social bookmarking lsit ppt
Social bookmarking lsit pptSocial bookmarking lsit ppt
Social bookmarking lsit ppt
 
Nings
NingsNings
Nings
 
Communication tools ppt fa2013
Communication tools ppt fa2013Communication tools ppt fa2013
Communication tools ppt fa2013
 
Ppt blooms lesson_plans
Ppt blooms lesson_plansPpt blooms lesson_plans
Ppt blooms lesson_plans
 
Lesson1 tools for the classroom
Lesson1 tools for the classroomLesson1 tools for the classroom
Lesson1 tools for the classroom
 
Pln nings ppt_spr13
Pln nings ppt_spr13Pln nings ppt_spr13
Pln nings ppt_spr13
 
Rev competition
Rev competitionRev competition
Rev competition
 
Review ownership
Review ownershipReview ownership
Review ownership
 
Webquests ppt
Webquests pptWebquests ppt
Webquests ppt
 
Pln ppt1
Pln ppt1Pln ppt1
Pln ppt1
 
Handhelds in the classroom
Handhelds in the classroomHandhelds in the classroom
Handhelds in the classroom
 
Lesson1 tools for the classroom
Lesson1 tools for the classroomLesson1 tools for the classroom
Lesson1 tools for the classroom
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Ppt cyberbullying

  • 2. What is Cyberbullying  "Cyberbullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones.
  • 3. KEY STATISTICS on CYBERBULLYING              Key Statistics on Cyberbullying 85% of middle schoolers polled reported being cyberbullied at least once. 70% of teens polled reported cyberbullying someone else. 86% of elementary school students share their password with their friend(s). 70% of teens polled said they share their password with their boyfriend/girlfriend or best friend. Sharing your password is the digital generation’s equivalent of a “friendship ring.” Cyberbullying starts in 3rd and peaks in 4th grade and again in 7th-8th grade. Only 5% of middle schoolers would tell their parents if they were cyberbullied. Middle schoolers have identified 57 different reasons not to tell their parents. Teens have identified 68 different ways to cyberbully someone. Cellphones are used 38% of the time to cyberbully someone. Social networks are used 39% of the time to cyberbully someone. Password theft or misuse accounts for 27% of cyberbullying. (There is overlap between this and social networking cyberbullying.) 44% of boys in high school reported having seen at least one nude image of a classmate.
  • 4. How Cyberbullying Works  Direct attacks (messages sent to your kids directly) and  By proxy (using others to help cyberbully the victim, either with or without the accomplice's knowledge).
  • 5. TEXT Messaging Harassment  Hateful or threatening messages to other kids  Warning wars – ISP send warnings if a kid is caught sending and then kick them off.  A screen name that is very similar to another kid's name..poses as another  Text attacks-kids gang up –high volume of text = higher cell phone charges  Death threats – text, photos, videos
  • 6. Stealing passwords  A kid may steal another child's password and begin to chat with other people, pretending to be the other kid.  A kid may also use another kid's password to change his/her profile to include sexual, racist, and inappropriate things that may attract unwanted attention or offend people.  A kid often steals the password and locks the victim out of their own account.  Once the password is stolen, hackers may use it to hack into the victim's computer.
  • 7. Blogs  Blogs are online journals. Kids sometimes use these blogs to damage other kids' reputations or invade their privacy.  For example, in one case, a boy posted a bunch of blogs about his breakup with his ex-girlfriend, explaining how she destroyed his life, calling her degrading names. Their mutual friends read about this and criticized her. She was embarrassed and hurt, all because another kid posted mean, private, and false information about her.  Sometimes kids set up a blog or profile page pretending to be their victim and saying things designed to humiliate them.
  • 8. Sending Pictures through E-mail and Cell Phones  There have been cases of teens sending mass e-mails to other users, that include nude or degrading pictures of other teens. Once an e-mail like this is sent, it is passed around to hundreds of other people within hours; there is no way of controlling where it goes.  The kids receive the pictures directly on their phones, and may send it to everyone in their address books or post in online photos websites.   Kids often take a picture of someone in a locker room, bathroom or dressing room and post it online or send it to others on cell phones.
  • 9. Internet Polling  Who's Hot? Who's Not? Who is the biggest slut in the sixth grade? These types of questions run rampant on the Internet polls, all created by yours truly - kids and teens. Such questions are often very offensive to others and are yet another way that kids can "bully" other kids online.
  • 10. Interactive Gaming  Gaming allows chat and other interactivity  Kids verbally abuse the other kids, using threats and lewd language.  Lock them out of games, passing false rumors about them or hacking into their accounts.
  • 11. Sending Malicious Code  SEND….  viruses,  spyware and  hacking programs to their victims.  They do this to either destroy their computers or spy on their victim.  Trojan Horse programs allow the cyberbully to control their victim's computer remote control, and can be used to erase the hard drive of the victim.
  • 12. Sending Porn and Other Junk E-Mail  Sign their victims up for e-mailing and IM marketing lists, lots of them, especially to porn sites.  Parents usually get involved, either blaming them (assuming they have been visiting porn sites) or making them change their e-mail.
  • 13. Impersonation  Post provocative messages in a hate group's chatroom posing as the victim,  inviting an attack against the victim,  often giving the name, address and telephone number of the victim to make the hate group's job easier. S  Send a message to someone posing as the victim, saying hateful or threatening things while masquerading as the victim. They may also alter a message really from the victim, making it appear that they have said nasty things or shared secrets with others.
  • 14. Why Cyberbully?  Anger, revenge or frustration.  For Entertainment  Out of Boredom  To intentionally torment
  • 15. Help Stop Cyberbullying  Educate students – cyberbullying is hurtful to the victim. Don’t be a part of it.  Encourage students not to respond if it happens to them.  Be aware of anonymous methods of reporting cyberbullying…to administration or police.
  • 16. NJ and the law  In 2002, New Jersey adopted its first anti-bullying legislation.  In January 2011 that law was strengthened.      The appointment of specific people in each school and district to run antibullying programs the investigation of any episodes starting within a day after they occur Public school employees are required to take training courses on how to pick up on cyberbullying, while forcing all districts to create "school safety teams" to consider complaints of bullying. School bullies to face suspension or expulsion, and requires school superintendents to report all bullying incidents to the New Jersey Board of Education Schools and districts will receive grades on how well they handle and defuse such incidents.