SlideShare a Scribd company logo
Team Mosaic:
  Hannah Morrell
Emmanuelle Besnard
    Dustin Sikes
Allison Dobosiewicz
   Tyler Rutledge
   What?
        When a child, preteen or teen is tormented by another child, preteen or
         teen using the Internet, interactive and digital technologies or mobile
         phones. It has to have a minor on both sides, or at least have been
         instigated by a minor against another minor.
   How?
        The methods used are limited only by the child's imagination and access to
         technology (Social networks, phones, chats…)




   www.stopcyberbultying.org
   Criminal case upon which Lori Drew was
    convicted of Computer Fraud and Abuse over
    the cyber-bullying of 13 year old Megan Meier.
   Drew, a 49 year old woman living in
    Missouri, created a fake myspace account with
    the alias name Josh Evans to befriend Megan
    Meier
   “Evans” and Meier began a flirtatious
    relationship that turned sour fast
   Megan Meier hung herself because of the
    remarks made by “Evans”
http://abcnews.go.com/GMA/story?id=3882520&page=1
   20% had someone pretend to         45% of all teens have
    be someone else in order to
    trick them into revealing           been cyberbullied in
    personal information
   17% were victimized by              the past year alone
    someone lying about them
    online
   13% learned that a
    cyberbully was pretending to
    be them while
    communicating with
    someone else
   10% were victimized by
    someone else posting
    unflattering pictures of them
    without permission


        www.ncpc.org
http://www.cyberbullying.us/research.php.
   Middle and High Schools
       Faculty
       Parents of students
       Students
   Create separate packets for each group
   Community
   Needs the most information
   Include background data so they can create
    their own presentations based on class needs
   Topics:
       How to tell if a student is being bullied online
       What to do if you suspect cyber bullying
       How you can prevent cyber bullying as a faculty
        member
   Also require a lot of background data. Focusing
    on prevention and signs
   Topics:
     How to prevent your child from becoming a target
      of bullying
     What to do if you find your child is being targeted
     How to know if your child is a bully online, and how
      to stop it
   Require the most targeted information on how
    to deal with being targeted
   Topics
       What to do if you are being cyber bullied
       How to prevent being targeted by cyber bullies
       How to be respectful of others online
   With the communities help we can create
    enough awareness to eventually stop cyber
    bullying
   Together we can decrease the statistics of cyber
    bullying
   Cyber bullying is too big of an issue to handle
    alone
   Make official laws against cyberbullying
   Join local PTA‟s
     Write letters to lawmakers
     Flag cyberbullying on social media sites
     Join movements/organizations




http://www.socialsafety.org/law_enforcement_cyberbullying.html
   E-mails,
   Instant messaging,
   Text or digital imaging messages sent on cell
    phones,
   Web pages
   Web logs (blogs), Chat rooms or discussion
    groups
   Social Networking sites
   Start a anti cyberbullying campaign
   School involvement
          Special events
          Public speakers and personal testimonies
          Pledging to not bully
          PSA involvement
   Advertisement on Facebook
   You tube video
Place a permanent ad on Facebook raising cyberbullying awareness and
prevention
   Educate social media
    users on how to
    recognize, handle, and
    prevent cyberbullying
   Show people the effects of
    cyberbullying
   Inform people on how to
    report or go to higher
    authority if needed
   Get people involved in the
    anti cyberbullying
    movement
   No more anonymity
   Get laws passed making
    cyberbullying illegal
   Facebook‟s marketing director Randi
    Zuckerberg says the best way to end
    cyberbullying is to not allow anonymous or
    spam accounts
   “people hide behind anonymity and feel like
    they can say whatever they want behind closed
    doors”
   Eric Schmidt, former Google CEO has made
    this suggestion in the past and predictes
    “govenments will eventually „demand‟ that
    people use their names for all online activity”
    http://www.huffingtonpost.com/mobileweb/2011/07/27/ra
    ndi-zuckerberg-anonymity-online_n_910892.html
   Conditions and terms of use agreement before
    accessing a Social media site
   Public record of your social media account
       Monitor Activity
       Point system like drivers when flagged or reported.
   Our optimal plan will be to pair with a
    nonprofit and use their financial backing to
    help get our program off the ground. If not, we
    have several options:
     Bootstrapping: Generate funds ourselves
     Small bank loans
     Partner with similar programs of size or scope
   How are we going to measure our success?
   Indicators:
     Social media monitoring: Are kids talking about the
      issue?
     Website traffic: Is our website generating views?
     Number of participants: How many
      schools, faculty, parents, and/or students are
      participating?
   Focus on effectiveness more than efficency
   www.stopcyberbullying.org
   http://csriu.org/cyberbully.
   http://www.socialsafety.org/law_enforcement_cy
    berbullying.html
   http://www.cyberbullying.us/research.php
   www.ncpc.org
   http://abcnews.go.com/GMA/story?id=3882520
    &page=1
   http://www.huffingtonpost.com/mobileweb/201
    1/07/27/randi-zuckerberg-anonymity-
    online_n_910892.html

More Related Content

What's hot

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
CoachElrod
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Andreareyeshdz
 
The Psychology of Bullying. Statistics & Societal Response Ireland. By There...
The Psychology of Bullying.  Statistics & Societal Response Ireland. By There...The Psychology of Bullying.  Statistics & Societal Response Ireland. By There...
The Psychology of Bullying. Statistics & Societal Response Ireland. By There...
Theresa Lowry-Lehnen
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
HDCH
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power point
mb29thom
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
pamelazuley
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
Courtney Cole
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
TeamBanana
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
Miriam Pananaliksik
 
Anti bullying campaign
Anti bullying campaignAnti bullying campaign
Anti bullying campaign
Deidre Pike
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
ringw1sl
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
Karissa Joy Daculap
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
griehl
 
Digital abuse
Digital abuseDigital abuse
Digital abuse
Penda Sunkett
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
pardolopez
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
TechnoArmor Consulting
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Marc Kuhn
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
CarlosE15
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Doha qaradeh
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
Sally Garza
 

What's hot (20)

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
The Psychology of Bullying. Statistics & Societal Response Ireland. By There...
The Psychology of Bullying.  Statistics & Societal Response Ireland. By There...The Psychology of Bullying.  Statistics & Societal Response Ireland. By There...
The Psychology of Bullying. Statistics & Societal Response Ireland. By There...
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power point
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 
Anti bullying campaign
Anti bullying campaignAnti bullying campaign
Anti bullying campaign
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Digital abuse
Digital abuseDigital abuse
Digital abuse
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 

Similar to Pr cyberbullying campaign powerpoint

Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
HannahMorrell
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
victoriahoo
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversation
lippertnicole
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
alanrgibson41217
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
Larry Magid
 
Aurora - Social media
Aurora - Social mediaAurora - Social media
Aurora - Social media
Mike North
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)
amalgarn
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
Yaman Singhania
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Zekhaya Sithole
 
Facebook
FacebookFacebook
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
ronak56
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYING
JaveriaZain1
 
How to stop cyber bullying
How to stop cyber bullyingHow to stop cyber bullying
How to stop cyber bullying
Bullyvention
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
HomeGuides
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
mribera87
 
Chandan kumar
Chandan kumarChandan kumar
Cybersafey
Cybersafey Cybersafey
Cybersafey
Vanessa Assumpção
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and school
Grant Ward
 
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxIs Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
christiandean12115
 
Parenting the Net Generation - Full Version
Parenting the Net Generation - Full VersionParenting the Net Generation - Full Version
Parenting the Net Generation - Full Version
MediaSmarts | HabiloMédias
 

Similar to Pr cyberbullying campaign powerpoint (20)

Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversation
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Aurora - Social media
Aurora - Social mediaAurora - Social media
Aurora - Social media
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Facebook
FacebookFacebook
Facebook
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYING
 
How to stop cyber bullying
How to stop cyber bullyingHow to stop cyber bullying
How to stop cyber bullying
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Chandan kumar
Chandan kumarChandan kumar
Chandan kumar
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and school
 
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxIs Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
 
Parenting the Net Generation - Full Version
Parenting the Net Generation - Full VersionParenting the Net Generation - Full Version
Parenting the Net Generation - Full Version
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 

Pr cyberbullying campaign powerpoint

  • 1. Team Mosaic: Hannah Morrell Emmanuelle Besnard Dustin Sikes Allison Dobosiewicz Tyler Rutledge
  • 2. What?  When a child, preteen or teen is tormented by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. It has to have a minor on both sides, or at least have been instigated by a minor against another minor.  How?  The methods used are limited only by the child's imagination and access to technology (Social networks, phones, chats…)  www.stopcyberbultying.org
  • 3. Criminal case upon which Lori Drew was convicted of Computer Fraud and Abuse over the cyber-bullying of 13 year old Megan Meier.  Drew, a 49 year old woman living in Missouri, created a fake myspace account with the alias name Josh Evans to befriend Megan Meier  “Evans” and Meier began a flirtatious relationship that turned sour fast  Megan Meier hung herself because of the remarks made by “Evans” http://abcnews.go.com/GMA/story?id=3882520&page=1
  • 4. 20% had someone pretend to  45% of all teens have be someone else in order to trick them into revealing been cyberbullied in personal information  17% were victimized by the past year alone someone lying about them online  13% learned that a cyberbully was pretending to be them while communicating with someone else  10% were victimized by someone else posting unflattering pictures of them without permission www.ncpc.org
  • 6. Middle and High Schools  Faculty  Parents of students  Students  Create separate packets for each group  Community
  • 7. Needs the most information  Include background data so they can create their own presentations based on class needs  Topics:  How to tell if a student is being bullied online  What to do if you suspect cyber bullying  How you can prevent cyber bullying as a faculty member
  • 8. Also require a lot of background data. Focusing on prevention and signs  Topics:  How to prevent your child from becoming a target of bullying  What to do if you find your child is being targeted  How to know if your child is a bully online, and how to stop it
  • 9. Require the most targeted information on how to deal with being targeted  Topics  What to do if you are being cyber bullied  How to prevent being targeted by cyber bullies  How to be respectful of others online
  • 10. With the communities help we can create enough awareness to eventually stop cyber bullying  Together we can decrease the statistics of cyber bullying  Cyber bullying is too big of an issue to handle alone  Make official laws against cyberbullying
  • 11. Join local PTA‟s  Write letters to lawmakers  Flag cyberbullying on social media sites  Join movements/organizations http://www.socialsafety.org/law_enforcement_cyberbullying.html
  • 12. E-mails,  Instant messaging,  Text or digital imaging messages sent on cell phones,  Web pages  Web logs (blogs), Chat rooms or discussion groups  Social Networking sites
  • 13. Start a anti cyberbullying campaign  School involvement  Special events  Public speakers and personal testimonies  Pledging to not bully  PSA involvement  Advertisement on Facebook  You tube video
  • 14. Place a permanent ad on Facebook raising cyberbullying awareness and prevention
  • 15. Educate social media users on how to recognize, handle, and prevent cyberbullying  Show people the effects of cyberbullying  Inform people on how to report or go to higher authority if needed  Get people involved in the anti cyberbullying movement  No more anonymity  Get laws passed making cyberbullying illegal
  • 16. Facebook‟s marketing director Randi Zuckerberg says the best way to end cyberbullying is to not allow anonymous or spam accounts  “people hide behind anonymity and feel like they can say whatever they want behind closed doors”  Eric Schmidt, former Google CEO has made this suggestion in the past and predictes “govenments will eventually „demand‟ that people use their names for all online activity” http://www.huffingtonpost.com/mobileweb/2011/07/27/ra ndi-zuckerberg-anonymity-online_n_910892.html
  • 17. Conditions and terms of use agreement before accessing a Social media site  Public record of your social media account  Monitor Activity  Point system like drivers when flagged or reported.
  • 18. Our optimal plan will be to pair with a nonprofit and use their financial backing to help get our program off the ground. If not, we have several options:  Bootstrapping: Generate funds ourselves  Small bank loans  Partner with similar programs of size or scope
  • 19. How are we going to measure our success?  Indicators:  Social media monitoring: Are kids talking about the issue?  Website traffic: Is our website generating views?  Number of participants: How many schools, faculty, parents, and/or students are participating?  Focus on effectiveness more than efficency
  • 20.
  • 21. www.stopcyberbullying.org  http://csriu.org/cyberbully.  http://www.socialsafety.org/law_enforcement_cy berbullying.html  http://www.cyberbullying.us/research.php  www.ncpc.org  http://abcnews.go.com/GMA/story?id=3882520 &page=1  http://www.huffingtonpost.com/mobileweb/201 1/07/27/randi-zuckerberg-anonymity- online_n_910892.html