SlideShare a Scribd company logo
Camouflage and Safety in the Virtual World
CyberBullying
Maria Teresa Pessoa, tpessoa@fpce.uc.pt
Other projects CyberBullying
Maria Teresa Pessoa, tpessoa@fpce.uc.pt
CYBERTRAINING PARA PAIS
CyberTraining-4-Parents, 2012
http://cybertraining4parents.org/
Contents:
Principles of our training
Needs assessment
New Media
Principles of our training
• Be aware of teachers/kids/ parents 'needs, expectations
and experiences
• Use activities that require emotional, intellectual and
physical involvement
• Use parents/ teachers/ kids 'knowledge and experience as a
resource for learning
Needs assessment
•to identify different needs, to set priorities, and
to make decisions that will benefit the whole group
• (some) tools you may use to evaluate teachers|
parents’ training needs:
• Questionnaire: “What do I know about cyberbullying?”
8
9
10
New Media...
New Media...
13
What are young
people doing
online?
http://lsedesignunit.com/EUKidsOnline/index.html?r=64
15
• Changes in technological, media and social conditions
• digital natives:
Have grown up with new media, in contrast to their
parents’ generation: digital immigrants
• Major role of the internet and new media
Changes in social conditions
Your own media biographie
Activity:
Self-reflection through a
biographical media journey
17
18
19
What is so fascinating about
new media?
21
•Communication
•Relationship
•Self presentation
Social web services meet young
peoples‘ needs for:
Risk areas
RISK AREA - CONTACT
 E.g. sexual harassment in chat rooms
 The nickname of a 13 year old girl could also
conceal an adult man:
 Hurtful or degrading messages, salacious photos or shaming
comments posted on other people's walls in social networks
 cyberbullying
RISK AREA - CONTENT
 Includes websites that feature:
 pornography,
 violence
 the gloryfication of violence,
 rasicm or
 themes that endanger the health of the
user
RISK AREA - CONTENT
RISK AREA - COMMERCE
 all areas, which serve to enrich others
through commercial means e.g.,
 advertising (e.g., via spam mails),
 internet rip-offs (e.g., through agreement of
illegal and expensive contracts)
 data theft (e.g., through passing on personal
data to third parties without
the permission of the user)
RISK AREA - CONDUCT
 Refers to the user‘s own behaviour
 Cyberbullying
 Illegal downloading of films and music
 Providing harmful content e.g. sites
supporting a disease, such as „Pro Ana“
and „Pro Mia“ suicide forums
cyberbullying...
Bullying has 3 main criteria:
•intention to cause harm to the victim;
•repetition of the abusive behaviour over a period of time;
•an imbalance of power between the victim and
bully/bullies.
However, one particularly severe incident, which creates an
ongoing sense of intimidation can be considered bullying.
Bullying - Definition
 The transition between „school bullying“ and cyberbullying is
fluid
 Cyberbullies can also bully using traditional, direct tactics
 Cyberbullying means that bullying is no longer restricted to
the area of school: it can be continued anywhere and at any
time
Cyberbullying
Cyberbully can sometimes be extremely severe for a number of
reasons.
• Although a cyberbully may post a humiliating photo / video
clip only once, it can be viewed by a huge audience.
• Power can takes a different form in cyber space, such as
anonymity or superior technological skills.
• Technology allows a bully to attack their victim 24 hours a day
in almost any location.
• Cyberbullies are often not able to see or hear their victim’s
reaction to the abuse. This can reduce feelings of empathy or
guilt which might put a stop to bullying in the real world.
Cyberbullying – The problem
Cyberbullying is any behaviour performed through
electronic or digital media by indiviuals or groups
that repeatedly communicate hostile or agressive
messages intended to inflict harm or discomfort to
others (Tokunaga 2010).
Cyberbullying - Definition
Cyberbullying can also be categorised based on the type of behaviour.
• Flaming: An argument that often includes offensive, rude and vulgar
language, insults, and sometimes threats;
• Harassment: Repeatedly sending nasty, mean, and insulting messages;
• Denigration: “Dissing” someone online;
• Impersonation: Pretending to be someone else online for malicious
purposes;
• Outing: Disclosing secrets or personal and private information about the
person that embarrasses or humiliates him/her;
• Trickery: Talking someone into revealing personal information, then sharing
it online;
• Exclusion: Intentionally and cruelly excluding someone;
• Cyber stalking: Repeated, intense harassment and denigration that
includes threats or creates significant fear .
• Sexting - occurs when kids take sexually explicit, provocative or nude pictures
of either themselves or others and send them via text message
Types of Cyberbullying
http://old.digizen.org/cyberbullying/fullFilm.aspx
•How do you feel after watching the clip?
•What is your first impression?
Lightning Feedback:
Let´s fight it together
•What forms of cyberbullying were used?
•How did Joe feel?
•Would you have done something different if
you were Joe's mother or father?
 Poor self-esteem
 Feelings of frustration
 Anger
 Sadness, hopelessness
 Loneliness and depression
 Inability to concentrate at school
 Staying offline
 Victims feel suspicious of others
 Self-harm
 Suicidal thoughts
Impact of cyberbullying
CONCLUSION
• cyberbullying is a relatively new phenomenon and
researchers have yet to reach a consensus on many
aspects of this issue
• There are differences and similarities between bullying
and cyberbullying
• Cyberbullying can be classified in two ways: by the
medium/media through which the abuse occurs, (SMS,
MMS, phone calls etc.) and by the nature of the abuse
itself (harassment, denigration, impersonation etc.)
• The prevalence of cyber victimization in Europe is
estimated to be around 10%
• Cyber victimization has been linked to negative outcomes

More Related Content

What's hot

Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipZephyrum
 
Online Ethics and Etiquette
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette
JessamenTino21
 
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009
Ollie Bray
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
Jose Luis Leon Gonzalez
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525chadolivard
 
Cyber citizenship imen tekaya
Cyber citizenship imen tekayaCyber citizenship imen tekaya
Cyber citizenship imen tekaya
imen Tekaya Bouaziz
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
Safer Internet Day PowerPoint
Safer Internet Day PowerPointSafer Internet Day PowerPoint
Safer Internet Day PowerPoint
Webwise
 
Digital Citizenship: Responsible Behavior in a Digital World
Digital Citizenship: Responsible Behavior in a Digital WorldDigital Citizenship: Responsible Behavior in a Digital World
Digital Citizenship: Responsible Behavior in a Digital WorldDebra Hargrove
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks SlideshareOllie Bray
 
DIGITAL LITERACY Steps to Becoming a Digital Citizen
DIGITAL LITERACY Steps to Becoming a Digital CitizenDIGITAL LITERACY Steps to Becoming a Digital Citizen
DIGITAL LITERACY Steps to Becoming a Digital Citizen
Carla Hayes
 
Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentationSarah Sell
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
SrijanMukhopadhyay1
 
Internet Safety Keypoints Handout
Internet Safety Keypoints HandoutInternet Safety Keypoints Handout
Internet Safety Keypoints Handout
Ollie Bray
 
Glow Internet Safety Talk
Glow Internet Safety TalkGlow Internet Safety Talk
Glow Internet Safety Talk
Ollie Bray
 
Module 2 lesson 2
Module 2 lesson 2Module 2 lesson 2
Module 2 lesson 2
Ira Sagu
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
jeckman1360
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
Larry Magid
 

What's hot (20)

Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Online Ethics and Etiquette
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette
 
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Cyber citizenship imen tekaya
Cyber citizenship imen tekayaCyber citizenship imen tekaya
Cyber citizenship imen tekaya
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Safer Internet Day PowerPoint
Safer Internet Day PowerPointSafer Internet Day PowerPoint
Safer Internet Day PowerPoint
 
Digital Citizenship: Responsible Behavior in a Digital World
Digital Citizenship: Responsible Behavior in a Digital WorldDigital Citizenship: Responsible Behavior in a Digital World
Digital Citizenship: Responsible Behavior in a Digital World
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
DIGITAL LITERACY Steps to Becoming a Digital Citizen
DIGITAL LITERACY Steps to Becoming a Digital CitizenDIGITAL LITERACY Steps to Becoming a Digital Citizen
DIGITAL LITERACY Steps to Becoming a Digital Citizen
 
Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentation
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Internet Safety Keypoints Handout
Internet Safety Keypoints HandoutInternet Safety Keypoints Handout
Internet Safety Keypoints Handout
 
Presentation1 updates 2
Presentation1 updates 2Presentation1 updates 2
Presentation1 updates 2
 
Presentation1 updates 2
Presentation1 updates 2Presentation1 updates 2
Presentation1 updates 2
 
Glow Internet Safety Talk
Glow Internet Safety TalkGlow Internet Safety Talk
Glow Internet Safety Talk
 
Module 2 lesson 2
Module 2 lesson 2Module 2 lesson 2
Module 2 lesson 2
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 

Similar to Camouflage and Safety in the Virtual World

Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By Anamika
Gisha Mathyari
 
Internet Awareness October 2013
Internet Awareness October 2013Internet Awareness October 2013
Internet Awareness October 2013
Julie Esanu
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Amy Guiver
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
lorrflores
 
edukara-cyberbullying-sekolah-daring-210326083240 (1).pptx
edukara-cyberbullying-sekolah-daring-210326083240 (1).pptxedukara-cyberbullying-sekolah-daring-210326083240 (1).pptx
edukara-cyberbullying-sekolah-daring-210326083240 (1).pptx
KEMAHASISWAANINABA
 
Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1
remerosearcenal
 
Online safety 2011
Online safety 2011Online safety 2011
Online safety 2011
Tea Teić
 
O5 - Cyberbullying Guide
O5 - Cyberbullying GuideO5 - Cyberbullying Guide
O5 - Cyberbullying Guide
InterMediaKT
 
O5 - Cyberbullying Guide
O5 - Cyberbullying GuideO5 - Cyberbullying Guide
O5 - Cyberbullying Guide
InterMediaKT
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
pscl
 
Pencegahan Cyberbullying saat Sekolah Daring
Pencegahan Cyberbullying saat Sekolah DaringPencegahan Cyberbullying saat Sekolah Daring
Pencegahan Cyberbullying saat Sekolah Daring
Ismail Fahmi
 
Dwe m4 cyber bullying and conflict resolution
Dwe m4   cyber bullying and conflict resolutionDwe m4   cyber bullying and conflict resolution
Dwe m4 cyber bullying and conflict resolution
Data-Set
 
Cyber bullying arcenal and ayco (1)
Cyber bullying arcenal and ayco (1)Cyber bullying arcenal and ayco (1)
Cyber bullying arcenal and ayco (1)
triciaayco
 
MultiMedia Presentation
MultiMedia PresentationMultiMedia Presentation
MultiMedia Presentation
AshlynnH
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
Ellaine Jasmin Valentos
 
CYBER BULLYING.pptx
CYBER BULLYING.pptxCYBER BULLYING.pptx
CYBER BULLYING.pptx
2058cdtAryankrpal
 
Cyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItCyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent It
FeliciaDixon5
 
Cyber-bullying
Cyber-bullyingCyber-bullying
Cyber-bullying
anwidener
 

Similar to Camouflage and Safety in the Virtual World (20)

Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By Anamika
 
Internet Awareness October 2013
Internet Awareness October 2013Internet Awareness October 2013
Internet Awareness October 2013
 
Bullying
BullyingBullying
Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 
edukara-cyberbullying-sekolah-daring-210326083240 (1).pptx
edukara-cyberbullying-sekolah-daring-210326083240 (1).pptxedukara-cyberbullying-sekolah-daring-210326083240 (1).pptx
edukara-cyberbullying-sekolah-daring-210326083240 (1).pptx
 
Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1
 
Online safety 2011
Online safety 2011Online safety 2011
Online safety 2011
 
O5 - Cyberbullying Guide
O5 - Cyberbullying GuideO5 - Cyberbullying Guide
O5 - Cyberbullying Guide
 
O5 - Cyberbullying Guide
O5 - Cyberbullying GuideO5 - Cyberbullying Guide
O5 - Cyberbullying Guide
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Pencegahan Cyberbullying saat Sekolah Daring
Pencegahan Cyberbullying saat Sekolah DaringPencegahan Cyberbullying saat Sekolah Daring
Pencegahan Cyberbullying saat Sekolah Daring
 
Dwe m4 cyber bullying and conflict resolution
Dwe m4   cyber bullying and conflict resolutionDwe m4   cyber bullying and conflict resolution
Dwe m4 cyber bullying and conflict resolution
 
Cyber bullying arcenal and ayco (1)
Cyber bullying arcenal and ayco (1)Cyber bullying arcenal and ayco (1)
Cyber bullying arcenal and ayco (1)
 
MultiMedia Presentation
MultiMedia PresentationMultiMedia Presentation
MultiMedia Presentation
 
Bully
BullyBully
Bully
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
CYBER BULLYING.pptx
CYBER BULLYING.pptxCYBER BULLYING.pptx
CYBER BULLYING.pptx
 
Cyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItCyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent It
 
Cyber-bullying
Cyber-bullyingCyber-bullying
Cyber-bullying
 

More from InterMediaKT

Let women-choose-publication
Let women-choose-publicationLet women-choose-publication
Let women-choose-publication
InterMediaKT
 
Annual report 2020
Annual report 2020Annual report 2020
Annual report 2020
InterMediaKT
 
InterMediaKT Newsletter 6
InterMediaKT Newsletter 6InterMediaKT Newsletter 6
InterMediaKT Newsletter 6
InterMediaKT
 
InterMediaKT Newsletter #5
InterMediaKT Newsletter #5 InterMediaKT Newsletter #5
InterMediaKT Newsletter #5
InterMediaKT
 
InterMediaKT Newsletter 4
InterMediaKT Newsletter 4InterMediaKT Newsletter 4
InterMediaKT Newsletter 4
InterMediaKT
 
InterMediaKT - Annual Report 2019
InterMediaKT - Annual Report 2019 InterMediaKT - Annual Report 2019
InterMediaKT - Annual Report 2019
InterMediaKT
 
InterMediaKT Newsletter 3
InterMediaKT Newsletter 3InterMediaKT Newsletter 3
InterMediaKT Newsletter 3
InterMediaKT
 
GATES Yearbook - An Erasmus+ Project | play4impact.eu |
GATES Yearbook - An Erasmus+ Project | play4impact.eu | GATES Yearbook - An Erasmus+ Project | play4impact.eu |
GATES Yearbook - An Erasmus+ Project | play4impact.eu |
InterMediaKT
 
InterMediaKT Newsletter 2 - August 2019
InterMediaKT Newsletter 2 - August 2019InterMediaKT Newsletter 2 - August 2019
InterMediaKT Newsletter 2 - August 2019
InterMediaKT
 
Hλεκτρονικός Eκφοβισμός
Hλεκτρονικός Eκφοβισμός Hλεκτρονικός Eκφοβισμός
Hλεκτρονικός Eκφοβισμός
InterMediaKT
 
O5 - Cyberbullying guide - Short version - GR
O5 - Cyberbullying guide - Short version - GRO5 - Cyberbullying guide - Short version - GR
O5 - Cyberbullying guide - Short version - GR
InterMediaKT
 
O5 - Cyberbullying guide - Short version - PT
O5 - Cyberbullying guide - Short version - PTO5 - Cyberbullying guide - Short version - PT
O5 - Cyberbullying guide - Short version - PT
InterMediaKT
 
Guide 3 - Tips for kids
Guide 3 - Tips for kidsGuide 3 - Tips for kids
Guide 3 - Tips for kids
InterMediaKT
 
Guide 2 - Tips for teachers
Guide 2 - Tips for teachersGuide 2 - Tips for teachers
Guide 2 - Tips for teachers
InterMediaKT
 
Online threats and responsible behavior (Bulgarian Safer Internet Centre)
Online threats and responsible behavior (Bulgarian Safer Internet Centre)Online threats and responsible behavior (Bulgarian Safer Internet Centre)
Online threats and responsible behavior (Bulgarian Safer Internet Centre)
InterMediaKT
 
School Mediation student training
School Mediation student trainingSchool Mediation student training
School Mediation student training
InterMediaKT
 
Open Coffee Patras XIX - Tapely
Open Coffee Patras XIX - TapelyOpen Coffee Patras XIX - Tapely
Open Coffee Patras XIX - Tapely
InterMediaKT
 
Open Coffee Patras XIX - Eestec in entrepreneurship
Open Coffee Patras XIX - Eestec in entrepreneurshipOpen Coffee Patras XIX - Eestec in entrepreneurship
Open Coffee Patras XIX - Eestec in entrepreneurship
InterMediaKT
 
Open Coffee Patras XVIII - The Accelerator 2015 by Metavallon
Open Coffee Patras XVIII - The Accelerator 2015 by Metavallon Open Coffee Patras XVIII - The Accelerator 2015 by Metavallon
Open Coffee Patras XVIII - The Accelerator 2015 by Metavallon
InterMediaKT
 
Open Coffee Patras XVII - Startup & media
Open Coffee Patras XVII - Startup & mediaOpen Coffee Patras XVII - Startup & media
Open Coffee Patras XVII - Startup & media
InterMediaKT
 

More from InterMediaKT (20)

Let women-choose-publication
Let women-choose-publicationLet women-choose-publication
Let women-choose-publication
 
Annual report 2020
Annual report 2020Annual report 2020
Annual report 2020
 
InterMediaKT Newsletter 6
InterMediaKT Newsletter 6InterMediaKT Newsletter 6
InterMediaKT Newsletter 6
 
InterMediaKT Newsletter #5
InterMediaKT Newsletter #5 InterMediaKT Newsletter #5
InterMediaKT Newsletter #5
 
InterMediaKT Newsletter 4
InterMediaKT Newsletter 4InterMediaKT Newsletter 4
InterMediaKT Newsletter 4
 
InterMediaKT - Annual Report 2019
InterMediaKT - Annual Report 2019 InterMediaKT - Annual Report 2019
InterMediaKT - Annual Report 2019
 
InterMediaKT Newsletter 3
InterMediaKT Newsletter 3InterMediaKT Newsletter 3
InterMediaKT Newsletter 3
 
GATES Yearbook - An Erasmus+ Project | play4impact.eu |
GATES Yearbook - An Erasmus+ Project | play4impact.eu | GATES Yearbook - An Erasmus+ Project | play4impact.eu |
GATES Yearbook - An Erasmus+ Project | play4impact.eu |
 
InterMediaKT Newsletter 2 - August 2019
InterMediaKT Newsletter 2 - August 2019InterMediaKT Newsletter 2 - August 2019
InterMediaKT Newsletter 2 - August 2019
 
Hλεκτρονικός Eκφοβισμός
Hλεκτρονικός Eκφοβισμός Hλεκτρονικός Eκφοβισμός
Hλεκτρονικός Eκφοβισμός
 
O5 - Cyberbullying guide - Short version - GR
O5 - Cyberbullying guide - Short version - GRO5 - Cyberbullying guide - Short version - GR
O5 - Cyberbullying guide - Short version - GR
 
O5 - Cyberbullying guide - Short version - PT
O5 - Cyberbullying guide - Short version - PTO5 - Cyberbullying guide - Short version - PT
O5 - Cyberbullying guide - Short version - PT
 
Guide 3 - Tips for kids
Guide 3 - Tips for kidsGuide 3 - Tips for kids
Guide 3 - Tips for kids
 
Guide 2 - Tips for teachers
Guide 2 - Tips for teachersGuide 2 - Tips for teachers
Guide 2 - Tips for teachers
 
Online threats and responsible behavior (Bulgarian Safer Internet Centre)
Online threats and responsible behavior (Bulgarian Safer Internet Centre)Online threats and responsible behavior (Bulgarian Safer Internet Centre)
Online threats and responsible behavior (Bulgarian Safer Internet Centre)
 
School Mediation student training
School Mediation student trainingSchool Mediation student training
School Mediation student training
 
Open Coffee Patras XIX - Tapely
Open Coffee Patras XIX - TapelyOpen Coffee Patras XIX - Tapely
Open Coffee Patras XIX - Tapely
 
Open Coffee Patras XIX - Eestec in entrepreneurship
Open Coffee Patras XIX - Eestec in entrepreneurshipOpen Coffee Patras XIX - Eestec in entrepreneurship
Open Coffee Patras XIX - Eestec in entrepreneurship
 
Open Coffee Patras XVIII - The Accelerator 2015 by Metavallon
Open Coffee Patras XVIII - The Accelerator 2015 by Metavallon Open Coffee Patras XVIII - The Accelerator 2015 by Metavallon
Open Coffee Patras XVIII - The Accelerator 2015 by Metavallon
 
Open Coffee Patras XVII - Startup & media
Open Coffee Patras XVII - Startup & mediaOpen Coffee Patras XVII - Startup & media
Open Coffee Patras XVII - Startup & media
 

Recently uploaded

1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 

Recently uploaded (16)

1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 

Camouflage and Safety in the Virtual World

  • 1. Camouflage and Safety in the Virtual World CyberBullying Maria Teresa Pessoa, tpessoa@fpce.uc.pt
  • 2. Other projects CyberBullying Maria Teresa Pessoa, tpessoa@fpce.uc.pt
  • 3.
  • 4. CYBERTRAINING PARA PAIS CyberTraining-4-Parents, 2012 http://cybertraining4parents.org/
  • 5. Contents: Principles of our training Needs assessment New Media
  • 6. Principles of our training • Be aware of teachers/kids/ parents 'needs, expectations and experiences • Use activities that require emotional, intellectual and physical involvement • Use parents/ teachers/ kids 'knowledge and experience as a resource for learning
  • 7. Needs assessment •to identify different needs, to set priorities, and to make decisions that will benefit the whole group • (some) tools you may use to evaluate teachers| parents’ training needs: • Questionnaire: “What do I know about cyberbullying?”
  • 8. 8
  • 9. 9
  • 10. 10
  • 13. 13 What are young people doing online?
  • 15. 15 • Changes in technological, media and social conditions • digital natives: Have grown up with new media, in contrast to their parents’ generation: digital immigrants • Major role of the internet and new media Changes in social conditions
  • 16. Your own media biographie Activity: Self-reflection through a biographical media journey
  • 17. 17
  • 18. 18
  • 19. 19
  • 20. What is so fascinating about new media?
  • 21. 21 •Communication •Relationship •Self presentation Social web services meet young peoples‘ needs for:
  • 23.
  • 24. RISK AREA - CONTACT  E.g. sexual harassment in chat rooms  The nickname of a 13 year old girl could also conceal an adult man:  Hurtful or degrading messages, salacious photos or shaming comments posted on other people's walls in social networks  cyberbullying
  • 25. RISK AREA - CONTENT  Includes websites that feature:  pornography,  violence  the gloryfication of violence,  rasicm or  themes that endanger the health of the user
  • 26. RISK AREA - CONTENT
  • 27. RISK AREA - COMMERCE  all areas, which serve to enrich others through commercial means e.g.,  advertising (e.g., via spam mails),  internet rip-offs (e.g., through agreement of illegal and expensive contracts)  data theft (e.g., through passing on personal data to third parties without the permission of the user)
  • 28. RISK AREA - CONDUCT  Refers to the user‘s own behaviour  Cyberbullying  Illegal downloading of films and music  Providing harmful content e.g. sites supporting a disease, such as „Pro Ana“ and „Pro Mia“ suicide forums
  • 30. Bullying has 3 main criteria: •intention to cause harm to the victim; •repetition of the abusive behaviour over a period of time; •an imbalance of power between the victim and bully/bullies. However, one particularly severe incident, which creates an ongoing sense of intimidation can be considered bullying. Bullying - Definition
  • 31.  The transition between „school bullying“ and cyberbullying is fluid  Cyberbullies can also bully using traditional, direct tactics  Cyberbullying means that bullying is no longer restricted to the area of school: it can be continued anywhere and at any time Cyberbullying
  • 32. Cyberbully can sometimes be extremely severe for a number of reasons. • Although a cyberbully may post a humiliating photo / video clip only once, it can be viewed by a huge audience. • Power can takes a different form in cyber space, such as anonymity or superior technological skills. • Technology allows a bully to attack their victim 24 hours a day in almost any location. • Cyberbullies are often not able to see or hear their victim’s reaction to the abuse. This can reduce feelings of empathy or guilt which might put a stop to bullying in the real world. Cyberbullying – The problem
  • 33. Cyberbullying is any behaviour performed through electronic or digital media by indiviuals or groups that repeatedly communicate hostile or agressive messages intended to inflict harm or discomfort to others (Tokunaga 2010). Cyberbullying - Definition
  • 34. Cyberbullying can also be categorised based on the type of behaviour. • Flaming: An argument that often includes offensive, rude and vulgar language, insults, and sometimes threats; • Harassment: Repeatedly sending nasty, mean, and insulting messages; • Denigration: “Dissing” someone online; • Impersonation: Pretending to be someone else online for malicious purposes; • Outing: Disclosing secrets or personal and private information about the person that embarrasses or humiliates him/her; • Trickery: Talking someone into revealing personal information, then sharing it online; • Exclusion: Intentionally and cruelly excluding someone; • Cyber stalking: Repeated, intense harassment and denigration that includes threats or creates significant fear . • Sexting - occurs when kids take sexually explicit, provocative or nude pictures of either themselves or others and send them via text message Types of Cyberbullying
  • 36. •How do you feel after watching the clip? •What is your first impression? Lightning Feedback:
  • 37. Let´s fight it together •What forms of cyberbullying were used? •How did Joe feel? •Would you have done something different if you were Joe's mother or father?
  • 38.  Poor self-esteem  Feelings of frustration  Anger  Sadness, hopelessness  Loneliness and depression  Inability to concentrate at school  Staying offline  Victims feel suspicious of others  Self-harm  Suicidal thoughts Impact of cyberbullying
  • 39. CONCLUSION • cyberbullying is a relatively new phenomenon and researchers have yet to reach a consensus on many aspects of this issue • There are differences and similarities between bullying and cyberbullying • Cyberbullying can be classified in two ways: by the medium/media through which the abuse occurs, (SMS, MMS, phone calls etc.) and by the nature of the abuse itself (harassment, denigration, impersonation etc.) • The prevalence of cyber victimization in Europe is estimated to be around 10% • Cyber victimization has been linked to negative outcomes