SlideShare a Scribd company logo
1 of 35
Cyberbullying
What is cyberbullying? Cyberbullying in any kind of negative virtual communication.
There are many ways to bully someone other than just sending them a message.
Ways of Cyberbullying ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Instant messaging Sending threatening messages through IM’s or texting.  Sending warning messages not to tell on them. Creating screen names that are 1 letter away from someone else’s screen name and sending offensive messages Texting wars and death threats
Stealing passwords Student’s may steal passwords and access other’s accounts to send offensive messages to anger them. Students may gain access to an account and then change the settings to lock them out.
Blogs Blogs are used as online journals to write damaging thing about someone’s reputation.
Web Sites Web sites are created to insult another student or a group of students.  Students also post pictures and personal information about other students.
Sending pictures through cell phones and email Sending degrading photos through e-mails; the emails can then be passed around to hundreds of emails within hours. New cell phones are now able to send photos and can be spread to an entire address book at once.
Sending Malicious Code Student send viruses, spyware and hacking programs to other computers as a form of harassment. Some programs can even give the student access to a victims computer.
Impersonation When a student impersonates another students they usually do this in a chat room.  The students reveals personal information that could include name, address and phone number.  This could lead to an attack on the victim.
Prevention Understand that teasing, threats and taking over someone’s identity are all forms of bullying. If this happens to you report the behaviors to an adult. Parents
Parents Tell you parents. Parents need to inform you school counselor of the cyberbullying. Parents need to tell your doctor. It may be necessary to have counseling until the problems are resolved. Netiquette
[object Object],[object Object],[object Object],Go to Quiz
[object Object],[object Object],[object Object],[object Object]
Go read for the answer again. Read here
Instant messaging Sending threatening messages through IM’s or texting.  Sending warning messages not to tell on them. Creating screen names that are 1 letter away from someone else’s screen name and sending offensive messages Texting wars and death threats Go back to question
NEXT QUESTION
[object Object],[object Object],[object Object],[object Object]
Go read for the answer again. Read here
Stealing passwords Student’s may steal passwords and access other’s accounts to send offensive messages to anger them. Students may gain access to an account and then change the settings to lock them out.  Go back to question
NEXT QUESTION
[object Object],[object Object],[object Object],[object Object]
Go read for the answer again. Read here
Web Sites Web sites are created to insult another student or a group of students.  Students also post pictures and personal information about other students.  Go back to question
NEXT QUESTION
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Go read for the answer again. Read here
Sending pictures through cell phones and email Sending degrading photos through e-mails; the emails can then be passed around to hundreds of emails within hours. New cell phones are now able to send photos and can be spread to an entire address book at once.  Go back to question
NEXT QUESTION
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Go read for the answer again. Read here
Sending Malicious Code Student send viruses, spyware and hacking programs to other computers as a form of harassment. Some programs can even give the student access to a victims computer.  Go back to question  Impersonation When a student impersonates another students they usually do this in a chat room.  The students reveals personal information that could include name, address and phone number.  This could lead to an attack on the victim.
NEXT PAGE
Congratulations  you have just finished  your Cyberbullying training.

More Related Content

What's hot

Internet saftey
Internet safteyInternet saftey
Internet safteyryanbud
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles schoolesksaints
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet SafetyKigose
 
Internet safety
Internet safetyInternet safety
Internet safetyjld1018
 
Digital citizenship contract
Digital citizenship contractDigital citizenship contract
Digital citizenship contractClaire Amos
 

What's hot (6)

Internet saftey
Internet safteyInternet saftey
Internet saftey
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Digital citizenship contract
Digital citizenship contractDigital citizenship contract
Digital citizenship contract
 

Viewers also liked

Herramientas de Comunicación 2.0
Herramientas de Comunicación 2.0Herramientas de Comunicación 2.0
Herramientas de Comunicación 2.0Rubén Cárdenas
 
Understanding what attributes can sustain 5 s for_slideshare
Understanding what attributes can sustain 5 s for_slideshareUnderstanding what attributes can sustain 5 s for_slideshare
Understanding what attributes can sustain 5 s for_slideshareSubikash Roy
 
Workshop 25.05.2016 a SPS Italia - SENECA LET'S - VPN Connectivity Solutions
Workshop 25.05.2016 a SPS Italia - SENECA LET'S - VPN Connectivity SolutionsWorkshop 25.05.2016 a SPS Italia - SENECA LET'S - VPN Connectivity Solutions
Workshop 25.05.2016 a SPS Italia - SENECA LET'S - VPN Connectivity SolutionsSENECA
 
5 s checklist practice - kaizenvietnam, inc
5 s  checklist practice - kaizenvietnam, inc5 s  checklist practice - kaizenvietnam, inc
5 s checklist practice - kaizenvietnam, incDao Nguyen
 
5S Implementation - The first step to continuous improvement
5S Implementation - The first step to continuous improvement5S Implementation - The first step to continuous improvement
5S Implementation - The first step to continuous improvementAdrian Oprea
 
5S Workshop &Visual management - Krishna Heda
5S Workshop &Visual management - Krishna Heda5S Workshop &Visual management - Krishna Heda
5S Workshop &Visual management - Krishna Hedakrishnaheda
 
Dispositivi GSM/GPRS per applicazioni universali
Dispositivi GSM/GPRS per applicazioni universaliDispositivi GSM/GPRS per applicazioni universali
Dispositivi GSM/GPRS per applicazioni universaliSENECA
 
Presentació taller conta contes (2)
Presentació taller conta contes (2)Presentació taller conta contes (2)
Presentació taller conta contes (2)JanetSelma
 
10 Tips for WeChat
10 Tips for WeChat10 Tips for WeChat
10 Tips for WeChatChris Baker
 
Benefits of drinking water
Benefits of drinking waterBenefits of drinking water
Benefits of drinking waterEason Chan
 
20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage Content20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage ContentBarry Feldman
 

Viewers also liked (17)

Project2
Project2Project2
Project2
 
Herramientas de Comunicación 2.0
Herramientas de Comunicación 2.0Herramientas de Comunicación 2.0
Herramientas de Comunicación 2.0
 
World lit.
World lit.World lit.
World lit.
 
Understanding what attributes can sustain 5 s for_slideshare
Understanding what attributes can sustain 5 s for_slideshareUnderstanding what attributes can sustain 5 s for_slideshare
Understanding what attributes can sustain 5 s for_slideshare
 
Hoisting
HoistingHoisting
Hoisting
 
Workshop 25.05.2016 a SPS Italia - SENECA LET'S - VPN Connectivity Solutions
Workshop 25.05.2016 a SPS Italia - SENECA LET'S - VPN Connectivity SolutionsWorkshop 25.05.2016 a SPS Italia - SENECA LET'S - VPN Connectivity Solutions
Workshop 25.05.2016 a SPS Italia - SENECA LET'S - VPN Connectivity Solutions
 
5 s checklist practice - kaizenvietnam, inc
5 s  checklist practice - kaizenvietnam, inc5 s  checklist practice - kaizenvietnam, inc
5 s checklist practice - kaizenvietnam, inc
 
5S Implementation - The first step to continuous improvement
5S Implementation - The first step to continuous improvement5S Implementation - The first step to continuous improvement
5S Implementation - The first step to continuous improvement
 
5S Workshop &Visual management - Krishna Heda
5S Workshop &Visual management - Krishna Heda5S Workshop &Visual management - Krishna Heda
5S Workshop &Visual management - Krishna Heda
 
Dispositivi GSM/GPRS per applicazioni universali
Dispositivi GSM/GPRS per applicazioni universaliDispositivi GSM/GPRS per applicazioni universali
Dispositivi GSM/GPRS per applicazioni universali
 
Hikayat Patani
Hikayat PataniHikayat Patani
Hikayat Patani
 
Sakura Mengorak Kelopak
Sakura Mengorak KelopakSakura Mengorak Kelopak
Sakura Mengorak Kelopak
 
Panduan Pengendalian Blog
Panduan Pengendalian BlogPanduan Pengendalian Blog
Panduan Pengendalian Blog
 
Presentació taller conta contes (2)
Presentació taller conta contes (2)Presentació taller conta contes (2)
Presentació taller conta contes (2)
 
10 Tips for WeChat
10 Tips for WeChat10 Tips for WeChat
10 Tips for WeChat
 
Benefits of drinking water
Benefits of drinking waterBenefits of drinking water
Benefits of drinking water
 
20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage Content20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage Content
 

Similar to Keenright591 Interactive Presentation

Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among studentsjune21harsh
 
The Hazards Of Cyberbullying
The Hazards Of CyberbullyingThe Hazards Of Cyberbullying
The Hazards Of CyberbullyingIC
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingAntolduvai
 
Abhishek cyber bullying
Abhishek   cyber bullyingAbhishek   cyber bullying
Abhishek cyber bullyingparulata
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010adewolfe
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingsmeech
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingpscl
 
eSmart Cybersafety
eSmart CybersafetyeSmart Cybersafety
eSmart Cybersafetytekwire
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 

Similar to Keenright591 Interactive Presentation (20)

Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
The Hazards Of Cyberbullying
The Hazards Of CyberbullyingThe Hazards Of Cyberbullying
The Hazards Of Cyberbullying
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Abhishek cyber bullying
Abhishek   cyber bullyingAbhishek   cyber bullying
Abhishek cyber bullying
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
eSmart Cybersafety
eSmart CybersafetyeSmart Cybersafety
eSmart Cybersafety
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Recently uploaded

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 

Recently uploaded (20)

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 

Keenright591 Interactive Presentation

  • 2. What is cyberbullying? Cyberbullying in any kind of negative virtual communication.
  • 3. There are many ways to bully someone other than just sending them a message.
  • 4.
  • 5. Instant messaging Sending threatening messages through IM’s or texting. Sending warning messages not to tell on them. Creating screen names that are 1 letter away from someone else’s screen name and sending offensive messages Texting wars and death threats
  • 6. Stealing passwords Student’s may steal passwords and access other’s accounts to send offensive messages to anger them. Students may gain access to an account and then change the settings to lock them out.
  • 7. Blogs Blogs are used as online journals to write damaging thing about someone’s reputation.
  • 8. Web Sites Web sites are created to insult another student or a group of students. Students also post pictures and personal information about other students.
  • 9. Sending pictures through cell phones and email Sending degrading photos through e-mails; the emails can then be passed around to hundreds of emails within hours. New cell phones are now able to send photos and can be spread to an entire address book at once.
  • 10. Sending Malicious Code Student send viruses, spyware and hacking programs to other computers as a form of harassment. Some programs can even give the student access to a victims computer.
  • 11. Impersonation When a student impersonates another students they usually do this in a chat room. The students reveals personal information that could include name, address and phone number. This could lead to an attack on the victim.
  • 12. Prevention Understand that teasing, threats and taking over someone’s identity are all forms of bullying. If this happens to you report the behaviors to an adult. Parents
  • 13. Parents Tell you parents. Parents need to inform you school counselor of the cyberbullying. Parents need to tell your doctor. It may be necessary to have counseling until the problems are resolved. Netiquette
  • 14.
  • 15.
  • 16. Go read for the answer again. Read here
  • 17. Instant messaging Sending threatening messages through IM’s or texting. Sending warning messages not to tell on them. Creating screen names that are 1 letter away from someone else’s screen name and sending offensive messages Texting wars and death threats Go back to question
  • 19.
  • 20. Go read for the answer again. Read here
  • 21. Stealing passwords Student’s may steal passwords and access other’s accounts to send offensive messages to anger them. Students may gain access to an account and then change the settings to lock them out. Go back to question
  • 23.
  • 24. Go read for the answer again. Read here
  • 25. Web Sites Web sites are created to insult another student or a group of students. Students also post pictures and personal information about other students. Go back to question
  • 27.
  • 28. Go read for the answer again. Read here
  • 29. Sending pictures through cell phones and email Sending degrading photos through e-mails; the emails can then be passed around to hundreds of emails within hours. New cell phones are now able to send photos and can be spread to an entire address book at once. Go back to question
  • 31.
  • 32. Go read for the answer again. Read here
  • 33. Sending Malicious Code Student send viruses, spyware and hacking programs to other computers as a form of harassment. Some programs can even give the student access to a victims computer. Go back to question Impersonation When a student impersonates another students they usually do this in a chat room. The students reveals personal information that could include name, address and phone number. This could lead to an attack on the victim.
  • 35. Congratulations you have just finished your Cyberbullying training.