SlideShare a Scribd company logo
1 of 16
http://www.youtube.com/watch?v=bdQB
                            urXQOeQ
13%  of students bully
 others regularly
6% are both bullies and
 targets



   Dr. Paula C. Rodriguez Rust www.spectrumdiversity.org
Social   Acceptance
Unity
Personal   Identity
Power
 The  ability to loosen up, free less restrained
  and express oneself more openly
 Benign Disinhibition: sharing personal things,
  secrets, emotions, fears, and wishes
 Toxic Disinhibition: rude language, harsh
  criticisms, anger, hatred.

Are theses attempts to resolve
  inter/intrapersonal conflict?
Self Actualization?
 Defense  mechanisms are regulatory functions
 Superego: Societal constructs
 The self does not exist separate from the
  environment…therefore
    Anonymity, invisibility, minimization of status and
     authority, dissociative imagination, and
     solipsistic introjection
 Involves people with similar degrees of
  power, or in which neither party uses a
  power advantage to prevail unfairly
 Involves mutual disagreement or difference
  in interests or goals, or reasonable
  competing claims
 Might not involve wrong-doing
 Can be fairly resolved by compromise
  involving concession by both
  parties, negotiation, and cooperation
 Involves  an imbalance of power wherein one
  person is unfairly exercising power over
  another
 Involves one party exerting their needs or
  interests unilaterally over another
 Involves hurtful behavior on behalf of one
  party again another.
 A fair resolution involves a change in the
  behavior of the offender; the targeted has no
  concession to make
 One-sided
 NORMAL   CONFLICT
 Mutual and reciprocal, either party may
  tease
 Good-natured and benign, not intended to
  hurt
 Intended to be fun/humorous for all parties
  involved; parties laugh with each other
 Maintains basic dignity of all parties
 Teasing is part of the relationship along with
  other forms of interaction
 Stops when the person becomes upset or
  objects
 BULLYING
 Based  on an imbalance of power; one party
  consistently does the taunting
 Harmful and malicious; intended to harm,
  unconcerned about harm
 Laughter is directed at the target; joke is
  cover for mean-spirited comment
 Diminishes the self-worth of the target
 Not part of an otherwise friendly relationship
 Continues after distress is expressed by the
  taunted
 Causes fear, might escalate to physical
  bullying
 Bullied
     Unexpectedly stops using the computer
     Appears nervous or anxious when online
     Appears uneasy about going to school
     Acts angry, upset, depressed, frustrated
     Avoids discussions
     Becomes abnormally withdraw from family and
      friends
     Changes in appetite
 Bully
     Quickly switches screens or closes programs
      while using a computer or cell phone
     Uses technological devices at all hours of the
      night
     May get upset when away from technological
      devices
     Avoids discussions pertaining to internet use,
      friends, and school
     Has multiple online accounts
•Praise child for letting you know
•Report harassment to Internet Service Provider
or mobile service provider
•Forward messages to service provider or provide
website address with offensive remarks
•Keep all records of messages

•Cancel internet or cell phone account

•Do not allow child to respond to cyberbully
•Teach   empathy
•Encourage    support for victim
•Keep   lines of communication open
•Explain   the need to tell
•Encourage    solutions
•Assess    the situation
•Report   the incident
•Explain that the behavior is unacceptable
•Find out why the child is engaging in such
behavior
•Monitor child’s internet and phone activity

•Increase own knowledge of technology

•Familiarize yourself with relevant legal issues

•Share your concerns

•Explain the severity of child’s actions

•If necessary, talk with child’s school counselor
or a mental health professional
•Never   threaten, even if you are joking
•Be critical of the information you find online

•Do not share passwords

•Never impersonate anyone else online

•Remember that what you say in chats or online
posts can be taken out of context
•Remember that other people online are real
people
•Tell a trusted adult if you or a friend run into a
problem
•     (Rust, 2010)

More Related Content

What's hot

Preventing School Bullying
Preventing School BullyingPreventing School Bullying
Preventing School BullyingEDITHA HONRADEZ
 
Bullying
BullyingBullying
Bullyingdrezac
 
Problems of Well-Being: Bullying
Problems of Well-Being: BullyingProblems of Well-Being: Bullying
Problems of Well-Being: BullyingKarleyCowan
 
Young adult or workplace bullying
Young adult or workplace bullyingYoung adult or workplace bullying
Young adult or workplace bullyingShakuntala Patel
 
The bullyingtriangle
The bullyingtriangleThe bullyingtriangle
The bullyingtrianglesagedayschool
 
Bullying and bully prevention
Bullying and bully preventionBullying and bully prevention
Bullying and bully preventionKcampbell1109
 
period 6-christina carter-the effects of bullying on children
period 6-christina carter-the effects of bullying on childrenperiod 6-christina carter-the effects of bullying on children
period 6-christina carter-the effects of bullying on childrenmrsalcido
 
What is bullying
What is bullyingWhat is bullying
What is bullyingDev Chauhan
 
Bullying slideshow
Bullying slideshowBullying slideshow
Bullying slideshowLeelarn
 
Olweus bully prevention master
Olweus bully prevention masterOlweus bully prevention master
Olweus bully prevention masterMiles Erdly
 
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose ManlinconCYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlinconkatrinarose14
 
S Vitto And Bullying.2
S Vitto And Bullying.2S Vitto And Bullying.2
S Vitto And Bullying.2guest0b928b
 
Bullying123.ppt
Bullying123.pptBullying123.ppt
Bullying123.pptjailinnn
 

What's hot (20)

Bullying
Bullying Bullying
Bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Sample Presentation for Parents
Sample Presentation for ParentsSample Presentation for Parents
Sample Presentation for Parents
 
Preventing School Bullying
Preventing School BullyingPreventing School Bullying
Preventing School Bullying
 
Bullying and Adolescent Social Drama
Bullying and Adolescent Social DramaBullying and Adolescent Social Drama
Bullying and Adolescent Social Drama
 
Bullying: Preventing, Spotting, & Stopping It
Bullying: Preventing, Spotting, & Stopping ItBullying: Preventing, Spotting, & Stopping It
Bullying: Preventing, Spotting, & Stopping It
 
Bullying
BullyingBullying
Bullying
 
Problems of Well-Being: Bullying
Problems of Well-Being: BullyingProblems of Well-Being: Bullying
Problems of Well-Being: Bullying
 
C.O.R.E. Presentation AP/Counselors
C.O.R.E. Presentation AP/CounselorsC.O.R.E. Presentation AP/Counselors
C.O.R.E. Presentation AP/Counselors
 
Young adult or workplace bullying
Young adult or workplace bullyingYoung adult or workplace bullying
Young adult or workplace bullying
 
The bullyingtriangle
The bullyingtriangleThe bullyingtriangle
The bullyingtriangle
 
Bullying
BullyingBullying
Bullying
 
Bullying and bully prevention
Bullying and bully preventionBullying and bully prevention
Bullying and bully prevention
 
period 6-christina carter-the effects of bullying on children
period 6-christina carter-the effects of bullying on childrenperiod 6-christina carter-the effects of bullying on children
period 6-christina carter-the effects of bullying on children
 
What is bullying
What is bullyingWhat is bullying
What is bullying
 
Bullying slideshow
Bullying slideshowBullying slideshow
Bullying slideshow
 
Olweus bully prevention master
Olweus bully prevention masterOlweus bully prevention master
Olweus bully prevention master
 
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose ManlinconCYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
 
S Vitto And Bullying.2
S Vitto And Bullying.2S Vitto And Bullying.2
S Vitto And Bullying.2
 
Bullying123.ppt
Bullying123.pptBullying123.ppt
Bullying123.ppt
 

Viewers also liked

Group2 conceptmaps
Group2 conceptmapsGroup2 conceptmaps
Group2 conceptmapsFALE - UFMG
 
Lieve,.Mijn Onderzoeksvraag Presentatie
Lieve,.Mijn Onderzoeksvraag PresentatieLieve,.Mijn Onderzoeksvraag Presentatie
Lieve,.Mijn Onderzoeksvraag PresentatieOrion College
 
A Study and Brief Investigation on Invisibility Of Aircrafts (Vimanas)
A Study and Brief Investigation on Invisibility Of Aircrafts (Vimanas)A Study and Brief Investigation on Invisibility Of Aircrafts (Vimanas)
A Study and Brief Investigation on Invisibility Of Aircrafts (Vimanas)IJERA Editor
 
Invisibility: Theory & Practice - v3
Invisibility:  Theory & Practice - v3Invisibility:  Theory & Practice - v3
Invisibility: Theory & Practice - v3John Ashmead
 
Navtej kohli Los Angeles
Navtej kohli Los AngelesNavtej kohli Los Angeles
Navtej kohli Los Angelesnavtejkohli
 
The Mind Cupola And Enactive Ecology
The Mind Cupola And Enactive Ecology The Mind Cupola And Enactive Ecology
The Mind Cupola And Enactive Ecology zicsresearch
 

Viewers also liked (8)

Group2 conceptmaps
Group2 conceptmapsGroup2 conceptmaps
Group2 conceptmaps
 
Lieve,.Mijn Onderzoeksvraag Presentatie
Lieve,.Mijn Onderzoeksvraag PresentatieLieve,.Mijn Onderzoeksvraag Presentatie
Lieve,.Mijn Onderzoeksvraag Presentatie
 
1307.0616 gi fiiiiiiiii
1307.0616    gi fiiiiiiiii1307.0616    gi fiiiiiiiii
1307.0616 gi fiiiiiiiii
 
A Study and Brief Investigation on Invisibility Of Aircrafts (Vimanas)
A Study and Brief Investigation on Invisibility Of Aircrafts (Vimanas)A Study and Brief Investigation on Invisibility Of Aircrafts (Vimanas)
A Study and Brief Investigation on Invisibility Of Aircrafts (Vimanas)
 
Invisibility: Theory & Practice - v3
Invisibility:  Theory & Practice - v3Invisibility:  Theory & Practice - v3
Invisibility: Theory & Practice - v3
 
Article presentation english
Article presentation englishArticle presentation english
Article presentation english
 
Navtej kohli Los Angeles
Navtej kohli Los AngelesNavtej kohli Los Angeles
Navtej kohli Los Angeles
 
The Mind Cupola And Enactive Ecology
The Mind Cupola And Enactive Ecology The Mind Cupola And Enactive Ecology
The Mind Cupola And Enactive Ecology
 

Similar to Bullying

Anti-Bully presentation for parents
Anti-Bully presentation for parentsAnti-Bully presentation for parents
Anti-Bully presentation for parentsThink2xTwice.org
 
Bullying_Parent_Presentation, How to prevent bullying
Bullying_Parent_Presentation, How to prevent bullyingBullying_Parent_Presentation, How to prevent bullying
Bullying_Parent_Presentation, How to prevent bullyingAbuAliKhalid
 
Bullying presentation pps 6022
Bullying presentation pps 6022Bullying presentation pps 6022
Bullying presentation pps 6022JannyFernandez
 
Report bullying
Report bullyingReport bullying
Report bullyingAva Conlu
 
Educating 7th Graders About Abuse
Educating 7th Graders About AbuseEducating 7th Graders About Abuse
Educating 7th Graders About Abuseveb2k5
 
Presentation on understanding and preventing bullying by stephen carrick davi...
Presentation on understanding and preventing bullying by stephen carrick davi...Presentation on understanding and preventing bullying by stephen carrick davi...
Presentation on understanding and preventing bullying by stephen carrick davi...Stephen Carrick-Davies
 
Anti Bullying - Parent Cafe 2017
Anti Bullying - Parent Cafe 2017Anti Bullying - Parent Cafe 2017
Anti Bullying - Parent Cafe 2017rpalmerratcliffe
 
Domestic violence powerpoint
Domestic violence powerpointDomestic violence powerpoint
Domestic violence powerpointKaroline Khamis
 
Digital Parenting and your Autistic Child
Digital Parenting and your Autistic ChildDigital Parenting and your Autistic Child
Digital Parenting and your Autistic ChildZift
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaasofisalazar00
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying estegiulimazziotti96
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngmiliarguelles1
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaamiliarguelles
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngmiliarguelles1
 

Similar to Bullying (20)

Anti-Bully presentation for parents
Anti-Bully presentation for parentsAnti-Bully presentation for parents
Anti-Bully presentation for parents
 
Bullying_Parent_Presentation, How to prevent bullying
Bullying_Parent_Presentation, How to prevent bullyingBullying_Parent_Presentation, How to prevent bullying
Bullying_Parent_Presentation, How to prevent bullying
 
Bullying presentation pps 6022
Bullying presentation pps 6022Bullying presentation pps 6022
Bullying presentation pps 6022
 
Report bullying
Report bullyingReport bullying
Report bullying
 
Educating 7th Graders About Abuse
Educating 7th Graders About AbuseEducating 7th Graders About Abuse
Educating 7th Graders About Abuse
 
Don't be invisible
Don't be invisibleDon't be invisible
Don't be invisible
 
TDVPP finalC.pptx
TDVPP finalC.pptxTDVPP finalC.pptx
TDVPP finalC.pptx
 
Presentation on understanding and preventing bullying by stephen carrick davi...
Presentation on understanding and preventing bullying by stephen carrick davi...Presentation on understanding and preventing bullying by stephen carrick davi...
Presentation on understanding and preventing bullying by stephen carrick davi...
 
Anti Bullying - Parent Cafe 2017
Anti Bullying - Parent Cafe 2017Anti Bullying - Parent Cafe 2017
Anti Bullying - Parent Cafe 2017
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Digital abuse
Digital abuseDigital abuse
Digital abuse
 
Domestic violence powerpoint
Domestic violence powerpointDomestic violence powerpoint
Domestic violence powerpoint
 
Digital Parenting and your Autistic Child
Digital Parenting and your Autistic ChildDigital Parenting and your Autistic Child
Digital Parenting and your Autistic Child
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying este
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Bullying
BullyingBullying
Bullying
 

Recently uploaded

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 

Recently uploaded (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 

Bullying

  • 2.
  • 3. 13% of students bully others regularly 6% are both bullies and targets  Dr. Paula C. Rodriguez Rust www.spectrumdiversity.org
  • 4. Social Acceptance Unity Personal Identity Power
  • 5.  The ability to loosen up, free less restrained and express oneself more openly  Benign Disinhibition: sharing personal things, secrets, emotions, fears, and wishes  Toxic Disinhibition: rude language, harsh criticisms, anger, hatred. Are theses attempts to resolve inter/intrapersonal conflict? Self Actualization?
  • 6.  Defense mechanisms are regulatory functions  Superego: Societal constructs  The self does not exist separate from the environment…therefore  Anonymity, invisibility, minimization of status and authority, dissociative imagination, and solipsistic introjection
  • 7.  Involves people with similar degrees of power, or in which neither party uses a power advantage to prevail unfairly  Involves mutual disagreement or difference in interests or goals, or reasonable competing claims  Might not involve wrong-doing  Can be fairly resolved by compromise involving concession by both parties, negotiation, and cooperation
  • 8.  Involves an imbalance of power wherein one person is unfairly exercising power over another  Involves one party exerting their needs or interests unilaterally over another  Involves hurtful behavior on behalf of one party again another.  A fair resolution involves a change in the behavior of the offender; the targeted has no concession to make  One-sided
  • 9.  NORMAL CONFLICT  Mutual and reciprocal, either party may tease  Good-natured and benign, not intended to hurt  Intended to be fun/humorous for all parties involved; parties laugh with each other  Maintains basic dignity of all parties  Teasing is part of the relationship along with other forms of interaction  Stops when the person becomes upset or objects
  • 10.  BULLYING  Based on an imbalance of power; one party consistently does the taunting  Harmful and malicious; intended to harm, unconcerned about harm  Laughter is directed at the target; joke is cover for mean-spirited comment  Diminishes the self-worth of the target  Not part of an otherwise friendly relationship  Continues after distress is expressed by the taunted  Causes fear, might escalate to physical bullying
  • 11.  Bullied  Unexpectedly stops using the computer  Appears nervous or anxious when online  Appears uneasy about going to school  Acts angry, upset, depressed, frustrated  Avoids discussions  Becomes abnormally withdraw from family and friends  Changes in appetite
  • 12.  Bully  Quickly switches screens or closes programs while using a computer or cell phone  Uses technological devices at all hours of the night  May get upset when away from technological devices  Avoids discussions pertaining to internet use, friends, and school  Has multiple online accounts
  • 13. •Praise child for letting you know •Report harassment to Internet Service Provider or mobile service provider •Forward messages to service provider or provide website address with offensive remarks •Keep all records of messages •Cancel internet or cell phone account •Do not allow child to respond to cyberbully
  • 14. •Teach empathy •Encourage support for victim •Keep lines of communication open •Explain the need to tell •Encourage solutions •Assess the situation •Report the incident
  • 15. •Explain that the behavior is unacceptable •Find out why the child is engaging in such behavior •Monitor child’s internet and phone activity •Increase own knowledge of technology •Familiarize yourself with relevant legal issues •Share your concerns •Explain the severity of child’s actions •If necessary, talk with child’s school counselor or a mental health professional
  • 16. •Never threaten, even if you are joking •Be critical of the information you find online •Do not share passwords •Never impersonate anyone else online •Remember that what you say in chats or online posts can be taken out of context •Remember that other people online are real people •Tell a trusted adult if you or a friend run into a problem • (Rust, 2010)