SlideShare a Scribd company logo
1 of 11
Cyberbullying
    By Josie Day
What is cyberbullying?
  Cyberbullying is when a student use the
       internet, cell phones, or other
 technological devices to send or post text
  or images intended to hurt, embarrass,
threaten, torment, humiliate, or intimidate
                their victim.
Cyberbullying Tactics
Gossip: posting or sending cruel gossip to damage a person’s reputation and relationships with others

Exclusion: deliberately excluding someone from an online group
Impersonation: breaking into someone’s online account and sending messages or making post that will
cause embarrassment or damage to the person’s reputation and affect his or her relationships with
others

Harassment: repeatedly posting or sending offensive, rude, and insulting messages or posts

Cyberstalking: posting or sending unwanted or intimidating messages, which may include threats

Flaming: online fights where scornful and offensive messages are posted on websites, forums, or blogs

Outing and Trickery: tricking someone into revealing secrets or embarrassing information, which is then
shared online

Cyberthreats: remarks on the internet threatening or implying violent behavior, displaying suicidal
tendencies
Students Take on Cyberbullying
http://www.youtube.com/watch?v=3WoP0y3Syl
Q
What are the effects of Cyberbullying?
•   Hurt Feelings
•   Sadness
•   Anxiety
•   Depression
•   Anger
•   Shame
•   Fear
•   Frustration
•   Low Self Esteem
•   Trust Issues
•   Poor academic performance
•   Suicide
•   Bullying others
Why is cyberbullying so hurtful?
Cyberbullying is more harmful than face-to-face bullying for many reasons:
• Permanence: The insults, comments or images can be preserved by the
   person who was bullied or by others so that the victim may read or view
   them over and over again and the harm is re-inflicted with each reading or
   viewing.
• Audience size: The size of the audience that is able to view or access the
   damaging material increases the victim’s humiliation.
• Familiarity: Many young people are friends with or know their cyber bully
   either through school or other personal connections, increasing the
   potential for embarrassment and humiliation.
• Social Networking: Social networking sites such as Facebook and MySpace
   allow cyber bullies to engage in campaigns against a particular person
   which may involve many others.
• Speed: The speed at which harmful messages can reach large audiences
   also plays a major part in making cyberbullying so damaging to the targets.
Cyberbullying 101
http://www.youtube.com/watch?feature=player
_embedded&v=0iwWxGNAMr0#!
Rachael Neblett
Rachael Neblett, a seventeen-year old student at Bullitt East High School. At less than 5 feet tall, her
small stature was an advantage in gymnastics and cheerleading. It seemed Rachael could tell her
parents anything. Or so they thought.

Because of her small size, Rachael was an easy target for bullies. In the summer of 2006, she began
receiving threatening emails through her MySpace account. Rachael would keep this from her
parents, maybe fearing they would make her close her MySpace account, or maybe she didn't want
them to worry.

The emails were not the usual type of bullying. These notes had a stalking terroristic nature. Also,
the person sending the emails was anonymous. Why Rachael kept going back and reading the
emails no one will ever know. Maybe the fear of the unknown was worse than knowing the threat.
Mark and Donna didn't ignore the problem. They went into action, taking the emails to the principal
at Bullitt East High School. It was obvious that the bully was another student at the school, since the
emails contained details of her movements during class and after school. The bully knew when she
caught the bus and where she lived. The principal had school officials watch Rachael as she got off
the bus and walked to class. But this did nothing to relieve Rachael's fear.

Desperation came early in October when Rachael received an email stating " I am not going to put
you in the hospital, I am going to put you in the morgue." After receiving that email, Rachael did not
want to go to school or go out with her friends.

On October 9, shortly after receiving the threatening email, Rachael took her own life.

Since Rachael had been receiving threats, her death was put under investigation by the Mt.
Washington police. In the end, it was ruled a suicide. The toxicology report show no drugs or
alcohol. No chemical reason for depression.

Mark and Donna feel certain that it was the cyberstalking that caused Rachael to end her life. No
person was ever arrested. Even though the police know the computer from which the emails were
sent there was not enough evidence to press charges
How to help prevent
   cyberbullying?
Encourage your students to…
• Block all communication with cyberbullies
• Do not forward any messages, comments, etc.
  that involve cyberbulling
• Always report any cyberbulling taking place to an
  adult
• Educate your students about the damages of
  cyberbullyig
How to prevent cyberbullying
             continued…
Encourage parents to…
• Get involved in their child’s cyberspace
• Open an account wherever your child has an
  account
• Know all your child’s passwords in order to
  have access to all your child’s accounts
• Check in weekly on your child’s Facebook page
  or other social media pages
References
• www.ncpc.org
• http://www.niot.org/front
• http://www.internetsafety101.org/cyberbullying.
  htm
• http://www.makeadifferenceforkids.org/index.ph
  p?id=8
• http://www.puresight.com/Cyberbullying/the-
  dangers-of-cyber-bullying.html
• Google Images

More Related Content

What's hot

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...HDCH
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentationSally Garza
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation introkscheidy
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying griehl
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safetySarah K Miller
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableKhy Amigable
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullyingZiar Khan
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.jessy0121
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide sharebr03wood
 

What's hot (20)

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigable
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 

Viewers also liked

Viewers also liked (20)

Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
CyberBullying
CyberBullyingCyberBullying
CyberBullying
 
Bullying
BullyingBullying
Bullying
 
Bullying virtual
Bullying virtualBullying virtual
Bullying virtual
 
Bullying verbal
Bullying verbalBullying verbal
Bullying verbal
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Unit 1 Representations
Unit 1 RepresentationsUnit 1 Representations
Unit 1 Representations
 
Outfoxed
OutfoxedOutfoxed
Outfoxed
 
Representation of Women in Disney
Representation of Women in DisneyRepresentation of Women in Disney
Representation of Women in Disney
 
Representation slideshare
Representation slideshareRepresentation slideshare
Representation slideshare
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
 
Microsoft Power Point Bullying
Microsoft Power Point   BullyingMicrosoft Power Point   Bullying
Microsoft Power Point Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Bullying
BullyingBullying
Bullying
 
Bullying apresentação
Bullying apresentaçãoBullying apresentação
Bullying apresentação
 
Trabalho sobre bullying
Trabalho sobre bullyingTrabalho sobre bullying
Trabalho sobre bullying
 
Dystopian Genre
Dystopian GenreDystopian Genre
Dystopian Genre
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Agenda Setting Theory
Agenda Setting TheoryAgenda Setting Theory
Agenda Setting Theory
 
Research thesis (effects of bullying)
Research thesis (effects of bullying)Research thesis (effects of bullying)
Research thesis (effects of bullying)
 

Similar to Cyberbullying powerpoint

School Cyber Bullying Among Students .pptx.pptx
School Cyber Bullying Among Students .pptx.pptxSchool Cyber Bullying Among Students .pptx.pptx
School Cyber Bullying Among Students .pptx.pptxROSALIEBASA1
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
CyberbullyingspecR Smith
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfCharanBobby69CB
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingR Smith
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentationSally Garza
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
CyberbullyingspecR Smith
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying PresentationMegan Townes
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010adewolfe
 
Geek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingGeek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingMelissa McDonald
 
Digital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyDigital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyMann Rentoy
 
Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By AnamikaGisha Mathyari
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The InternetDebra Boardman
 
Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jfJohn Field
 
Pencegahan Cyberbullying saat Sekolah Daring
Pencegahan Cyberbullying saat Sekolah DaringPencegahan Cyberbullying saat Sekolah Daring
Pencegahan Cyberbullying saat Sekolah DaringIsmail Fahmi
 
FAQ's About Cyberbulling
FAQ's About CyberbullingFAQ's About Cyberbulling
FAQ's About Cyberbullingalsebastino
 

Similar to Cyberbullying powerpoint (20)

School Cyber Bullying Among Students .pptx.pptx
School Cyber Bullying Among Students .pptx.pptxSchool Cyber Bullying Among Students .pptx.pptx
School Cyber Bullying Among Students .pptx.pptx
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying Presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cbp
CbpCbp
Cbp
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
Geek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingGeek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® Cyberbullying
 
Digital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyDigital Citizenship by Mann Rentoy
Digital Citizenship by Mann Rentoy
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By Anamika
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The Internet
 
Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jf
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Pencegahan Cyberbullying saat Sekolah Daring
Pencegahan Cyberbullying saat Sekolah DaringPencegahan Cyberbullying saat Sekolah Daring
Pencegahan Cyberbullying saat Sekolah Daring
 
FAQ's About Cyberbulling
FAQ's About CyberbullingFAQ's About Cyberbulling
FAQ's About Cyberbulling
 

Recently uploaded

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Recently uploaded (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Cyberbullying powerpoint

  • 1. Cyberbullying By Josie Day
  • 2. What is cyberbullying? Cyberbullying is when a student use the internet, cell phones, or other technological devices to send or post text or images intended to hurt, embarrass, threaten, torment, humiliate, or intimidate their victim.
  • 3. Cyberbullying Tactics Gossip: posting or sending cruel gossip to damage a person’s reputation and relationships with others Exclusion: deliberately excluding someone from an online group Impersonation: breaking into someone’s online account and sending messages or making post that will cause embarrassment or damage to the person’s reputation and affect his or her relationships with others Harassment: repeatedly posting or sending offensive, rude, and insulting messages or posts Cyberstalking: posting or sending unwanted or intimidating messages, which may include threats Flaming: online fights where scornful and offensive messages are posted on websites, forums, or blogs Outing and Trickery: tricking someone into revealing secrets or embarrassing information, which is then shared online Cyberthreats: remarks on the internet threatening or implying violent behavior, displaying suicidal tendencies
  • 4. Students Take on Cyberbullying http://www.youtube.com/watch?v=3WoP0y3Syl Q
  • 5. What are the effects of Cyberbullying? • Hurt Feelings • Sadness • Anxiety • Depression • Anger • Shame • Fear • Frustration • Low Self Esteem • Trust Issues • Poor academic performance • Suicide • Bullying others
  • 6. Why is cyberbullying so hurtful? Cyberbullying is more harmful than face-to-face bullying for many reasons: • Permanence: The insults, comments or images can be preserved by the person who was bullied or by others so that the victim may read or view them over and over again and the harm is re-inflicted with each reading or viewing. • Audience size: The size of the audience that is able to view or access the damaging material increases the victim’s humiliation. • Familiarity: Many young people are friends with or know their cyber bully either through school or other personal connections, increasing the potential for embarrassment and humiliation. • Social Networking: Social networking sites such as Facebook and MySpace allow cyber bullies to engage in campaigns against a particular person which may involve many others. • Speed: The speed at which harmful messages can reach large audiences also plays a major part in making cyberbullying so damaging to the targets.
  • 8. Rachael Neblett Rachael Neblett, a seventeen-year old student at Bullitt East High School. At less than 5 feet tall, her small stature was an advantage in gymnastics and cheerleading. It seemed Rachael could tell her parents anything. Or so they thought. Because of her small size, Rachael was an easy target for bullies. In the summer of 2006, she began receiving threatening emails through her MySpace account. Rachael would keep this from her parents, maybe fearing they would make her close her MySpace account, or maybe she didn't want them to worry. The emails were not the usual type of bullying. These notes had a stalking terroristic nature. Also, the person sending the emails was anonymous. Why Rachael kept going back and reading the emails no one will ever know. Maybe the fear of the unknown was worse than knowing the threat. Mark and Donna didn't ignore the problem. They went into action, taking the emails to the principal at Bullitt East High School. It was obvious that the bully was another student at the school, since the emails contained details of her movements during class and after school. The bully knew when she caught the bus and where she lived. The principal had school officials watch Rachael as she got off the bus and walked to class. But this did nothing to relieve Rachael's fear. Desperation came early in October when Rachael received an email stating " I am not going to put you in the hospital, I am going to put you in the morgue." After receiving that email, Rachael did not want to go to school or go out with her friends. On October 9, shortly after receiving the threatening email, Rachael took her own life. Since Rachael had been receiving threats, her death was put under investigation by the Mt. Washington police. In the end, it was ruled a suicide. The toxicology report show no drugs or alcohol. No chemical reason for depression. Mark and Donna feel certain that it was the cyberstalking that caused Rachael to end her life. No person was ever arrested. Even though the police know the computer from which the emails were sent there was not enough evidence to press charges
  • 9. How to help prevent cyberbullying? Encourage your students to… • Block all communication with cyberbullies • Do not forward any messages, comments, etc. that involve cyberbulling • Always report any cyberbulling taking place to an adult • Educate your students about the damages of cyberbullyig
  • 10. How to prevent cyberbullying continued… Encourage parents to… • Get involved in their child’s cyberspace • Open an account wherever your child has an account • Know all your child’s passwords in order to have access to all your child’s accounts • Check in weekly on your child’s Facebook page or other social media pages
  • 11. References • www.ncpc.org • http://www.niot.org/front • http://www.internetsafety101.org/cyberbullying. htm • http://www.makeadifferenceforkids.org/index.ph p?id=8 • http://www.puresight.com/Cyberbullying/the- dangers-of-cyber-bullying.html • Google Images