SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Cyber
Bullying

  United Against Violence
  Of Greater Dayton
What is Cyber
Bullying?
 Cyber Bullying is when a child is tormented,
  threatened, harassed, humiliated,
  embarrassed or otherwise targeted by
  another child using the Internet, interactive
  and digital technologies or cell phones. It
  has to have a minor on both sides, or at
  least have been instigated by a minor
  against another minor.
Cyber Bullies
    use…
 Social Networks : Facebook, My
  Space, Chat rooms
 E-mail
 Cell phones
 Instant messaging
 Bashing web sites
Bullying -Versus-
      Cyber Bullying
    Bullying                  Cyber Bullying
 Direct                     Can be anonymous
 Occurs on school           Usually occurs off school
  property                    property
 Poor relationships with    Good relationships with
  teachers                    teachers
 Fear retribution           Fear loss of privileges
  (Physical, Verbal and       (computer and cell
  Nonverbal)                  phones taken away)
                             Farther under the radar
                              than bullying
Types of Cyber
                      Bullying
 Cyber stalking: Repeatedly sending messages that
  include threats of harm or are highly intimidating
 Denigration: “Dissing” someone online. Sending or
  posting cruel gossip or rumors about a person
 Flaming: Online fights using messages with angry and
  vulgar language
 Harassment: Repeatedly sending offensive, rude, and
  insulting messages
 Impersonation: Pretending to be someone else and
  sending or posting material that makes a person look
  bad, gets them in trouble, or damages that person’s
  reputation or friendships
What
   Statistics say
 65% of kids between 8-14 have been involved directly or
  indirectly in a cyber bullying incident as the cyber bully,
  victim or friend.
 42% of kids have been bullied online. 35% have been
  threatened online.
 53% of kids admit to saying mean or hurtful things to
  someone online.
 50% has seen or heard of a website that bashes another
  student. 75% has visited a bashing website.
 90% of middle school students polled have had their
  feelings hurt online.
 58% of victims have not told their parents about the cyber
  bullying.
Why do kids cyber
        bully?
 They are often motivated by anger, revenge or frustration.
 Sometimes they do it for entertainment or because they
  are bored and have too much time on their hands.
 Many do it for laughs or to get a reaction.
 Some do it by accident, and either send a message to the
  wrong recipient or didn't think before they did something.
 The Power-hungry do it to torment others and for their ego.
 Mean girls do it to help boost or remind people of their own
  social standing.
 Some think they are righting wrong and standing up for
  others.
Preventing cyber
     bullying
-What parents can do-
  Discuss cyber bullying with your child.
  Educating the kids about the consequences (losing
   their cell phone and/or computer privileges) helps.
  Teaching them to respect others and to take a stand
   against bullying of all kinds helps too.

  Supervise and increase effective monitoring of the
   internet
  Know what your child is doing online and with their cell
   phones.
  Get to know your children's friends, are they the type of
   kids that are positive influences.
Preventing cyber
     bullying
-what kids can do -
 Block the cyber bully. You do not have to have
  them on your friends list.
 Ignore them. If you do not respond to a negative
  text, email, or comment online then the person
  may just calm down. It might take a while but be
  patient.
 Tell an adult if messages are continuous,
  threatening, or it’s affecting your daily routine.
 Talk, talk, talk to your parents or a trusted adult.
Preventing cyber
             bullying
     -what schools can do -
 Focus on values of kindness, respect,
  compassion, tolerance, and forgiveness.
 Develop problem solving skills.
 Provide staff, parent, and student
  education.
 Empower bystanders to speak up.
 Have written policies that address all types
  of bullying.
Help for victims of
      bullying
 Family supports, communication is the
  key to being supportive, listening to them
  and being there to talk.
 In-School counseling.
 Outside referral counseling.
 Anger management groups.
 Conflict resolution education.
What are the                         laws?
   House Bill                         276
 Sec. 3313.666. (A) As used in this section,
  "harassment, intimidation, or bullying" means any
  intentional written, verbal, or physical act that a
  student has exhibited toward another particular
  student more than once and the behavior both:
 (1) Causes mental or physical harm to the other
  student;
 (2) Is sufficiently severe, persistent, or pervasive
  that it creates an intimidating, threatening, or
  abusive educational environment for the other
  student.
What are the laws?
   Senate Bill 126(Pending)
      Introduced to senate in March 2011

 Sec. 3313.666. (A) As used in this section,
  "harassment:
 (1) "Electronic act" means an act committed through
  the use of a cellular telephone, computer, pager,
  personal communication device, or other electronic
  communication device.
 (2) "Harassment, intimidation, or bullying" means any
  intentional written, verbal, electronic, or physical act
  that a student has exhibited toward another particular
  student more than once and the behavior both:
 (1)(a) Causes mental or physical harm to the other
  student;
 (2)(b) Is sufficiently severe, persistent, or pervasive
  that it creates an intimidating, threatening, or abusive
  educational environment for the other student.
www.stopviolence.
      org
Works Sited-

               www.stopcyberbullying.org
              www.stopbullyingnow.hrsa.gov
                     www.isafe.org
                  www.facs.pppst.com
               www.legislature.state.oh.us

       Demysifying and Deescalating Cyber Bullying
                  Barbara Trolly, Ph.D. CRC
      Connie Hanel, M.S.E.d & Linda Shields, M.S.E.d
                   McKenna & Bargh, 2004
                   Ybarra & Mitchell, 2004
                  Nancy Willard, M.S., J.D.,
Director of the Center for Safe and Responsible Internet Use
Images sited
     Microsoft Clip Art
  Captaincollo.blogspot.com
          My.hsj.org
   Nikkihut.blogspot.com
    bullyingpictures.com
    Mainstreethardy.com
        Clipartof.com
  Healthylifestyles-news.org

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
TeamBanana
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
bolan1jt
 
Bullying Presentation
Bullying PresentationBullying Presentation
Bullying Presentation
dreamingmoi
 

Was ist angesagt? (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Effect of Bullying
Effect of BullyingEffect of Bullying
Effect of Bullying
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Social Media and Happiness
Social Media and HappinessSocial Media and Happiness
Social Media and Happiness
 
Internet addiction
Internet addictionInternet addiction
Internet addiction
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Bullying
BullyingBullying
Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Bullying Presentation
Bullying PresentationBullying Presentation
Bullying Presentation
 
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying vs traditional bullying
Cyber bullying vs traditional bullyingCyber bullying vs traditional bullying
Cyber bullying vs traditional bullying
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 

Andere mochten auch

Cyberbullying power pot student copy
Cyberbullying  power pot student copyCyberbullying  power pot student copy
Cyberbullying power pot student copy
brlewis1971
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
zackkay
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
buech1cj
 
Cyber Bullying Presentation
Cyber Bullying PresentationCyber Bullying Presentation
Cyber Bullying Presentation
amate1cl
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
Courtney Cole
 
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?""Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
DefinetheLine
 

Andere mochten auch (20)

Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Cyberbullying power pot student copy
Cyberbullying  power pot student copyCyberbullying  power pot student copy
Cyberbullying power pot student copy
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?
 
Cyber Bullying Presentation
Cyber Bullying PresentationCyber Bullying Presentation
Cyber Bullying Presentation
 
Aet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingAet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullying
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 
The Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingThe Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber Bullying
 
491 nasilje na internetu
491 nasilje na internetu491 nasilje na internetu
491 nasilje na internetu
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
 
cyber bullying parent workshop 2012
cyber bullying parent workshop 2012cyber bullying parent workshop 2012
cyber bullying parent workshop 2012
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?""Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
 

Ähnlich wie Cyber Bullying

Sarah doty cyber bullying
Sarah doty cyber bullyingSarah doty cyber bullying
Sarah doty cyber bullying
Sarah Doty
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
Doctora2017
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
John Field
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
John Field
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
alanrgibson41217
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
drumcut
 

Ähnlich wie Cyber Bullying (20)

Olmv cyberbullying
Olmv cyberbullyingOlmv cyberbullying
Olmv cyberbullying
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Sarah doty cyber bullying
Sarah doty cyber bullyingSarah doty cyber bullying
Sarah doty cyber bullying
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
 
Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshare
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Mehr von Joe Gauder

United Against Violence - Gun Crime 2014 Q4 Update
United Against Violence - Gun Crime 2014 Q4 UpdateUnited Against Violence - Gun Crime 2014 Q4 Update
United Against Violence - Gun Crime 2014 Q4 Update
Joe Gauder
 
Uav gun-crime-2013-eoy-update
Uav gun-crime-2013-eoy-updateUav gun-crime-2013-eoy-update
Uav gun-crime-2013-eoy-update
Joe Gauder
 
Uav gun crime 2013_q3 update
Uav gun crime 2013_q3 updateUav gun crime 2013_q3 update
Uav gun crime 2013_q3 update
Joe Gauder
 
Uav gun crime 2013_q2 update
Uav gun crime 2013_q2 updateUav gun crime 2013_q2 update
Uav gun crime 2013_q2 update
Joe Gauder
 

Mehr von Joe Gauder (11)

UAVGD - Violent Crime Update Q4 2017
UAVGD - Violent Crime Update Q4 2017UAVGD - Violent Crime Update Q4 2017
UAVGD - Violent Crime Update Q4 2017
 
SBH Stop Violence Crime Stats Q3 2016
SBH Stop Violence Crime Stats Q3 2016SBH Stop Violence Crime Stats Q3 2016
SBH Stop Violence Crime Stats Q3 2016
 
Uav gun crime 2016 q1-2 update_mcsoupdatefromnancy
Uav gun crime 2016 q1-2 update_mcsoupdatefromnancyUav gun crime 2016 q1-2 update_mcsoupdatefromnancy
Uav gun crime 2016 q1-2 update_mcsoupdatefromnancy
 
UAVGD Crime Stats - 4th Quarter 2015
UAVGD Crime Stats - 4th Quarter 2015UAVGD Crime Stats - 4th Quarter 2015
UAVGD Crime Stats - 4th Quarter 2015
 
United Against Violence - Gun Crime 2014 Q4 Update
United Against Violence - Gun Crime 2014 Q4 UpdateUnited Against Violence - Gun Crime 2014 Q4 Update
United Against Violence - Gun Crime 2014 Q4 Update
 
SBH UAV Gun Crime 2014 Q3 Stats
SBH UAV Gun Crime 2014 Q3 StatsSBH UAV Gun Crime 2014 Q3 Stats
SBH UAV Gun Crime 2014 Q3 Stats
 
United Against Violence - Gun Crime - 2014 - Q2
United Against Violence - Gun Crime - 2014 - Q2United Against Violence - Gun Crime - 2014 - Q2
United Against Violence - Gun Crime - 2014 - Q2
 
Uav gun-crime-2013-eoy-update
Uav gun-crime-2013-eoy-updateUav gun-crime-2013-eoy-update
Uav gun-crime-2013-eoy-update
 
Uav gun crime 2013_q3 update
Uav gun crime 2013_q3 updateUav gun crime 2013_q3 update
Uav gun crime 2013_q3 update
 
Uav gun crime 2013_q2 update
Uav gun crime 2013_q2 updateUav gun crime 2013_q2 update
Uav gun crime 2013_q2 update
 
Dayton Gun and Violent Crime Statistics
Dayton Gun and Violent Crime StatisticsDayton Gun and Violent Crime Statistics
Dayton Gun and Violent Crime Statistics
 

Kürzlich hochgeladen

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 

Kürzlich hochgeladen (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 

Cyber Bullying

  • 1. Cyber Bullying United Against Violence Of Greater Dayton
  • 2. What is Cyber Bullying?  Cyber Bullying is when a child is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child using the Internet, interactive and digital technologies or cell phones. It has to have a minor on both sides, or at least have been instigated by a minor against another minor.
  • 3. Cyber Bullies use…  Social Networks : Facebook, My Space, Chat rooms  E-mail  Cell phones  Instant messaging  Bashing web sites
  • 4. Bullying -Versus- Cyber Bullying Bullying Cyber Bullying  Direct  Can be anonymous  Occurs on school  Usually occurs off school property property  Poor relationships with  Good relationships with teachers teachers  Fear retribution  Fear loss of privileges (Physical, Verbal and (computer and cell Nonverbal) phones taken away)  Farther under the radar than bullying
  • 5. Types of Cyber Bullying  Cyber stalking: Repeatedly sending messages that include threats of harm or are highly intimidating  Denigration: “Dissing” someone online. Sending or posting cruel gossip or rumors about a person  Flaming: Online fights using messages with angry and vulgar language  Harassment: Repeatedly sending offensive, rude, and insulting messages  Impersonation: Pretending to be someone else and sending or posting material that makes a person look bad, gets them in trouble, or damages that person’s reputation or friendships
  • 6. What Statistics say  65% of kids between 8-14 have been involved directly or indirectly in a cyber bullying incident as the cyber bully, victim or friend.  42% of kids have been bullied online. 35% have been threatened online.  53% of kids admit to saying mean or hurtful things to someone online.  50% has seen or heard of a website that bashes another student. 75% has visited a bashing website.  90% of middle school students polled have had their feelings hurt online.  58% of victims have not told their parents about the cyber bullying.
  • 7. Why do kids cyber bully?  They are often motivated by anger, revenge or frustration.  Sometimes they do it for entertainment or because they are bored and have too much time on their hands.  Many do it for laughs or to get a reaction.  Some do it by accident, and either send a message to the wrong recipient or didn't think before they did something.  The Power-hungry do it to torment others and for their ego.  Mean girls do it to help boost or remind people of their own social standing.  Some think they are righting wrong and standing up for others.
  • 8. Preventing cyber bullying -What parents can do-  Discuss cyber bullying with your child.  Educating the kids about the consequences (losing their cell phone and/or computer privileges) helps.  Teaching them to respect others and to take a stand against bullying of all kinds helps too.  Supervise and increase effective monitoring of the internet  Know what your child is doing online and with their cell phones.  Get to know your children's friends, are they the type of kids that are positive influences.
  • 9. Preventing cyber bullying -what kids can do -  Block the cyber bully. You do not have to have them on your friends list.  Ignore them. If you do not respond to a negative text, email, or comment online then the person may just calm down. It might take a while but be patient.  Tell an adult if messages are continuous, threatening, or it’s affecting your daily routine.  Talk, talk, talk to your parents or a trusted adult.
  • 10. Preventing cyber bullying -what schools can do -  Focus on values of kindness, respect, compassion, tolerance, and forgiveness.  Develop problem solving skills.  Provide staff, parent, and student education.  Empower bystanders to speak up.  Have written policies that address all types of bullying.
  • 11. Help for victims of bullying  Family supports, communication is the key to being supportive, listening to them and being there to talk.  In-School counseling.  Outside referral counseling.  Anger management groups.  Conflict resolution education.
  • 12. What are the laws? House Bill 276  Sec. 3313.666. (A) As used in this section, "harassment, intimidation, or bullying" means any intentional written, verbal, or physical act that a student has exhibited toward another particular student more than once and the behavior both:  (1) Causes mental or physical harm to the other student;  (2) Is sufficiently severe, persistent, or pervasive that it creates an intimidating, threatening, or abusive educational environment for the other student.
  • 13. What are the laws? Senate Bill 126(Pending) Introduced to senate in March 2011  Sec. 3313.666. (A) As used in this section, "harassment:  (1) "Electronic act" means an act committed through the use of a cellular telephone, computer, pager, personal communication device, or other electronic communication device.  (2) "Harassment, intimidation, or bullying" means any intentional written, verbal, electronic, or physical act that a student has exhibited toward another particular student more than once and the behavior both:  (1)(a) Causes mental or physical harm to the other student;  (2)(b) Is sufficiently severe, persistent, or pervasive that it creates an intimidating, threatening, or abusive educational environment for the other student.
  • 15. Works Sited- www.stopcyberbullying.org www.stopbullyingnow.hrsa.gov www.isafe.org www.facs.pppst.com www.legislature.state.oh.us Demysifying and Deescalating Cyber Bullying Barbara Trolly, Ph.D. CRC Connie Hanel, M.S.E.d & Linda Shields, M.S.E.d McKenna & Bargh, 2004 Ybarra & Mitchell, 2004 Nancy Willard, M.S., J.D., Director of the Center for Safe and Responsible Internet Use
  • 16. Images sited Microsoft Clip Art Captaincollo.blogspot.com My.hsj.org Nikkihut.blogspot.com bullyingpictures.com Mainstreethardy.com Clipartof.com Healthylifestyles-news.org