SlideShare a Scribd company logo
1 of 21
Andrea Nugent
LIS 5260
Dr. Pentlin
March 2012
AASL Standards
 1.1.1, 1.1.6, 1.1.7, 1.2.3, 1.3.1, 1.3.3, 1.3.5, 1.4.1, 1.4.3
 2.1.1, 2.1.2, 2.1.6, 2.3.1, 2.3.2
 3.1.2, 3.1.3, 3.1.4, 3.1.5, 3.1.6, 3.2.1, 3.3.2
 4.1.5, 4.3.4, 4.4.2, 4.4.3, 4.4.4
http://www.ua.edu/featu
or
                 lting , texts, Bu
       ing   insu ails               ildin
S end ning em                  ta rg
                                     et c
                                           ga
                                               We
       a te
 thre                                     erta b S
                                              in p ite t
          s
  o r IM                                          eop o
                                   o                 le
            tealing pa  sswords t
          S
          send th   reatening
           m  essages Using
     Making a
                false    prof e-mai
                             iles        l, blo
    identity t          spre      or c
               o             ad h       hat gs, onl
   spread h                       at ef      room     i ne
             at ef ul                   ul co    s to
   comment                                    mm
             s                                   ents
Outing and
                             Trickery
 Flaming      Denigration




                                 Cyber
                                Stalking

Harassment   The Lingo of
                Cyber
               bullying



  Happy
                            Impersonation
 Slapping     Exclusion &
              Ostracism
The Problem
           s with Cyber
                                  Bullying

                 http://www.manatee.k12.fl.us/sites/mid
No Breaks….




  Picture from Microsoft Powerpoint Clip Art
Gender…




          Pictures from Microsoft Powerpoint Clip Art
W h a t d o t e e n s t h in k o f
c y b e r b u lly in g ?

Picture from Microsoft Powerpoint Clip Art
Consequences of
Cyber Bullying




                  Pictures from Microsoft Powerpoint Clip Art
la ti on
    eg is
L




                    Picture from Microsoft Powerpoint Clip Art
Picture from Microsoft Powerpoint Clip Art




Prevention
The Stop Cyber bullying Pledge:

By taking this pledge, I agree to:
•Take a stand against cyberbullying, including sharing this pledge
with others and asking them to take it too.
•Not use technology as a weapon to hurt others
•“Think Before I click.”
•Think about the person on the other side
•Support others being cyberbullied and report cyber bullying
whenever I find it
•Not to join in cyberbullying tactics or be used by cyberbullies to hurt
others
•“Stop, Block, and Tell” when I am being targeted by a cyber bully
and to “Take 5” to help me calm down and walk away from the
computer.
•Be part of the solution, not the problem.
                                               Wired Safety Online
Works Cited
Bullying News Videos. “Cyberbullying-Megan Meier’s Story Part 1” YouTube. 5 Feb. 2009.
          Web. 2 April 2012.
“Cyber bully” Merriam-Webster Dictionary. Web. 2 April 2012.

Cyberbullying Research Center. Web. 2 April 2012.
Friedman, Lauri S., ed. Introducing Issues with Opposing Viewpoints: Cyberbullying. New
           York: Gale Cengage Learning, 2011. Print.
Jacobs, Tom. Teen Cyberbullying Investigated: Where Do Your
           Rights End and Consequences Begin? Minneapolis:
           Free Spirit Publishing, 2010. Print.
MySecureCyberspace. “Think Time: How Does Cyberbullying Affect You?” YouTube. 30 Nov
           2010. Web. 2 April 2012.
National Crime Prevention Council. “Cyberbullying.”
           National Crime Prevention Council. Web. 2 April 2012
Shariff, Shaheen. Confronting Cyber-Bullying: What Schools
           Need to Know to Control Misconduct and Avoid Legal Consequences.
   Cambridge, NY: Cambridge UP, 2009. Print.
Stop cyberbullying.org. Web. 2 April 2012

Wired Safety.org. Web. 2 April 2012.

More Related Content

Viewers also liked

Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meeting
anniebee3509
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
kscheidy
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
caitlynx48
 

Viewers also liked (9)

Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meeting
 
Cyber Bullying on Social Media Sites
Cyber Bullying on Social Media SitesCyber Bullying on Social Media Sites
Cyber Bullying on Social Media Sites
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parents
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Conférence émotions et trac avant un entretien, clés et exercices pratiques
Conférence émotions et trac avant un entretien, clés et exercices pratiquesConférence émotions et trac avant un entretien, clés et exercices pratiques
Conférence émotions et trac avant un entretien, clés et exercices pratiques
 
Résilience comment développer sa capacité à surmonter les epreuves et les ec...
Résilience  comment développer sa capacité à surmonter les epreuves et les ec...Résilience  comment développer sa capacité à surmonter les epreuves et les ec...
Résilience comment développer sa capacité à surmonter les epreuves et les ec...
 
Sois autonome, présentation sur les jeux de pouvoir et l'autonomie dans les é...
Sois autonome, présentation sur les jeux de pouvoir et l'autonomie dans les é...Sois autonome, présentation sur les jeux de pouvoir et l'autonomie dans les é...
Sois autonome, présentation sur les jeux de pouvoir et l'autonomie dans les é...
 
Réconciliez vie personnelle et ambition professionnelle : comment tout avoir ...
Réconciliez vie personnelle et ambition professionnelle : comment tout avoir ...Réconciliez vie personnelle et ambition professionnelle : comment tout avoir ...
Réconciliez vie personnelle et ambition professionnelle : comment tout avoir ...
 

Similar to Cyber bullying

What do you do with a careless user (legacy)
What do you do with a careless user (legacy)What do you do with a careless user (legacy)
What do you do with a careless user (legacy)
Scott Wilson
 
Cyber Wellness Power point slides
Cyber Wellness Power point slidesCyber Wellness Power point slides
Cyber Wellness Power point slides
guest7e2cdf
 
Psychology for designers or 3 predictions from psychology for the future of ...
Psychology for designers or 3 predictions from psychology  for the future of ...Psychology for designers or 3 predictions from psychology  for the future of ...
Psychology for designers or 3 predictions from psychology for the future of ...
cxpartners
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
bolan1jt
 

Similar to Cyber bullying (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
SonyS Digital Paper Tablet Lets The Office Go Paperless Gadgets ...
SonyS Digital Paper Tablet Lets The Office Go Paperless  Gadgets ...SonyS Digital Paper Tablet Lets The Office Go Paperless  Gadgets ...
SonyS Digital Paper Tablet Lets The Office Go Paperless Gadgets ...
 
Idph presentation 4.5.12
Idph presentation 4.5.12Idph presentation 4.5.12
Idph presentation 4.5.12
 
AmazingICT_eSafety_2018
AmazingICT_eSafety_2018AmazingICT_eSafety_2018
AmazingICT_eSafety_2018
 
What do you do with a careless user (legacy)
What do you do with a careless user (legacy)What do you do with a careless user (legacy)
What do you do with a careless user (legacy)
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Esafety: Keeping your kids safe online. New for 2018
Esafety: Keeping your kids safe online. New for 2018Esafety: Keeping your kids safe online. New for 2018
Esafety: Keeping your kids safe online. New for 2018
 
Cyber Wellness Power point slides
Cyber Wellness Power point slidesCyber Wellness Power point slides
Cyber Wellness Power point slides
 
Psychology for designers or 3 predictions from psychology for the future of ...
Psychology for designers or 3 predictions from psychology  for the future of ...Psychology for designers or 3 predictions from psychology  for the future of ...
Psychology for designers or 3 predictions from psychology for the future of ...
 
Psychology for designers or 3 predictions from psychology for the future of ...
Psychology for designers or 3 predictions from psychology  for the future of ...Psychology for designers or 3 predictions from psychology  for the future of ...
Psychology for designers or 3 predictions from psychology for the future of ...
 
Pangalagaan Ang Kalikasan Essay
Pangalagaan Ang Kalikasan EssayPangalagaan Ang Kalikasan Essay
Pangalagaan Ang Kalikasan Essay
 
Dr. Seuss Letter Writing Paper Teacher Doodles
Dr. Seuss Letter Writing Paper  Teacher DoodlesDr. Seuss Letter Writing Paper  Teacher Doodles
Dr. Seuss Letter Writing Paper Teacher Doodles
 
Advertising Essay (1) By Umu - Issuu
Advertising Essay (1) By Umu - IssuuAdvertising Essay (1) By Umu - Issuu
Advertising Essay (1) By Umu - Issuu
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
My bonsai is texting me!
My bonsai is texting me!My bonsai is texting me!
My bonsai is texting me!
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Energy Conservation Essay In Hindi
Energy Conservation Essay In HindiEnergy Conservation Essay In Hindi
Energy Conservation Essay In Hindi
 
Good College Admission Essay
Good College Admission EssayGood College Admission Essay
Good College Admission Essay
 
Process Analysis Essay Outline. Process Analysi
Process Analysis Essay Outline. Process AnalysiProcess Analysis Essay Outline. Process Analysi
Process Analysis Essay Outline. Process Analysi
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Cyber bullying

  • 1. Andrea Nugent LIS 5260 Dr. Pentlin March 2012
  • 2. AASL Standards  1.1.1, 1.1.6, 1.1.7, 1.2.3, 1.3.1, 1.3.3, 1.3.5, 1.4.1, 1.4.3  2.1.1, 2.1.2, 2.1.6, 2.3.1, 2.3.2  3.1.2, 3.1.3, 3.1.4, 3.1.5, 3.1.6, 3.2.1, 3.3.2  4.1.5, 4.3.4, 4.4.2, 4.4.3, 4.4.4
  • 4. or lting , texts, Bu ing insu ails ildin S end ning em ta rg et c ga We a te thre erta b S in p ite t s o r IM eop o o le tealing pa sswords t S send th reatening m essages Using Making a false prof e-mai iles l, blo identity t spre or c o ad h hat gs, onl spread h at ef room i ne at ef ul ul co s to comment mm s ents
  • 5. Outing and Trickery Flaming Denigration Cyber Stalking Harassment The Lingo of Cyber bullying Happy Impersonation Slapping Exclusion & Ostracism
  • 6. The Problem s with Cyber Bullying http://www.manatee.k12.fl.us/sites/mid
  • 7.
  • 8. No Breaks…. Picture from Microsoft Powerpoint Clip Art
  • 9. Gender… Pictures from Microsoft Powerpoint Clip Art
  • 10. W h a t d o t e e n s t h in k o f c y b e r b u lly in g ? Picture from Microsoft Powerpoint Clip Art
  • 11. Consequences of Cyber Bullying Pictures from Microsoft Powerpoint Clip Art
  • 12.
  • 13. la ti on eg is L Picture from Microsoft Powerpoint Clip Art
  • 14. Picture from Microsoft Powerpoint Clip Art Prevention
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. The Stop Cyber bullying Pledge: By taking this pledge, I agree to: •Take a stand against cyberbullying, including sharing this pledge with others and asking them to take it too. •Not use technology as a weapon to hurt others •“Think Before I click.” •Think about the person on the other side •Support others being cyberbullied and report cyber bullying whenever I find it •Not to join in cyberbullying tactics or be used by cyberbullies to hurt others •“Stop, Block, and Tell” when I am being targeted by a cyber bully and to “Take 5” to help me calm down and walk away from the computer. •Be part of the solution, not the problem. Wired Safety Online
  • 20.
  • 21. Works Cited Bullying News Videos. “Cyberbullying-Megan Meier’s Story Part 1” YouTube. 5 Feb. 2009. Web. 2 April 2012. “Cyber bully” Merriam-Webster Dictionary. Web. 2 April 2012. Cyberbullying Research Center. Web. 2 April 2012. Friedman, Lauri S., ed. Introducing Issues with Opposing Viewpoints: Cyberbullying. New York: Gale Cengage Learning, 2011. Print. Jacobs, Tom. Teen Cyberbullying Investigated: Where Do Your Rights End and Consequences Begin? Minneapolis: Free Spirit Publishing, 2010. Print. MySecureCyberspace. “Think Time: How Does Cyberbullying Affect You?” YouTube. 30 Nov 2010. Web. 2 April 2012. National Crime Prevention Council. “Cyberbullying.” National Crime Prevention Council. Web. 2 April 2012 Shariff, Shaheen. Confronting Cyber-Bullying: What Schools Need to Know to Control Misconduct and Avoid Legal Consequences. Cambridge, NY: Cambridge UP, 2009. Print. Stop cyberbullying.org. Web. 2 April 2012 Wired Safety.org. Web. 2 April 2012.

Editor's Notes

  1. As the Internet becomes more integrated into the lives of the younger generation, kids have found a way to attack and bully other kids using the different tools of the Internet. It is called Cyber bullying.
  2. What is cyber bullying? The Webster-Merriam dictionary defines cyber bullying as this: “ the electronic posting of mean-spirited messages about a person often done anonymously.” Another definition given by stopcyberbullying.org defines cyber bullying as “when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen, teen using the Internet, interactive and digital technologies or mobile phones.” The other thing to remember about cyber bullying is that it is only considered cyber bullying if two minors are involved. If the exchange is minor and an adult then it is called cyber harassment or cyber stalking. (stopcyberbullying.org)
  3. Different Forms of Cyber bullying Cyber bullying comes in many different forms and from many different sources, not just from a computer. Judge Tom Jacobs book Teen Cyberbullying Investigated gives a great list of the different forms that cyber bullying can take. They are: Sending insulting or threatening emails, texts, or instant messages to someone using a computer, cell phone or any other e-communication device Spreading hateful comments about someone via e-mail, blogs, online profiles, or chat rooms Stealing passwords and sending out threatening messages using a false identity Building a Web Site targeting specific people (3)
  4. These are the terms most commonly used when describing the different types of cyber bullying. Flaming = heated, online exchange Harassment= electronic messages that can cause emotional distress Denigration= online postings of negative or false information about someone Impersonation= giving negative, false information to other while impersonating someone else Outing and trickery= electronically sharing or forwarding personal or secret information Exclusion and ostracism= removing or blocking people from buddy lists Cyber stalking= using technology to stalk and threaten a target Happy slapping= videotaping and electronically disseminating an instance of slapping someone (Friedman, 27)
  5. Bullying vs. Cyber Bullying There are two big differences between cyber bullying and bullying: Cyber bullying is more anonymous while bullying is more direct Even though it is more anonymous, 50% of cyber bully victims who their cyber bully whether they realize it or not (Friedman, 13). People who cyber bully, tend to do it because they think that having a screen name gives them some protection. And it does because it does make it harder to track who they actually are (Shariff, 44). Bullying happens face to face while cyber bullying uses technology.
  6. The biggest difference of all… Cyber bullying can go on 24/7 With regular bullying, victims got a break on the evenings and weekends. With cyber bullying, victims can be harassed 24/7 via different forms of electronic communication. Perry Aftab, a cyber bully expert says “The kids who beat you up in school didn’t used to follow you home… now they do.” (Friedman, 8)
  7. Girls tend to be victims of cyber bullying than boys do. In a poll done in 2006-2007 17% of girls said they had experience with some one taking a private message and forwarding it to someone, while only 13% of boys had this happen 15% said they had received a threatening or aggressive e-mail, IM or text message and only 10% of boys had this happen 16% of girls said someone had spread a rumor about them online while only 9% of boys had this happen 7% had someone post an embarrassing picture of them online without their permission opposed to the 5% of boys that had it happen (Friedman, 56)
  8. Some teenagers do not understand the problem with cyber bullying. When asked why they think cyber bullies do what they do, 81% percent said that cyber bullies do it because they think its funny. (National Crime Prevention Council) Possible reasons that teens cyber bully others are: Don’t think cyber bullying is a big deal Don’t think about the consequences Are encouraged by their friends Think everyone cyber bullies Think they won’t get caught. (National Crime Prevention Council)
  9. Many victims of cyber bullying are afraid to step forward and tell someone about what is going on leaving them to deal with all the problems on their own. Many cyber bully victims experience: Depression Low self esteem issues Problems at school They may also pull away from friends and family. May stop doing the activities they once enjoyed And in the most severe cases… the victim may commit suicide. (Friedman, 25 & National Crime Prevention Council) One of the possible reasons that cyber bullying is more harmful to its victims is because the torment happens 24/7, happens before a much larger audience and the threats and insults are permanently preserved on the Internet (Friedman, 27) More and more teens are committing suicide because of cyber bullying.
  10. Federal Laws: 2008- Congress passed the Protecting Children in the 21 st Century Act. *Requires public schools to educate their students about cyber bullying, online safety, and sexual predators. State Laws: 19 states have laws that cover some aspect of cyber bullying. Missouri is one of them. Missouri Law: “Harassment by computer, text message, and other electronic device is illegal; it is a felony for an adult (age 21 and older) to cyberbully anyone 17 or younger.” After Megan Meier fell victim to cyber bullying, her home town of Dardenne Prairie, Missouri passed a measure outlawing online harassment. Any one caught in violation of the law receives a misdemeanor which can possibly lead to a $500 fine and 90 days in jail. (Jacobs, 19-20)
  11. What can we do to help prevent cyber bullying? Educate students on cyber bullying. Get them to understand cyber bullying is no joke. Encourage students to tell an adult (parent or teacher) if they fall victim to cyber bullying Educate parents and other community members about the problems of cyber bullying. (National Crime Prevention Council) There are also a bunch of helpful websites with more information about cyber bullying and ways to help prevent it. Some are:
  12. WiredSafety.org advertises itself as the world’s first internet safety and help guide. It provides great information for any age group or any professional group. There are different pages that cater to youth, adults, schools and law enforcement. It’s a great tool for anyone looking to information about cyber bullying or any other problems that might occur online.
  13. Stopcyberbullying.org is another great website that offers a lot of information about cyber bullying and what can be done to prevent it. Once again it gives you the option to go to a portion of the site for certain age groups and professional groups. The fun thing about this web site is that it has a game that kids can download called Alex Wonder Kid cyberdective. This makes learning about cyber bullying fun and interactive for younger students.
  14. Cyberbullying.us has a lot of good downloadable resources to print off as handouts. There are word games such as crosswords and word searches, quizzes about cyber bullying, cyber bullying scenario sheets. There is also a section for cyber bully victims to share their story and see that they are not alone.
  15. The National Crime Prevention Council website is another great website to use when finding information about cyber bullying and tips on how to prevent it. On this website you can even get professional training from the NCPC on cyber bullying and how to manage bullying situations. There also downloadable resources on this page as well such as podcasts, handouts and commercials on cyber bullying.
  16. I found this pledge in of the books I looked at it. The pledge is originally from WiredSafety.org. but it would be a great thing to use with students to wrap up a lesson on cyber bullying and have them sign. Teachers can print it out and then offer to laminate it so that students can keep it in a safe place at home or in the classroom.
  17. This YouTube video reviews some of the information that was mentioned in this presentation. This video would also be a good tool to use with students when talking to them about cyber bullying because it is a very informative video.