SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Team Mosaic:
  Hannah Morrell
Emmanuelle Besnard
    Dustin Sikes
Allison Dobosiewicz
   Tyler Rutledge
   What?
        When a child, preteen or teen is tormented by another child, preteen or
         teen using the Internet, interactive and digital technologies or mobile
         phones. It has to have a minor on both sides, or at least have been
         instigated by a minor against another minor.
   How?
        The methods used are limited only by the child's imagination and access to
         technology (Social networks, phones, chats…)




   www.stopcyberbultying.org
   Criminal case upon which Lori Drew was
    convicted of Computer Fraud and Abuse over
    the cyber-bullying of 13 year old Megan Meier.
   Drew, a 49 year old woman living in
    Missouri, created a fake myspace account with
    the alias name Josh Evans to befriend Megan
    Meier
   “Evans” and Meier began a flirtatious
    relationship that turned sour fast
   Megan Meier hung herself because of the
    remarks made by “Evans”
http://abcnews.go.com/GMA/story?id=3882520&page=1
   20% had someone pretend to         45% of all teens have
    be someone else in order to
    trick them into revealing           been cyberbullied in
    personal information
   17% were victimized by              the past year alone
    someone lying about them
    online
   13% learned that a
    cyberbully was pretending to
    be them while
    communicating with
    someone else
   10% were victimized by
    someone else posting
    unflattering pictures of them
    without permission


        www.ncpc.org
http://www.cyberbullying.us/research.php.
   Middle and High Schools
       Faculty
       Parents of students
       Students
   Create separate packets for each group
   Community
   Needs the most information
   Include background data so they can create
    their own presentations based on class needs
   Topics:
       How to tell if a student is being bullied online
       What to do if you suspect cyber bullying
       How you can prevent cyber bullying as a faculty
        member
   Also require a lot of background data. Focusing
    on prevention and signs
   Topics:
     How to prevent your child from becoming a target
      of bullying
     What to do if you find your child is being targeted
     How to know if your child is a bully online, and how
      to stop it
   Require the most targeted information on how
    to deal with being targeted
   Topics
       What to do if you are being cyber bullied
       How to prevent being targeted by cyber bullies
       How to be respectful of others online
   With the communities help we can create
    enough awareness to eventually stop cyber
    bullying
   Together we can decrease the statistics of cyber
    bullying
   Cyber bullying is too big of an issue to handle
    alone
   Make official laws against cyberbullying
   Join local PTA‟s
     Write letters to lawmakers
     Flag cyberbullying on social media sites
     Join movements/organizations




http://www.socialsafety.org/law_enforcement_cyberbullying.html
   E-mails,
   Instant messaging,
   Text or digital imaging messages sent on cell
    phones,
   Web pages
   Web logs (blogs), Chat rooms or discussion
    groups
   Social Networking sites
   Start a anti cyberbullying campaign
   School involvement
          Special events
          Public speakers and personal testimonies
          Pledging to not bully
          PSA involvement
   Advertisement on Facebook
   You tube video
Place a permanent ad on Facebook raising cyberbullying awareness and
prevention
   Educate social media
    users on how to
    recognize, handle, and
    prevent cyberbullying
   Show people the effects of
    cyberbullying
   Inform people on how to
    report or go to higher
    authority if needed
   Get people involved in the
    anti cyberbullying
    movement
   No more anonymity
   Get laws passed making
    cyberbullying illegal
   Facebook‟s marketing director Randi
    Zuckerberg says the best way to end
    cyberbullying is to not allow anonymous or
    spam accounts
   “people hide behind anonymity and feel like
    they can say whatever they want behind closed
    doors”
   Eric Schmidt, former Google CEO has made
    this suggestion in the past and predictes
    “govenments will eventually „demand‟ that
    people use their names for all online activity”
    http://www.huffingtonpost.com/mobileweb/2011/07/27/ra
    ndi-zuckerberg-anonymity-online_n_910892.html
   Conditions and terms of use agreement before
    accessing a Social media site
   Public record of your social media account
       Monitor Activity
       Point system like drivers when flagged or reported.
   Our optimal plan will be to pair with a
    nonprofit and use their financial backing to
    help get our program off the ground. If not, we
    have several options:
     Bootstrapping: Generate funds ourselves
     Small bank loans
     Partner with similar programs of size or scope
   How are we going to measure our success?
   Indicators:
     Social media monitoring: Are kids talking about the
      issue?
     Website traffic: Is our website generating views?
     Number of participants: How many
      schools, faculty, parents, and/or students are
      participating?
   Focus on effectiveness more than efficency
   www.stopcyberbullying.org
   http://csriu.org/cyberbully.
   http://www.socialsafety.org/law_enforcement_cy
    berbullying.html
   http://www.cyberbullying.us/research.php
   www.ncpc.org
   http://abcnews.go.com/GMA/story?id=3882520
    &page=1
   http://www.huffingtonpost.com/mobileweb/201
    1/07/27/randi-zuckerberg-anonymity-
    online_n_910892.html

Weitere ähnliche Inhalte

Was ist angesagt?

Cyberbullying and social media
Cyberbullying and social mediaCyberbullying and social media
Cyberbullying and social mediaevieasmedia
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpointjosiebrookeday
 
Anti bullying campaign
Anti bullying campaignAnti bullying campaign
Anti bullying campaignDeidre Pike
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableKhy Amigable
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingCoachElrod
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullyingZiar Khan
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentationSally Garza
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.jessy0121
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying caitlynx48
 

Was ist angesagt? (20)

Cyberbullying and social media
Cyberbullying and social mediaCyberbullying and social media
Cyberbullying and social media
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Anti bullying campaign
Anti bullying campaignAnti bullying campaign
Anti bullying campaign
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigable
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 

Ähnlich wie Pr cyberbullying campaign powerpoint

Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and postervictoriahoo
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversationlippertnicole
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
Aurora - Social media
Aurora - Social mediaAurora - Social media
Aurora - Social mediaMike North
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)amalgarn
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHYaman Singhania
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxronak56
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGJaveriaZain1
 
How to stop cyber bullying
How to stop cyber bullyingHow to stop cyber bullying
How to stop cyber bullyingBullyvention
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenHomeGuides
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingmribera87
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and schoolGrant Ward
 
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxIs Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxchristiandean12115
 

Ähnlich wie Pr cyberbullying campaign powerpoint (20)

Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversation
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Aurora - Social media
Aurora - Social mediaAurora - Social media
Aurora - Social media
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Facebook
FacebookFacebook
Facebook
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYING
 
How to stop cyber bullying
How to stop cyber bullyingHow to stop cyber bullying
How to stop cyber bullying
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Chandan kumar
Chandan kumarChandan kumar
Chandan kumar
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and school
 
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxIs Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
 
Parenting the Net Generation - Full Version
Parenting the Net Generation - Full VersionParenting the Net Generation - Full Version
Parenting the Net Generation - Full Version
 
Social networks for parents
Social networks for parentsSocial networks for parents
Social networks for parents
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Kürzlich hochgeladen (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Pr cyberbullying campaign powerpoint

  • 1. Team Mosaic: Hannah Morrell Emmanuelle Besnard Dustin Sikes Allison Dobosiewicz Tyler Rutledge
  • 2. What?  When a child, preteen or teen is tormented by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. It has to have a minor on both sides, or at least have been instigated by a minor against another minor.  How?  The methods used are limited only by the child's imagination and access to technology (Social networks, phones, chats…)  www.stopcyberbultying.org
  • 3. Criminal case upon which Lori Drew was convicted of Computer Fraud and Abuse over the cyber-bullying of 13 year old Megan Meier.  Drew, a 49 year old woman living in Missouri, created a fake myspace account with the alias name Josh Evans to befriend Megan Meier  “Evans” and Meier began a flirtatious relationship that turned sour fast  Megan Meier hung herself because of the remarks made by “Evans” http://abcnews.go.com/GMA/story?id=3882520&page=1
  • 4. 20% had someone pretend to  45% of all teens have be someone else in order to trick them into revealing been cyberbullied in personal information  17% were victimized by the past year alone someone lying about them online  13% learned that a cyberbully was pretending to be them while communicating with someone else  10% were victimized by someone else posting unflattering pictures of them without permission www.ncpc.org
  • 6. Middle and High Schools  Faculty  Parents of students  Students  Create separate packets for each group  Community
  • 7. Needs the most information  Include background data so they can create their own presentations based on class needs  Topics:  How to tell if a student is being bullied online  What to do if you suspect cyber bullying  How you can prevent cyber bullying as a faculty member
  • 8. Also require a lot of background data. Focusing on prevention and signs  Topics:  How to prevent your child from becoming a target of bullying  What to do if you find your child is being targeted  How to know if your child is a bully online, and how to stop it
  • 9. Require the most targeted information on how to deal with being targeted  Topics  What to do if you are being cyber bullied  How to prevent being targeted by cyber bullies  How to be respectful of others online
  • 10. With the communities help we can create enough awareness to eventually stop cyber bullying  Together we can decrease the statistics of cyber bullying  Cyber bullying is too big of an issue to handle alone  Make official laws against cyberbullying
  • 11. Join local PTA‟s  Write letters to lawmakers  Flag cyberbullying on social media sites  Join movements/organizations http://www.socialsafety.org/law_enforcement_cyberbullying.html
  • 12. E-mails,  Instant messaging,  Text or digital imaging messages sent on cell phones,  Web pages  Web logs (blogs), Chat rooms or discussion groups  Social Networking sites
  • 13. Start a anti cyberbullying campaign  School involvement  Special events  Public speakers and personal testimonies  Pledging to not bully  PSA involvement  Advertisement on Facebook  You tube video
  • 14. Place a permanent ad on Facebook raising cyberbullying awareness and prevention
  • 15. Educate social media users on how to recognize, handle, and prevent cyberbullying  Show people the effects of cyberbullying  Inform people on how to report or go to higher authority if needed  Get people involved in the anti cyberbullying movement  No more anonymity  Get laws passed making cyberbullying illegal
  • 16. Facebook‟s marketing director Randi Zuckerberg says the best way to end cyberbullying is to not allow anonymous or spam accounts  “people hide behind anonymity and feel like they can say whatever they want behind closed doors”  Eric Schmidt, former Google CEO has made this suggestion in the past and predictes “govenments will eventually „demand‟ that people use their names for all online activity” http://www.huffingtonpost.com/mobileweb/2011/07/27/ra ndi-zuckerberg-anonymity-online_n_910892.html
  • 17. Conditions and terms of use agreement before accessing a Social media site  Public record of your social media account  Monitor Activity  Point system like drivers when flagged or reported.
  • 18. Our optimal plan will be to pair with a nonprofit and use their financial backing to help get our program off the ground. If not, we have several options:  Bootstrapping: Generate funds ourselves  Small bank loans  Partner with similar programs of size or scope
  • 19. How are we going to measure our success?  Indicators:  Social media monitoring: Are kids talking about the issue?  Website traffic: Is our website generating views?  Number of participants: How many schools, faculty, parents, and/or students are participating?  Focus on effectiveness more than efficency
  • 20.
  • 21. www.stopcyberbullying.org  http://csriu.org/cyberbully.  http://www.socialsafety.org/law_enforcement_cy berbullying.html  http://www.cyberbullying.us/research.php  www.ncpc.org  http://abcnews.go.com/GMA/story?id=3882520 &page=1  http://www.huffingtonpost.com/mobileweb/201 1/07/27/randi-zuckerberg-anonymity- online_n_910892.html