SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Today’s children and young people have grown up in a world that is
very different from that of most adults. Many young people
experience the internet and mobile phones as a positive, productive
and creative part of their activities and development of their
identities; always on and always there. Above all, information
communication technologies support social activity that allows
young people to feel connected to their peers.
Unfortunately, technologies are also being used negatively. When
children are the target of bullying via mobile phones or the internet,
they can feel alone and very misunderstood. They may not be able
to identify that what is happening to them is a form of bullying, or
be confident that the adults around them will understand it that way
either. Previously safe and enjoyable environments and activities
can become threatening and a source of anxiety.
• What is Cyber bullying?

             • How is technology used to bully?

                    • Preventing Cyber bullying

                • Responding to Cyber bullying

                           • Key safety Advice

• When and how to contact the Service Provider

                                 • Conclusion
Cyber bullying is the use of Information Communication
Technology (ICT), particularly mobile phones and the internet,
deliberately to upset someone else.




                    Click Video to Begin:
Great for:                        Examples of Misuse:
Keeping in touch by voice or      Sending nasty calls or text
text, taking and sending          messages, including threats,
pictures and film, listening to   intimidation, harassment.
music, playing games, going       Taking and sharing
online and sending emails.        humiliating images. Videoing
Useful in emergency               other people being harassed
situations and for allowing       and sending these to other
children a greater sense of       phones or internet sites.
independence.
Great for:                     Examples of Misuse:
Text or voice chatting live    Sending nasty messages or
with friends online. A quick   content. Using someone
and effective way of keeping   else’s account to forward
in touch even while working    rude or mean messages via
on other things.               their contact list.
Great for:                       Examples of Misuse:
Groups of people around the      Sending nasty messages or
world can text or voice chat     threatening anonymous
live about common interests.     messages. Groups of people
For young people, this can       deciding to pick on or ignore
be an easy way to meet new       individuals. Making friends
people and explore issues        under false pretences-people
which they are too shy to talk   pretending to be someone
about in person.                 they’re not in order to get
                                 personal information that
                                 they can misuse in a range
                                 of ways-e.g. by spreading
                                 secrets or blackmailing.
Great for:                    Examples of Misuse:
Sending electronic letters,   Sending nasty or threatening
pictures and other files      messages. Forwarding
quickly and cheaply           unsuitable content including
anywhere in the world.        images and video clips, or
                              sending computer viruses.
                              Accessing someone else’s
                              account, e.g. to forward
                              personal emails or delete
                              emails.
Great for:                        Examples of Misuse:
Taking pictures or recording      Making and sending
messages. Being able to see       inappropriate content.
and talk to someone live on       Persuading or threatening
your computer screen.             young people to act in
Bringing far-off places to life   inappropriate ways. Using
or video conferencing.            inappropriate recordings to
                                  manipulate young people.
Great for:                      Examples of Misuse:
Socialising with your friends   Posting nasty comments,
and making new ones within      humiliating images/ video.
online communities. Allowing    Accessing another person’s
young people to be creative     account details and sending
online, even publishing         unpleasant messages,
online music. Personalising     deleting information or
homepages and profiles,         making private information
creating and uploading          public. Groups of people
content.                        picking on individuals by
                                excluding them. Creating
                                fake profiles to pretend to be
                                someone else, e.g. to bully,
                                harass or get the person into
                                trouble.
Great for:                      Examples of Misuse:
Accessing useful                Posting embarrassing,
educational, entertaining and   humiliating film of someone.
original creative video
content and uploading your
own.
Great for:                       Examples of Misuse:
School site, usually available   Posting inappropriate
from home and school, set        messages or images.
up for tracking and recording    Hacking into someone else’s
students assignments, tests      account to post inappropriate
and activities, with message     comments or delete school
boards, chat and IM.             work.
Great for:                       Examples of Misuse:
Live text or voice chat during   Name-calling, making
online gaming between            abusive/ derogatory remarks.
players across the world, or     Players may pick on weaker
on handheld consoles with        or less experienced users,
people in the same local         repeatedly killing their
area.                            character.
Virtual worlds let users         Forwarding unwanted
design their own avatars – a     messages to other devices in
figure that represents them in   the immediate vicinity.
the virtual world.
The best way to deal with cyber bullying is to prevent it happening it the
first place. The key first step is deciding who within the school community
   will take responsibility for the coordination and implementation of cyber
    bullying prevention and response strategies. It’s best if this person is a
member of the school’s senior management team and/or the staff member
 responsible for coordinating overall anti-bullying activity. This person will
      need to have experience of making sure the whole school community
                                  contribute to, and are included in, activities.
There is no single solution to the problem of cyber bullying. These are the
          five key areas schools need to address together to put in place a
                            comprehensive and effective prevention plan:
The whole school community needs a shared, agreed definition of cyber
   bullying. Everyone needs to be aware of the impact of cyber bullying and
the ways in which it differs from other forms of bullying. Young people and
  their parents should be made aware of pupils’ responsibilities in their use
of ICT, and what the sanctions are for misuse. Students and parents should
 know that the school can provide them with support if cyber bullying takes
                                                        place out of school.
Review and update the school’s anti-bullying policy plus other relevant
  policies – for example, policies on behaviour, pastoral care and e-learning
 strategies. Review your existing Acceptable use policies (AUPs) – the rules
    that students have to agree to following order to use ICT in school – and
publicise them to parents and students. Keep good records of any incidents
    of cyber bullying. Be able to conduct searches of internet use records at
           school. Knowing that the school is taking such steps may act as a
        disincentive for bullies to misuse school equipment and systems.
No one should feel that they have to deal with cyber bullying alone, but
  reporting and incident of bullying can be really hard for the person being
bullied and for bystanders Provide and publicise different ways of reporting
  cyber bullying in schools – for instance, a student council taskforce, peer
reporting, anonymous reporting – and provide information about contacting
                                                 service providers directly.
Technology is successfully being used to support engaging, positive and
 effective learning, and to realise and increase the potential of personalised
learning by making learning more flexible, creative and accessible. Explore
         safe ways of using technology with learners to support self-esteem,
       assertiveness, participation and to develop friendships. Promote and
     discuss ‘netiquette’, e-safety and digital literacy. Show learners that the
         adults in the school understand the technologies they use – get the
                                                      students to teach them!
Regular reviews are vital to make sure that anti-bullying policies are
     working and are up-to-date. Consider conducting an annual survey of
     pupils’ experiences of bullying, including cyber bullying, and a parent
satisfaction survey. Publicised progress and activities to the whole-school
           community – keep cyber bullying a live issue and celebrate your
                                                               successes!
Cyber bullying is a form of bullying, and therefore all schools should
    already be equipped to deal with the majority of cases through their
existing anti-bullying policies and procedures. This section outlines key
                        steps to take when responding to cyber bullying.


              • Supporting the Person being Bullied

                     • Investigating incidents


              • Working with the bully and sanctions
* Give reassurance that the person has done the right thing by telling
     someone, refer to any existing pastoral support/procedures and inform
                                                                     parent.
                                                      * Advise on next step:
         • Make sure the person knows no to retaliate or return the message
    • Ask the person to think about what information they have in the public
                                                                    domain
   • Help the person to keep relevant evidence for any investigation (e.g. by
not deleting messages they’ve received, and by taking screen capture shots
               and noting web addresses of online cyber bullying instances.
  • Check the person understands simple ways to prevent it from happening
 again, e.g. by changing contact details, blocking contacts or leaving a chat
                                                                      room.
* Take action to contain the incident when content has been circulated:
       • if you know who the person responsible is, ask them to remove the
                                                                   content.
  • Contact the host (e.g. the social networking site) to make a report to get
                                                     the content taken down.
• Use Disciplinary powers to confiscate phones that are being used to cyber
         bully. Ask the pupil to tell you who they have sent messages on to.
    • In cases of illegal content, contact the police, who can determine what
                                     needs to be kept for evidential purposes.
All bullying incidents should be properly recorded and investigated. Cyber
bullying can be a very serious matter and can constitute a criminal offence.
 In UK law, there are criminal laws that can apply in terms of harassment or
                                 threatening and menacing communications.
        • Advise pupils and staff to try and keep a record of the bullying as
evidence. It can be useful to show parents, teachers, pastoral care staff and
                                the police, if necessary, what has happened.
  • Take steps to identify the bully, including looking at the school systems,
identifying and interviewing possible witnesses, and contacting the service
 provider and the police, if necessary. The police will need to be involved to
         enable the service provider to look into the data of another user.
Once the person bullying is identified, steps should be taken to change
their attitude and behaviour as well as ensuring access to any support that
           is required. Factors to consider when determining the appropriate
                                                          sanctions include:
     • the impact on the victim: was the bully acting anonymously, was the
material widely circulated and humiliating, how difficult was controlling the
                                                     spread of the material?
• The motivation of the bully: was he incident unintentional or retaliation to
                                            bullying behaviour from others?


      Technology-specific sanctions for pupils engaged in cyber bullying
    behaviour could include limiting internet access for a period of time or
                 removing the right to bring a mobile phone into school.
The whole school community has a part to play in ensuring cyber safety.
 Understanding children and young people’s online lives and activities can
     help adults respond to situations appropriately and effectively. Asking
  children and young people to show adult how technologies and services
work is a useful strategy that can provide an important learning opportunity
                                   and context for discussing online safety.



                     • For Children and young people


                         • For Parents and carers
1. Always respect others – be careful what you say online and what images
                                                                you send.
   2. Think before you send – whatever you send can be made public very
                                    quickly and could stay online forever.
3. Treat your password like your toothbrush – keep it to yourself. Only give
    your mobile number and personal website addresses to trusted friends.
4. Block the bully – learn how to block or report someone who is behaving
                                                                    badly.
                                                  5. Don’t retaliate or reply
 6. Save the evidence – learn how to keep records of offending messages,
                                        pictures or online conversations.
7. Make sure you tell:
          •   An adult you trust, or call a helpline like Child Line on 0800 1111 in
                                                                        confidence;
    •    The provider of the service; check the service provider’s website to see
                                                       where to report incidents;
•       Your school – your teacher or the anti-bullying coordinator can help you


Finally, don’t just stand there – if you see cyber bullying going on, support
                        the victim and report the bullying.


                  How would you feel if no one stood up for you?
1. Be aware, your child may as likely cyber bully as be a target of cyber
   bullying. Be alert to your child seeming upset after using the internet or
    their mobile phone. This might involve subtle comments or changes in
  relationships with friends. They might be unwilling to talk or be secretive
                          about their online activities and mobile phone use.
2. Talk with your children and understand the ways in which they are using
                                       the internet and their mobile phone.
3. Use the tools on the service and turn on in-built internet safety features.
                                    4. Remind your children not to retaliate.
         5. Keep the evidence of offending emails, text messages or online
                                                           conversations.
6. Report Cyber bullying:
•   Contact your child’s school if it involves another pupil, so that they can
                                                     take appropriate action.
                                             •   Contact the service provider.
•   If the cyber bullying is serious and a potential criminal offence has been
                       committed, you should consider contacting the police.
Mobile Phones           Social Networking        Video Hosting




          Instant Messenger             Chat Rooms
All UK Mobile phone operators have nuisance call centres st up and/ or procedures in
      place to deal with such incidents. They may be able to change the number of the
           person being bullied. Mobile operators cannot bar a particular number from
      contacting a phone, but some phone handsets do have this capacity. Action can
     be taken against the bully's phone account (e.g. blocking their account) only with
                                                                   police involvement.

                                                                           Contacts:
                                               o2: ncb@o2.com or 0870 521 4000
                                          Vodafone: 191 from a Vodafone phone
                                     3: call 333 from a 3 phone or 0870 733 0333
                                            Orange: call 450 on an orange phone
                                         T-Mobile: call 150 on a T-Mobile phone
It is good practise for social network providers to make reporting incidents
       of cyber bullying easy, and thus have clear, accessible and prominent
        reporting features . Man of these reporting features will be within the
   profiles themselves, so they are ‘handy’ for the user. If social networking
      sites do receive reports about cyber bullying, they will investigate and
    can remove content that is illegal or breaks their terms and conditions in
     other ways. They can delete the accounts of those who have broken the
                                                                         rules.
It is possible to get content taken down from video-hosting sites, though
 the content will need to be illegal or have broken the terms of service of
      the site in other ways. On YouTube, perhaps the most well-known of
            such sites, it is possible to report content to the site provider as
       inappropriate. In order to dot his, you will need to create an account
        (this is free) and log in, and then you will have the option to flag the
 content is under the video content itself. YouTube providers information
                   on what is considered inappropriate in its terms or service.


                             See www.youtube.com/t/terms section 5C
it is good practise for Instant Messenger (IM) providers to have visible and
        easy-to-access reporting features on their service. Instant Messenger
       providers can investigate and shut down any accounts that have been
      misused and clearly break their terms of service. The best evidence for
     the service provider is archived or recorded conversations, and most IM
                             providers allow the users to record all messages.
                                            Contacts for some IM providers:
MSN: when in Windows Live Messenger, clicking the ‘Help’ tab will bring up
  a range of options, including ‘Report Abuse’ and there is also and online
      feedback form at http://support .msn.com/default.aspx?mky=en-gb to
                  report on a range of products including MSN Messenger.
  Yahoo!: When in Yahoo! Messenger, clicking the ‘Help’ tab will bring up a
                            range of options, including ‘Report Abuse’.
It is good for chat provides to have a clear and prominent reporting
mechanism to enable the user to contact the service provider. Users that
abuse the service can have their account deleted. Some services may be
         moderated, and the moderators will warn users posting abusive
         comments or take down content that breaks their terms of use.
Technology is great and offers fantastic opportunities for children.
However, the technology can be misused, and this can be very painful for
 those, both children and teachers, who are the targets of cyber bullying.
  Adults need to help children and young people prepare for the hazards
   whilst promoting the many learning and social opportunities available.
       Tackling cyber bullying will be an ongoing process as technology
continues to develop. If you would like the full guidance produced by the
                               DCSF and Childnet, click the licks below:


                • www.teachernet.gov.uk/publications
                          • www.digizen.org

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
br03wood
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
Sally Garza
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
caitlynx48
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
HannahMorrell
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
bolan1jt
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
kscheidy
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
Courtney Cole
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
Amber Dee
 

Was ist angesagt? (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYING
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigable
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 

Andere mochten auch (16)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyber bullying on social networking sites
Cyber bullying on social networking sitesCyber bullying on social networking sites
Cyber bullying on social networking sites
 
CyberBullying
CyberBullyingCyberBullying
CyberBullying
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying: Who, What, Where
Cyber bullying: Who, What, WhereCyber bullying: Who, What, Where
Cyber bullying: Who, What, Where
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying In Schools
Cyber Bullying In SchoolsCyber Bullying In Schools
Cyber Bullying In Schools
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
English attack
English attackEnglish attack
English attack
 
Sept 19 bullying awareness slide show
Sept 19 bullying awareness slide showSept 19 bullying awareness slide show
Sept 19 bullying awareness slide show
 
Cyberbullying ppt
Cyberbullying pptCyberbullying ppt
Cyberbullying ppt
 

Ähnlich wie Cyber bullying

Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
alanrgibson41217
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
mribera87
 

Ähnlich wie Cyber bullying (20)

Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Bullying vs cyber bullying italy
Bullying vs cyber bullying italyBullying vs cyber bullying italy
Bullying vs cyber bullying italy
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptx
 
Cyber safety word for edmodo
Cyber safety word for edmodoCyber safety word for edmodo
Cyber safety word for edmodo
 
Technology Presentation
Technology PresentationTechnology Presentation
Technology Presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009
 
Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
O5 - Cyberbullying Guide
O5 - Cyberbullying GuideO5 - Cyberbullying Guide
O5 - Cyberbullying Guide
 
O5 - Cyberbullying Guide
O5 - Cyberbullying GuideO5 - Cyberbullying Guide
O5 - Cyberbullying Guide
 

Mehr von pscl

Football
FootballFootball
Football
pscl
 
England66
England66England66
England66
pscl
 
England03
England03England03
England03
pscl
 
Cycling04
Cycling04Cycling04
Cycling04
pscl
 
Rowing00
Rowing00Rowing00
Rowing00
pscl
 
Athletics04
Athletics04Athletics04
Athletics04
pscl
 

Mehr von pscl (6)

Football
FootballFootball
Football
 
England66
England66England66
England66
 
England03
England03England03
England03
 
Cycling04
Cycling04Cycling04
Cycling04
 
Rowing00
Rowing00Rowing00
Rowing00
 
Athletics04
Athletics04Athletics04
Athletics04
 

Kürzlich hochgeladen

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Kürzlich hochgeladen (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

Cyber bullying

  • 1.
  • 2. Today’s children and young people have grown up in a world that is very different from that of most adults. Many young people experience the internet and mobile phones as a positive, productive and creative part of their activities and development of their identities; always on and always there. Above all, information communication technologies support social activity that allows young people to feel connected to their peers. Unfortunately, technologies are also being used negatively. When children are the target of bullying via mobile phones or the internet, they can feel alone and very misunderstood. They may not be able to identify that what is happening to them is a form of bullying, or be confident that the adults around them will understand it that way either. Previously safe and enjoyable environments and activities can become threatening and a source of anxiety.
  • 3. • What is Cyber bullying? • How is technology used to bully? • Preventing Cyber bullying • Responding to Cyber bullying • Key safety Advice • When and how to contact the Service Provider • Conclusion
  • 4. Cyber bullying is the use of Information Communication Technology (ICT), particularly mobile phones and the internet, deliberately to upset someone else. Click Video to Begin:
  • 5. Great for: Examples of Misuse: Keeping in touch by voice or Sending nasty calls or text text, taking and sending messages, including threats, pictures and film, listening to intimidation, harassment. music, playing games, going Taking and sharing online and sending emails. humiliating images. Videoing Useful in emergency other people being harassed situations and for allowing and sending these to other children a greater sense of phones or internet sites. independence.
  • 6. Great for: Examples of Misuse: Text or voice chatting live Sending nasty messages or with friends online. A quick content. Using someone and effective way of keeping else’s account to forward in touch even while working rude or mean messages via on other things. their contact list.
  • 7. Great for: Examples of Misuse: Groups of people around the Sending nasty messages or world can text or voice chat threatening anonymous live about common interests. messages. Groups of people For young people, this can deciding to pick on or ignore be an easy way to meet new individuals. Making friends people and explore issues under false pretences-people which they are too shy to talk pretending to be someone about in person. they’re not in order to get personal information that they can misuse in a range of ways-e.g. by spreading secrets or blackmailing.
  • 8. Great for: Examples of Misuse: Sending electronic letters, Sending nasty or threatening pictures and other files messages. Forwarding quickly and cheaply unsuitable content including anywhere in the world. images and video clips, or sending computer viruses. Accessing someone else’s account, e.g. to forward personal emails or delete emails.
  • 9. Great for: Examples of Misuse: Taking pictures or recording Making and sending messages. Being able to see inappropriate content. and talk to someone live on Persuading or threatening your computer screen. young people to act in Bringing far-off places to life inappropriate ways. Using or video conferencing. inappropriate recordings to manipulate young people.
  • 10. Great for: Examples of Misuse: Socialising with your friends Posting nasty comments, and making new ones within humiliating images/ video. online communities. Allowing Accessing another person’s young people to be creative account details and sending online, even publishing unpleasant messages, online music. Personalising deleting information or homepages and profiles, making private information creating and uploading public. Groups of people content. picking on individuals by excluding them. Creating fake profiles to pretend to be someone else, e.g. to bully, harass or get the person into trouble.
  • 11. Great for: Examples of Misuse: Accessing useful Posting embarrassing, educational, entertaining and humiliating film of someone. original creative video content and uploading your own.
  • 12. Great for: Examples of Misuse: School site, usually available Posting inappropriate from home and school, set messages or images. up for tracking and recording Hacking into someone else’s students assignments, tests account to post inappropriate and activities, with message comments or delete school boards, chat and IM. work.
  • 13. Great for: Examples of Misuse: Live text or voice chat during Name-calling, making online gaming between abusive/ derogatory remarks. players across the world, or Players may pick on weaker on handheld consoles with or less experienced users, people in the same local repeatedly killing their area. character. Virtual worlds let users Forwarding unwanted design their own avatars – a messages to other devices in figure that represents them in the immediate vicinity. the virtual world.
  • 14. The best way to deal with cyber bullying is to prevent it happening it the first place. The key first step is deciding who within the school community will take responsibility for the coordination and implementation of cyber bullying prevention and response strategies. It’s best if this person is a member of the school’s senior management team and/or the staff member responsible for coordinating overall anti-bullying activity. This person will need to have experience of making sure the whole school community contribute to, and are included in, activities. There is no single solution to the problem of cyber bullying. These are the five key areas schools need to address together to put in place a comprehensive and effective prevention plan:
  • 15. The whole school community needs a shared, agreed definition of cyber bullying. Everyone needs to be aware of the impact of cyber bullying and the ways in which it differs from other forms of bullying. Young people and their parents should be made aware of pupils’ responsibilities in their use of ICT, and what the sanctions are for misuse. Students and parents should know that the school can provide them with support if cyber bullying takes place out of school.
  • 16. Review and update the school’s anti-bullying policy plus other relevant policies – for example, policies on behaviour, pastoral care and e-learning strategies. Review your existing Acceptable use policies (AUPs) – the rules that students have to agree to following order to use ICT in school – and publicise them to parents and students. Keep good records of any incidents of cyber bullying. Be able to conduct searches of internet use records at school. Knowing that the school is taking such steps may act as a disincentive for bullies to misuse school equipment and systems.
  • 17. No one should feel that they have to deal with cyber bullying alone, but reporting and incident of bullying can be really hard for the person being bullied and for bystanders Provide and publicise different ways of reporting cyber bullying in schools – for instance, a student council taskforce, peer reporting, anonymous reporting – and provide information about contacting service providers directly.
  • 18. Technology is successfully being used to support engaging, positive and effective learning, and to realise and increase the potential of personalised learning by making learning more flexible, creative and accessible. Explore safe ways of using technology with learners to support self-esteem, assertiveness, participation and to develop friendships. Promote and discuss ‘netiquette’, e-safety and digital literacy. Show learners that the adults in the school understand the technologies they use – get the students to teach them!
  • 19. Regular reviews are vital to make sure that anti-bullying policies are working and are up-to-date. Consider conducting an annual survey of pupils’ experiences of bullying, including cyber bullying, and a parent satisfaction survey. Publicised progress and activities to the whole-school community – keep cyber bullying a live issue and celebrate your successes!
  • 20. Cyber bullying is a form of bullying, and therefore all schools should already be equipped to deal with the majority of cases through their existing anti-bullying policies and procedures. This section outlines key steps to take when responding to cyber bullying. • Supporting the Person being Bullied • Investigating incidents • Working with the bully and sanctions
  • 21. * Give reassurance that the person has done the right thing by telling someone, refer to any existing pastoral support/procedures and inform parent. * Advise on next step: • Make sure the person knows no to retaliate or return the message • Ask the person to think about what information they have in the public domain • Help the person to keep relevant evidence for any investigation (e.g. by not deleting messages they’ve received, and by taking screen capture shots and noting web addresses of online cyber bullying instances. • Check the person understands simple ways to prevent it from happening again, e.g. by changing contact details, blocking contacts or leaving a chat room.
  • 22. * Take action to contain the incident when content has been circulated: • if you know who the person responsible is, ask them to remove the content. • Contact the host (e.g. the social networking site) to make a report to get the content taken down. • Use Disciplinary powers to confiscate phones that are being used to cyber bully. Ask the pupil to tell you who they have sent messages on to. • In cases of illegal content, contact the police, who can determine what needs to be kept for evidential purposes.
  • 23. All bullying incidents should be properly recorded and investigated. Cyber bullying can be a very serious matter and can constitute a criminal offence. In UK law, there are criminal laws that can apply in terms of harassment or threatening and menacing communications. • Advise pupils and staff to try and keep a record of the bullying as evidence. It can be useful to show parents, teachers, pastoral care staff and the police, if necessary, what has happened. • Take steps to identify the bully, including looking at the school systems, identifying and interviewing possible witnesses, and contacting the service provider and the police, if necessary. The police will need to be involved to enable the service provider to look into the data of another user.
  • 24. Once the person bullying is identified, steps should be taken to change their attitude and behaviour as well as ensuring access to any support that is required. Factors to consider when determining the appropriate sanctions include: • the impact on the victim: was the bully acting anonymously, was the material widely circulated and humiliating, how difficult was controlling the spread of the material? • The motivation of the bully: was he incident unintentional or retaliation to bullying behaviour from others? Technology-specific sanctions for pupils engaged in cyber bullying behaviour could include limiting internet access for a period of time or removing the right to bring a mobile phone into school.
  • 25. The whole school community has a part to play in ensuring cyber safety. Understanding children and young people’s online lives and activities can help adults respond to situations appropriately and effectively. Asking children and young people to show adult how technologies and services work is a useful strategy that can provide an important learning opportunity and context for discussing online safety. • For Children and young people • For Parents and carers
  • 26. 1. Always respect others – be careful what you say online and what images you send. 2. Think before you send – whatever you send can be made public very quickly and could stay online forever. 3. Treat your password like your toothbrush – keep it to yourself. Only give your mobile number and personal website addresses to trusted friends. 4. Block the bully – learn how to block or report someone who is behaving badly. 5. Don’t retaliate or reply 6. Save the evidence – learn how to keep records of offending messages, pictures or online conversations.
  • 27. 7. Make sure you tell: • An adult you trust, or call a helpline like Child Line on 0800 1111 in confidence; • The provider of the service; check the service provider’s website to see where to report incidents; • Your school – your teacher or the anti-bullying coordinator can help you Finally, don’t just stand there – if you see cyber bullying going on, support the victim and report the bullying. How would you feel if no one stood up for you?
  • 28. 1. Be aware, your child may as likely cyber bully as be a target of cyber bullying. Be alert to your child seeming upset after using the internet or their mobile phone. This might involve subtle comments or changes in relationships with friends. They might be unwilling to talk or be secretive about their online activities and mobile phone use. 2. Talk with your children and understand the ways in which they are using the internet and their mobile phone. 3. Use the tools on the service and turn on in-built internet safety features. 4. Remind your children not to retaliate. 5. Keep the evidence of offending emails, text messages or online conversations.
  • 29. 6. Report Cyber bullying: • Contact your child’s school if it involves another pupil, so that they can take appropriate action. • Contact the service provider. • If the cyber bullying is serious and a potential criminal offence has been committed, you should consider contacting the police.
  • 30. Mobile Phones Social Networking Video Hosting Instant Messenger Chat Rooms
  • 31. All UK Mobile phone operators have nuisance call centres st up and/ or procedures in place to deal with such incidents. They may be able to change the number of the person being bullied. Mobile operators cannot bar a particular number from contacting a phone, but some phone handsets do have this capacity. Action can be taken against the bully's phone account (e.g. blocking their account) only with police involvement. Contacts: o2: ncb@o2.com or 0870 521 4000 Vodafone: 191 from a Vodafone phone 3: call 333 from a 3 phone or 0870 733 0333 Orange: call 450 on an orange phone T-Mobile: call 150 on a T-Mobile phone
  • 32. It is good practise for social network providers to make reporting incidents of cyber bullying easy, and thus have clear, accessible and prominent reporting features . Man of these reporting features will be within the profiles themselves, so they are ‘handy’ for the user. If social networking sites do receive reports about cyber bullying, they will investigate and can remove content that is illegal or breaks their terms and conditions in other ways. They can delete the accounts of those who have broken the rules.
  • 33. It is possible to get content taken down from video-hosting sites, though the content will need to be illegal or have broken the terms of service of the site in other ways. On YouTube, perhaps the most well-known of such sites, it is possible to report content to the site provider as inappropriate. In order to dot his, you will need to create an account (this is free) and log in, and then you will have the option to flag the content is under the video content itself. YouTube providers information on what is considered inappropriate in its terms or service. See www.youtube.com/t/terms section 5C
  • 34. it is good practise for Instant Messenger (IM) providers to have visible and easy-to-access reporting features on their service. Instant Messenger providers can investigate and shut down any accounts that have been misused and clearly break their terms of service. The best evidence for the service provider is archived or recorded conversations, and most IM providers allow the users to record all messages. Contacts for some IM providers: MSN: when in Windows Live Messenger, clicking the ‘Help’ tab will bring up a range of options, including ‘Report Abuse’ and there is also and online feedback form at http://support .msn.com/default.aspx?mky=en-gb to report on a range of products including MSN Messenger. Yahoo!: When in Yahoo! Messenger, clicking the ‘Help’ tab will bring up a range of options, including ‘Report Abuse’.
  • 35. It is good for chat provides to have a clear and prominent reporting mechanism to enable the user to contact the service provider. Users that abuse the service can have their account deleted. Some services may be moderated, and the moderators will warn users posting abusive comments or take down content that breaks their terms of use.
  • 36. Technology is great and offers fantastic opportunities for children. However, the technology can be misused, and this can be very painful for those, both children and teachers, who are the targets of cyber bullying. Adults need to help children and young people prepare for the hazards whilst promoting the many learning and social opportunities available. Tackling cyber bullying will be an ongoing process as technology continues to develop. If you would like the full guidance produced by the DCSF and Childnet, click the licks below: • www.teachernet.gov.uk/publications • www.digizen.org