SlideShare ist ein Scribd-Unternehmen logo
1 von 19
CYBERBULLYING
What it is and how it affects you
What is Cyberbullying?
ï‚Ą When a child, pre-teen or teenager is
  tormented, threatened, harassed, humiliated, em
  barrassed, or otherwise targeted by another
  child, pre-teen or teenager with the use of the
  internet, interactive and digital technologies, or
  mobile devices.


  ―Cyberbullying is ten times worse than the bullying I knew when I
  was younger, because while you may know your tormentors in
  school, on the web, people can hide as ―Anonymous‖ or under
  their usernames and yet deal the same damage.‖

                                         (Source: Asia News Network)
Cyberbullying in Real Life
A third of 10-18 year olds say they have been cyberbullied. Of
those, only 1 in 10 talks to their parents or teachers.
                                             (Source: Common Sense Media)


 Vermont, USA – Ryan         Missouri, USA – Megan   Singapore – On 30
 Patrick Halligan was        Meier, 13, committed    December 2010, 16-
 bullied for months          suicide by hanging      year-old student, Khine
 online. His classmates      herself after being     Thinzar, died after
 sent him instant            cyberbullied through    jumping off a building –
 messages calling him        the social networking   she killed herself after
 gay. He was                 site, MySpace, by       being slimed on
 threatened, taunted         someone who had set     Facebook by her ex-
 and insulted                up a hoax account.      boyfriend.
 incessantly. In 2003, 13-
 year-old Ryan killed
 himself.
Where does Cyberbullying
occur?
ï‚Ą Emails

ï‚Ą Instant messaging (MSN, Skype, Google Chat)

ï‚Ą Text or digital imaging messages sent on cell
  phones

ï‚Ą Web pages, web logs, web blogs

ï‚Ą Chat rooms, discussion groups

ï‚Ą Social Networking Sites

ï‚Ą Gaming sites, VLEs
What constitutes
Cyberbullying?
ï‚Ą Sending nasty messages or content via instant
  messaging

ï‚Ą Stealing passwords and impersonation

ï‚Ą Disfiguring someone‘s picture and posting it

ï‚Ą Posting nasty blog comments

ï‚Ą Internet polling
Types of Cyberbullies
ï‚Ą Type 1: The ‗Vengeful Angel‘

ï‚Ą Type 2: The ‗Power Hungry‘ + ‗Revenge of The Nerds‘

ï‚Ą Type 3: The ‗Mean Girl‘

ï‚Ą Type 4: The ‗Inadvertent‘
Ways to Prevent Becoming
a Cyberbully
ï‚Ą Practise good netiquette
ï‚Ą Never send a message to someone when you
  are angry
ï‚Ą Unplug once in a while
ï‚Ą Don‘t post anything about anyone that you
  wouldn‘t want posted about yourself
ï‚Ą Don‘t share or upload pictures of others without
  their permission
ï‚Ą Talk out issues with your parents or teachers
Ways to Prevent Being A
Victim to a Cyberbully
ï‚Ą Never give out personal information

ï‚Ą Practise good netiquette

ï‚Ą Refrain from opening a message from someone
  you don‘t know

ï‚Ą Don‘t gossip online/offline

ï‚Ą Don‘t believe everything that you read

ï‚Ą Unplug once in a while

ï‚Ą Be nice
If you think you are being
Cyberbullied
ï‚Ą Stop, Block, Tell

ï‚Ą Save the evidence

ï‚Ą Identify the sender

ï‚Ą Google yourself
Scenario 1
Joseph has some friends at his home for a
sleepover. The kids are getting a little bored.
Anthony says, ―Let‘s go online and see who else
from school is online.‖ Anthony uses Joseph‘s
password and types an instant message to a
popular girl on Joseph‘s buddy list: ―I really like Mai
Yin.‖ Some boys laugh. Others are quiet. Joseph
really does like Mai Yin, and he told Anthony quietly
the other day. But he didn‘t expect Anthony to tell
other kids. The next day at school, Joseph finds out
that everyone knows he likes Mai Yin.
Scenario 2
Jess and Kim are friends at school. Kim tells Jess
that she doesn‘t want to hang out with her any
more. Jess is angry and upset. She uploads a photo
of Kim from her mobile phone that was taken at a
pyjamas party two weeks earlier. Jess sends the
photo to everyone on her buddy list with a
message attached: ―Kim is such a ****.‖
Scenario 3
Sandra is planning a party to celebrate her birthday.
Her parents have set a limit of eight girls, so Sondra
can‘t invite everyone she‘d like. Two girls who are left
out overhear the plans. Angry, they plan their
revenge. The girls make a ―We Hate Sandra‖ Web
site. They say that anyone invited to the party should
not go. They tell everyone in school the site‘s address.
The girls invite everyone to add new reasons why they
hate Sandra and to spread ugly rumors about her.
When Sandra hears about the site, she gets a sick
feeling in her stomach. Unable to ignore it, she checks
the site often. Each day she ïŹnds a new nasty
comment or joke about her. She feels hurt and
powerless to defend herself. Sandra is too
embarrassed to go to school and tells her parents she
is sick.
Scenario 4
For the tenth day in a row, Andrew opens an email
that says, ―I‘m getting closer.‖ He doesn‘t
recognize the sender‘s address. He wonders if
someone at school is trying to scare him. On the
other hand, it could be a stranger. Whatever the
source, Andrew is scared. The next
afternoon, Andrew is home alone. The emails
come every few minutes. ―I‘m hiding in your house
using a wireless Internet connection. You‘ll never
ïŹnd me. But I‘ll ïŹnd you.‖

Frozen with fear, Andrew can‘t think what to do.
Scenario 5
Kevin sends his friend Joseph a short video he
made at home — a re-enactment of a famous
fantasy movie scene. Joseph, laughing at how
Kevin looks, shows it to some other boys at school.
The boys laugh at Kevin too and decide to post it
on a video-sharing website. Millions of people view
Kevin‘s video. Nasty comments are posted. Every
day, Kevin goes online to check and sees more
comments like ―idiot‖ and ―fat nerd.‖ Every day, he
goes to school and hears more cruel comments
from his classmates.
Feeling Uncomfortable
While going into cyberspace can be fun, some
online experiences may make you feel
embarrassed, upset, depressed, or afraid. It can
happen to anyone—even when going into
cyberspace sitting comfortably inside your own
home or favorite library. When it happens, it‘s best
to take action.
Taking Action
ï‚Ą Sign off the computer.

ï‚Ą Leave the chat room or website.

ï‚Ą Block the bully‘s messages.

ï‚Ą Save and print the bully‘s emails or your message
  logs.

ï‚Ą Never reply to a bully.

ï‚Ą Talk over how to handle the situation with a friend.

ï‚Ą Report your experience to a parent, teacher, or
  another trusted adult.
Say NO to Cyberbullying
ï‚Ą Let's Fight It Together (http://www.youtube.com/v/dubA2vhIlrg)
Sources
ï‚Ą Cybersmart (http://www.cybersmart.gov.au/)

ï‚Ą Common Sense Media
  (http://www.commonsensemedia.org/)

ï‚Ą Stop
  Cyberbullying(http://www.stopcyberbullying.org/
  )
Serene Yee
       Singapore International School

                   Hong Kong

                  January 2012


            This work is licensed under a

                Creative Commons

  Attribution-NonCommerical-ShareAlike 2.5 License

Weitere Àhnliche Inhalte

Was ist angesagt?

Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...HDCH
 
Anti-bullying presentation #4
Anti-bullying presentation #4Anti-bullying presentation #4
Anti-bullying presentation #4itunaschool
 
Bullying Presentation
Bullying PresentationBullying Presentation
Bullying Presentationracheljung12
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONApostolos Syropoulos
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingDoha qaradeh
 
School Bullying: toward Better Mitigation and Response
School Bullying: toward Better Mitigation and ResponseSchool Bullying: toward Better Mitigation and Response
School Bullying: toward Better Mitigation and ResponseJason Atherton
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableKhy Amigable
 
Cyber bullying vs traditional bullying
Cyber bullying vs traditional bullyingCyber bullying vs traditional bullying
Cyber bullying vs traditional bullyingAliasgher Ahmedabadwala
 
Cyberbullying and social media
Cyberbullying and social mediaCyberbullying and social media
Cyberbullying and social mediaevieasmedia
 
Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingJoe Gauder
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpointMsCCostello
 
Prevent Bullying At School
Prevent Bullying At SchoolPrevent Bullying At School
Prevent Bullying At SchoolSusan Convery Foltz
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying Miriam Pananaliksik
 

Was ist angesagt? (20)

Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Anti-bullying presentation #4
Anti-bullying presentation #4Anti-bullying presentation #4
Anti-bullying presentation #4
 
Bullying Presentation
Bullying PresentationBullying Presentation
Bullying Presentation
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Bullying Whats New And What To Do
Bullying Whats New And What To DoBullying Whats New And What To Do
Bullying Whats New And What To Do
 
School Bullying: toward Better Mitigation and Response
School Bullying: toward Better Mitigation and ResponseSchool Bullying: toward Better Mitigation and Response
School Bullying: toward Better Mitigation and Response
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigable
 
Bullying
BullyingBullying
Bullying
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Cyber bullying vs traditional bullying
Cyber bullying vs traditional bullyingCyber bullying vs traditional bullying
Cyber bullying vs traditional bullying
 
Cyberbullying and social media
Cyberbullying and social mediaCyberbullying and social media
Cyberbullying and social media
 
bullying
bullyingbullying
bullying
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Prevent Bullying At School
Prevent Bullying At SchoolPrevent Bullying At School
Prevent Bullying At School
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 

Ähnlich wie Cyberbullying

What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentationSally Garza
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying PresentationMary Alice Osborne
 
School Cyber Bullying Among Students .pptx.pptx
School Cyber Bullying Among Students .pptx.pptxSchool Cyber Bullying Among Students .pptx.pptx
School Cyber Bullying Among Students .pptx.pptxROSALIEBASA1
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010adewolfe
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying PresentationMegan Townes
 
Current Issues Powerpt
Current Issues PowerptCurrent Issues Powerpt
Current Issues Powerptdulud2lm
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying3610Instructor
 
Growing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsGrowing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsWebbed Marketing
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfCharanBobby69CB
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingR Smith
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
CyberbullyingspecR Smith
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
CyberbullyingspecR Smith
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
DigitalSkills Presentation: Cyberbullying
DigitalSkills Presentation: CyberbullyingDigitalSkills Presentation: Cyberbullying
DigitalSkills Presentation: Cyberbullyingdigitalskills
 
Teens: Cyberbullying, Sexting And Your Internet Presence
Teens: Cyberbullying, Sexting And Your Internet Presence Teens: Cyberbullying, Sexting And Your Internet Presence
Teens: Cyberbullying, Sexting And Your Internet Presence Gennia Holder
 
Ppt cyberbullying nelson mandela school
Ppt cyberbullying nelson mandela schoolPpt cyberbullying nelson mandela school
Ppt cyberbullying nelson mandela schoolAnnemieke Akkermans
 

Ähnlich wie Cyberbullying (20)

What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentation
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
School Cyber Bullying Among Students .pptx.pptx
School Cyber Bullying Among Students .pptx.pptxSchool Cyber Bullying Among Students .pptx.pptx
School Cyber Bullying Among Students .pptx.pptx
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying Presentation
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 
Current Issues Powerpt
Current Issues PowerptCurrent Issues Powerpt
Current Issues Powerpt
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying
 
Growing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsGrowing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in Schools
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
DigitalSkills Presentation: Cyberbullying
DigitalSkills Presentation: CyberbullyingDigitalSkills Presentation: Cyberbullying
DigitalSkills Presentation: Cyberbullying
 
Paper 3
Paper 3Paper 3
Paper 3
 
Teens: Cyberbullying, Sexting And Your Internet Presence
Teens: Cyberbullying, Sexting And Your Internet Presence Teens: Cyberbullying, Sexting And Your Internet Presence
Teens: Cyberbullying, Sexting And Your Internet Presence
 
Ppt cyberbullying nelson mandela school
Ppt cyberbullying nelson mandela schoolPpt cyberbullying nelson mandela school
Ppt cyberbullying nelson mandela school
 
Cyberbully
CyberbullyCyberbully
Cyberbully
 

KĂŒrzlich hochgeladen

Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
80 ĐỀ THI THỏ TUYỂN SINH TIáșŸNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỏ TUYỂN SINH TIáșŸNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỏ TUYỂN SINH TIáșŸNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỏ TUYỂN SINH TIáșŸNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 

KĂŒrzlich hochgeladen (20)

Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
80 ĐỀ THI THỏ TUYỂN SINH TIáșŸNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỏ TUYỂN SINH TIáșŸNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỏ TUYỂN SINH TIáșŸNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỏ TUYỂN SINH TIáșŸNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 

Cyberbullying

  • 1. CYBERBULLYING What it is and how it affects you
  • 2. What is Cyberbullying? ï‚Ą When a child, pre-teen or teenager is tormented, threatened, harassed, humiliated, em barrassed, or otherwise targeted by another child, pre-teen or teenager with the use of the internet, interactive and digital technologies, or mobile devices. ―Cyberbullying is ten times worse than the bullying I knew when I was younger, because while you may know your tormentors in school, on the web, people can hide as ―Anonymous‖ or under their usernames and yet deal the same damage.‖ (Source: Asia News Network)
  • 3. Cyberbullying in Real Life A third of 10-18 year olds say they have been cyberbullied. Of those, only 1 in 10 talks to their parents or teachers. (Source: Common Sense Media) Vermont, USA – Ryan Missouri, USA – Megan Singapore – On 30 Patrick Halligan was Meier, 13, committed December 2010, 16- bullied for months suicide by hanging year-old student, Khine online. His classmates herself after being Thinzar, died after sent him instant cyberbullied through jumping off a building – messages calling him the social networking she killed herself after gay. He was site, MySpace, by being slimed on threatened, taunted someone who had set Facebook by her ex- and insulted up a hoax account. boyfriend. incessantly. In 2003, 13- year-old Ryan killed himself.
  • 4. Where does Cyberbullying occur? ï‚Ą Emails ï‚Ą Instant messaging (MSN, Skype, Google Chat) ï‚Ą Text or digital imaging messages sent on cell phones ï‚Ą Web pages, web logs, web blogs ï‚Ą Chat rooms, discussion groups ï‚Ą Social Networking Sites ï‚Ą Gaming sites, VLEs
  • 5. What constitutes Cyberbullying? ï‚Ą Sending nasty messages or content via instant messaging ï‚Ą Stealing passwords and impersonation ï‚Ą Disfiguring someone‘s picture and posting it ï‚Ą Posting nasty blog comments ï‚Ą Internet polling
  • 6. Types of Cyberbullies ï‚Ą Type 1: The ‗Vengeful Angel‘ ï‚Ą Type 2: The ‗Power Hungry‘ + ‗Revenge of The Nerds‘ ï‚Ą Type 3: The ‗Mean Girl‘ ï‚Ą Type 4: The ‗Inadvertent‘
  • 7. Ways to Prevent Becoming a Cyberbully ï‚Ą Practise good netiquette ï‚Ą Never send a message to someone when you are angry ï‚Ą Unplug once in a while ï‚Ą Don‘t post anything about anyone that you wouldn‘t want posted about yourself ï‚Ą Don‘t share or upload pictures of others without their permission ï‚Ą Talk out issues with your parents or teachers
  • 8. Ways to Prevent Being A Victim to a Cyberbully ï‚Ą Never give out personal information ï‚Ą Practise good netiquette ï‚Ą Refrain from opening a message from someone you don‘t know ï‚Ą Don‘t gossip online/offline ï‚Ą Don‘t believe everything that you read ï‚Ą Unplug once in a while ï‚Ą Be nice
  • 9. If you think you are being Cyberbullied ï‚Ą Stop, Block, Tell ï‚Ą Save the evidence ï‚Ą Identify the sender ï‚Ą Google yourself
  • 10. Scenario 1 Joseph has some friends at his home for a sleepover. The kids are getting a little bored. Anthony says, ―Let‘s go online and see who else from school is online.‖ Anthony uses Joseph‘s password and types an instant message to a popular girl on Joseph‘s buddy list: ―I really like Mai Yin.‖ Some boys laugh. Others are quiet. Joseph really does like Mai Yin, and he told Anthony quietly the other day. But he didn‘t expect Anthony to tell other kids. The next day at school, Joseph finds out that everyone knows he likes Mai Yin.
  • 11. Scenario 2 Jess and Kim are friends at school. Kim tells Jess that she doesn‘t want to hang out with her any more. Jess is angry and upset. She uploads a photo of Kim from her mobile phone that was taken at a pyjamas party two weeks earlier. Jess sends the photo to everyone on her buddy list with a message attached: ―Kim is such a ****.‖
  • 12. Scenario 3 Sandra is planning a party to celebrate her birthday. Her parents have set a limit of eight girls, so Sondra can‘t invite everyone she‘d like. Two girls who are left out overhear the plans. Angry, they plan their revenge. The girls make a ―We Hate Sandra‖ Web site. They say that anyone invited to the party should not go. They tell everyone in school the site‘s address. The girls invite everyone to add new reasons why they hate Sandra and to spread ugly rumors about her. When Sandra hears about the site, she gets a sick feeling in her stomach. Unable to ignore it, she checks the site often. Each day she ïŹnds a new nasty comment or joke about her. She feels hurt and powerless to defend herself. Sandra is too embarrassed to go to school and tells her parents she is sick.
  • 13. Scenario 4 For the tenth day in a row, Andrew opens an email that says, ―I‘m getting closer.‖ He doesn‘t recognize the sender‘s address. He wonders if someone at school is trying to scare him. On the other hand, it could be a stranger. Whatever the source, Andrew is scared. The next afternoon, Andrew is home alone. The emails come every few minutes. ―I‘m hiding in your house using a wireless Internet connection. You‘ll never ïŹnd me. But I‘ll ïŹnd you.‖ Frozen with fear, Andrew can‘t think what to do.
  • 14. Scenario 5 Kevin sends his friend Joseph a short video he made at home — a re-enactment of a famous fantasy movie scene. Joseph, laughing at how Kevin looks, shows it to some other boys at school. The boys laugh at Kevin too and decide to post it on a video-sharing website. Millions of people view Kevin‘s video. Nasty comments are posted. Every day, Kevin goes online to check and sees more comments like ―idiot‖ and ―fat nerd.‖ Every day, he goes to school and hears more cruel comments from his classmates.
  • 15. Feeling Uncomfortable While going into cyberspace can be fun, some online experiences may make you feel embarrassed, upset, depressed, or afraid. It can happen to anyone—even when going into cyberspace sitting comfortably inside your own home or favorite library. When it happens, it‘s best to take action.
  • 16. Taking Action ï‚Ą Sign off the computer. ï‚Ą Leave the chat room or website. ï‚Ą Block the bully‘s messages. ï‚Ą Save and print the bully‘s emails or your message logs. ï‚Ą Never reply to a bully. ï‚Ą Talk over how to handle the situation with a friend. ï‚Ą Report your experience to a parent, teacher, or another trusted adult.
  • 17. Say NO to Cyberbullying ï‚Ą Let's Fight It Together (http://www.youtube.com/v/dubA2vhIlrg)
  • 18. Sources ï‚Ą Cybersmart (http://www.cybersmart.gov.au/) ï‚Ą Common Sense Media (http://www.commonsensemedia.org/) ï‚Ą Stop Cyberbullying(http://www.stopcyberbullying.org/ )
  • 19. Serene Yee Singapore International School Hong Kong January 2012 This work is licensed under a Creative Commons Attribution-NonCommerical-ShareAlike 2.5 License

Hinweis der Redaktion

  1. One day you like someone. The next day you don’t. Angry, you say something or post something online. It gets passed around quickly and easily. So now, everybody knows about it and everybody talks about it in school. While maybe you are mean only once, when you do it online your posting or message is repeated again and again as it gets passed around. Meanness multiplies. When kids are intentionally and repeatedly mean to one another using mobile phones or the Internet, it’s called cyberbullying. Sometimes kids can handle cyberbullying and not get too upset. Other times, it can make kids feel angry, frustrated, sad, or afraid.
  2. What do you think happened to the remaining 9 kids who never reported their bullying incidents?They endure and remain angry, frustrated, sad or afraid throughout their schooling life.They play truant and skip lessons.They suffer from health problems and lower self-esteem.They plot revenge and become bullies themselves.They end up having to undergo counseling or see a psychiatrist.They take their own lives.
  3. EmailsHarassing somebody by repeatedly sending unwanted messages.Sending unsuitable images or video clips.Forwarding someone else’s personal email(s).Sending computer viruses.Instant messagingHacking into another account and sending unpleasant messages.Sending nasty messages or content.Text or digital imaging messages sent on cell phonesSending nasty calls or text messages, including threats, intimidation and harassment.Taking and sharing humiliating images.Videoing and sharing acts of bullying.Web pages, web logs, web blogsPosting nasty comments or feedback.Chat rooms, discussion groupsSending nasty or threatening anonymous messages.Ignoring individuals.Persuading people to give out private information for purposes of exploitation.Social Networking SitesPosting nasty comments, humiliating images or videos.Hacking into another’s account and sending unpleasant messages.Rejecting or excluding peers by refusing to return or acknowledge messages; blocking contact by deleting people from their friendship lists, or using ‘ignore’ functions.Creating a fake profile to be someone else to bully, harass or get the targeted victim into trouble.
  4. Stealing passwords and impersonationHacking into someone’s email account and sending hurtful messages to othersHarassing someone by repeatedly sending unwanted messagesSending unsuitable images/video clipsForwarding someone else’s personal emailsSending computer viruses
  5. Type 1: The ‘Vengeful Angel’These cyberbullies don’t see themselves as bullies at all.They see themselves as righting wrongs, or protecting themselves or others from the “bad guys” they are now victimizing.The ‘Vengeful Angel’ cyberbully often gets involved trying to protect a friend who is being bullied or cyberbullied.Type 2: The ‘Power Hungry’ + ‘Revenge of The Nerds’These cyberbullies need an audience.They want to exert their authority and show that they are powerful enough to make others do what they want them to do.These cyberbullies have often been victims of typical bullying.They have better tech skills than others (thus, ‘Revenge of The Nerds’).This type of bully typically works in secret and doesn’t tell others what he/she is doing.They rarely see the seriousness of their actions.Most dangerous of all cyberbullies!Type 3: The ‘Mean Girl’Happens withcyberbullies who are bored and/or looking for entertainmentEgo-based and most immature of all cyberbullying typesTypically female cyberbullies.Victims are typically other girls, but can also be boys.Sometimes done as a group (physically or virtually).Type 4: The ‘Inadvertent’Thesecyberbullies do not think of themselves as bullies.They may pretend to be tough online, role-playing or reacting to hateful or provocative messages.They do not typically lash out intentionally.Tend to respond in anger or frustration.Sometimes send out cyberbullying communication without understanding how serious it could be.Sometimes send communication that they think is funny or a joke but the receiver interprets as cyberbullying (due to lack of body language).Are typically surprised when someone accuses them of cyberbullying.
  6. Good NetiquetteStart by making sure you are sending the right things to the right place, that it arrives and that the right person(s) gets it.Is it worth sending? Don’t waste people’s time and bandwidth with junk, chain emails and false rumours.Proofread and spell-check your emails and make sure the receiver(s) knows who you are.Don’t attack others online, say anything that could be considered insulting or that is controversial.Don’t forward other people’s emails without their permission or share their personal information.Are you angry when you’re writing this message? Take 5 and reconsider your words.Don’t reply to spam; don’t even email and ask to be removed from their mailing list. Simply, ignore and filter into spam box.How private is the message you are sending? Are you willing to have others read this message or forward it to others without your permission?Be nice to people in your ‘real world’ as real world issues become intensified on the internetIt is okay not to answer a message/email/text right awayCyberbullyingbehaviour should never be a strategy to resolve conflicts with others.
  7. Personal information:passwords, login IDs, pin numbers, home address and telephone numbersIt is okay not to answer a message/email/text right awayBe nice to people in your ‘real world’ as real world issues become intensified on the internetCyberbullies know their victims; the victims may not know their cyberbullies.Victims are often fearful of telling others about being bullied because they are afraid that the bullying may become worse if they tell.Victims are also often afraid to report to adults about being cyberbullied, as they fear the adults will over-react and take away their mobile devices and/or internet access.
  8. Stop, Block, Tell: Don’t reply, block the sender, tell someone (a trusted adult)Adults: parents, teachersSave the evidence – screen capture on the computer, saved text messages on the mobile phone, print out the emails/messages of harassmentIdentify the sender – contact ISP (Internet Service Provider) if necessaryGoogle yourself and ask yourself if you are revealing private information of yourself over the Internet.
  9. What is the problem here?How do you think Joseph felt?What do you think the boys watching Anthony were thinking?What do you think the kids at school said or did the next day?When kids are in groups, they sometimes do things that they would not do alone. Using someone else’s password and screen name to embarrass them is cyberbullyingbehaviour. Some of the kids at Joseph’s sleepover may think Anthony’s behavior is wrong, but they don’t say anything. So Anthony thinks that everyone in the group agrees with him. Kids who see, hear, or know about cyberbullying are called bystanders. The bigger the group of bystanders is, the less likely it is that any of them will try to help. Why do you think this is true?What could the bystanders at Jesse’s home say to stop the cyberbullying behavior? What would make things worse?
  10. What is the problem here?How do you think Kim felt?What might the kids who received the email think or do?What should Kim do? How would you advise her?
  11. If you were Sandra’s friend, what advice would you give her?
  12. If he called you for advice, what would you tell him?
  13. What is the problem here?Imagine someone telling an embarrassing secret about you in front of a bunch of kids at school. Now imagine someone posting an embarrassing secret about you on the Internet.When kids intentionally embarrass another kid, that’s just plain mean. Embarrassing or humiliating another kid using the Internet is cyberbullying. When Joseph and the others posted the video online, they set up a cyberbullying situation. They made it easy for other kids in school, and kids all over the world, to join in with them and post hurtful words online — again and again.As a bystander,what could you say to or do for Kevin?what could you say to Joseph?what could you say to the other kids at school who viewed the video and left cruel comments?how could you have involved a trusted adult?
  14. Both Sandra and Andrew are the targets of cyberbullying. Whether bullies are face to face or in cyberspace, they feel powerful when they bother other people. They may use hurtful words or threaten. Often the cyberbully is someone you know face to face. Perhaps the bully ïŹnds it easier to be mean and nasty online, when he or she can’t see the other person’s reaction. Online or off, bullying is meant to make you feel uncomfortable. Either way, it’s upsetting.
  15. Bullying should not be tolerated, whether in school or in cyberspace. Trust your uncomfortable feelings — they mean something is wrong. Let’s recall the steps to take when confronted by cyberbullying.If you witness cyberbullying, you can help by supporting the target and letting the bullies know that their behavior is not acceptable.
  16. 1. Who is Kim?2. What did she do to Joe and why?3. How did Joe feel about the websites and emails he received?4. Joe deleted one of the messages he received. Was this the right thing to do? What should he do instead?5. Why did the police turn up in school?