SlideShare a Scribd company logo
1 of 13
Cyberbullying By Sarah Swearingen
Definition "Cyberbullying" is when a child, preteen or teen is  tormented, threatened, harassed, humiliated, embarrassed  or otherwise targeted by another child, preteen or teen using  the Internet, interactive and digital technologies or mobile  phones. It has to have a minor on both sides, or at least have  been instigated by a minor against another minor. Once  adults become involved, it is plain and simple cyber- harassment or cyber-stalking. Adult cyber-harassment or  cyber-stalking is NEVER called cyberbullying (Parry).
How it Works There are two kinds of cyberbullying, direct attacks (messages sent to your kids directly) and cyberbullying by  proxy (using others to help cyberbully the victim, either with  or without the accomplice's knowledge). Because  cyberbullying by proxy often gets adults involved in the  harassment, it is much more dangerous (Parry).
Direct Attack Examples Instant Messaging/Text Messaging Stealing Passwords Blogs Websites Sending Pictures through E-mail and Cell Phones Internet Polling Interactive Gaming Sending Malicious Code Sending Porn and Other Junk E-mail Impersonation (Parry).
Cyberbullying by Proxy Cyberbullying by proxy is when a cyberbully gets someone else to do their dirty work. Most of the time they are unwitting accomplices and don't know that they are being  used by the cyberbully. Cyberbullying by proxy is the most  dangerous kind of cyberbullying because it often gets adults  involved in the harassment and people who don't know they are dealing with a kid or someone they know (Parry).
Cyberbullying by Proxy Examples "Warning" or "Notify Wars" are an example of cyberbullying by proxy. Kids click on the warning or notify buttons on their  IM screen or e-mail or chat screens, and alert the ISP or  service provider that the victim has done something that  violates their rules. If the victim receives enough warnings or  notifications, they can lose their account. The service  providers are aware of this abuse, and often check and see if  the warning were justified. But all the cyberbully has to do is  make the victim angry enough to say something rude or  hateful back. Then, BINGO! they warn them, making it look  like the victim had started it. In this case, the ISP or service  provider is the innocent accomplice of the cyberbully  (Parry).
Cyberbullying It is so important to protect and educate young people on  using the Internet and to provide all users with a safe  experience. How do you address “cyber-bullying”? Do you  look at how individuals function in their family, school and  work communities, how people deal with drama or politics,  or how they treat others and present themselves? Or do you  look at the parenting and teaching skills being presented in  these individual lives (Cyberbullying Research Center, 2010)?
Prevention To begin a successful decline in cyber-bullying education and  interventions need to focus on building empathy, identifying  escalation and techniques for stopping the cycle of abuse.  Environments at home and school need to be one where  people don’t get validated for negative attention and where  they don’t see relationship drama as part of normal life (Collier, 2011).
Prevention The Internet is not the problem here, as much as people  think it is, it is just a tool in an ongoing battle for attention,  validation, and status. Unless teachers and parents find  effective ways of getting to the root of this problem, at home  and in the classroom, the Internet will just continue to be  used to reinforce what is pervasive offline. Cyber-bullying  didn't come from out of nowhere, it is not new, and it is  something school counselors, teachers, parents and risk- prevention practitioners among us do understand (Collier,  2011).
Prevention When it comes to cyber-bullying we need to take the focus  off of technology and put it on the social and environmental  conditions that give rise to social cruelty offline as well as  online. To defeat cyber-bullying, we need to create home and  school cultures that encourage critical thinking about the  right and wrong kinds of attention, validation, and status- seeking; teach perspective-taking; and cultivate self-worth,  resilience, and a sense of belonging (Collier, 2011).
References Collier, Anne. (2011). Understanding cyber-bullying from the inside out. Retrieved from http://www.connectsafely.org/Safety-Advice-Articles/understanding-cyberbullying-from-the-inside-out.html Parry. Stop cyberbullying. Retrieved from http://www.stopcyberbullying.org/what_is_cyberbullying_exactly.html (**this website was really hard to site because they did not list the author or the copyright) (2010). Cyberbullying research center.Retrieved from  http://www.cyberbullying.us/ Twyman, Kimberly. (2010). Comparing Children and Adolescents Engaged in Cyberbullying to Matched Peers. Retrieved from http://ehis.ebscohost.com.jvlapps.nsuok.edu/ehost/pdfviewer/pdfviewer?vid=2&hid=5&sid=0d08118f-b15b-4eb8-84f3-7dc3f47a4b71%40sessionmgr14
Test Questions What is Direct Attack Cyberbullying? What is Cyberbullying by Proxy?  True or False: The Internet is not the problem, it is just a tool in an ongoing battle for attention, validation, and status.
Answers Direct Attack Cyberbullying is when threats or harassment is sent directly to the child through text messages, E-mail, websites or impersonation. Cyberbullying by proxy is when a cyberbully gets someone else to do their dirty work. Cyberbullying by Proxy is the most dangerous type of cyberbullying. TRUE.

More Related Content

What's hot (20)

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Bullying Presentation
Cyber Bullying PresentationCyber Bullying Presentation
Cyber Bullying Presentation
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Powerpoint SB
Powerpoint SBPowerpoint SB
Powerpoint SB
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Olmv cyberbullying
Olmv cyberbullyingOlmv cyberbullying
Olmv cyberbullying
 
The Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingThe Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber Bullying
 
Cyber bullying on social networking sites
Cyber bullying on social networking sitesCyber bullying on social networking sites
Cyber bullying on social networking sites
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying Presentation 2008
Cyberbullying Presentation 2008Cyberbullying Presentation 2008
Cyberbullying Presentation 2008
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Similar to Tie digital citizenship project cyberbullying

Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Joyce Hirsh
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointshannonmf
 
Sarah doty cyber bullying
Sarah doty cyber bullyingSarah doty cyber bullying
Sarah doty cyber bullyingSarah Doty
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingJoe Gauder
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying21rahul1999
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying griehl
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying estegiulimazziotti96
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngmiliarguelles1
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaamiliarguelles
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngmiliarguelles1
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaasofisalazar00
 

Similar to Tie digital citizenship project cyberbullying (20)

Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
 
Edp 279 unit 2.4
Edp 279 unit 2.4Edp 279 unit 2.4
Edp 279 unit 2.4
 
Sarah doty cyber bullying
Sarah doty cyber bullyingSarah doty cyber bullying
Sarah doty cyber bullying
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying este
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 

Recently uploaded

Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 

Recently uploaded (20)

FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 

Tie digital citizenship project cyberbullying

  • 2. Definition "Cyberbullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. It has to have a minor on both sides, or at least have been instigated by a minor against another minor. Once adults become involved, it is plain and simple cyber- harassment or cyber-stalking. Adult cyber-harassment or cyber-stalking is NEVER called cyberbullying (Parry).
  • 3. How it Works There are two kinds of cyberbullying, direct attacks (messages sent to your kids directly) and cyberbullying by proxy (using others to help cyberbully the victim, either with or without the accomplice's knowledge). Because cyberbullying by proxy often gets adults involved in the harassment, it is much more dangerous (Parry).
  • 4. Direct Attack Examples Instant Messaging/Text Messaging Stealing Passwords Blogs Websites Sending Pictures through E-mail and Cell Phones Internet Polling Interactive Gaming Sending Malicious Code Sending Porn and Other Junk E-mail Impersonation (Parry).
  • 5. Cyberbullying by Proxy Cyberbullying by proxy is when a cyberbully gets someone else to do their dirty work. Most of the time they are unwitting accomplices and don't know that they are being used by the cyberbully. Cyberbullying by proxy is the most dangerous kind of cyberbullying because it often gets adults involved in the harassment and people who don't know they are dealing with a kid or someone they know (Parry).
  • 6. Cyberbullying by Proxy Examples "Warning" or "Notify Wars" are an example of cyberbullying by proxy. Kids click on the warning or notify buttons on their IM screen or e-mail or chat screens, and alert the ISP or service provider that the victim has done something that violates their rules. If the victim receives enough warnings or notifications, they can lose their account. The service providers are aware of this abuse, and often check and see if the warning were justified. But all the cyberbully has to do is make the victim angry enough to say something rude or hateful back. Then, BINGO! they warn them, making it look like the victim had started it. In this case, the ISP or service provider is the innocent accomplice of the cyberbully (Parry).
  • 7. Cyberbullying It is so important to protect and educate young people on using the Internet and to provide all users with a safe experience. How do you address “cyber-bullying”? Do you look at how individuals function in their family, school and work communities, how people deal with drama or politics, or how they treat others and present themselves? Or do you look at the parenting and teaching skills being presented in these individual lives (Cyberbullying Research Center, 2010)?
  • 8. Prevention To begin a successful decline in cyber-bullying education and interventions need to focus on building empathy, identifying escalation and techniques for stopping the cycle of abuse. Environments at home and school need to be one where people don’t get validated for negative attention and where they don’t see relationship drama as part of normal life (Collier, 2011).
  • 9. Prevention The Internet is not the problem here, as much as people think it is, it is just a tool in an ongoing battle for attention, validation, and status. Unless teachers and parents find effective ways of getting to the root of this problem, at home and in the classroom, the Internet will just continue to be used to reinforce what is pervasive offline. Cyber-bullying didn't come from out of nowhere, it is not new, and it is something school counselors, teachers, parents and risk- prevention practitioners among us do understand (Collier, 2011).
  • 10. Prevention When it comes to cyber-bullying we need to take the focus off of technology and put it on the social and environmental conditions that give rise to social cruelty offline as well as online. To defeat cyber-bullying, we need to create home and school cultures that encourage critical thinking about the right and wrong kinds of attention, validation, and status- seeking; teach perspective-taking; and cultivate self-worth, resilience, and a sense of belonging (Collier, 2011).
  • 11. References Collier, Anne. (2011). Understanding cyber-bullying from the inside out. Retrieved from http://www.connectsafely.org/Safety-Advice-Articles/understanding-cyberbullying-from-the-inside-out.html Parry. Stop cyberbullying. Retrieved from http://www.stopcyberbullying.org/what_is_cyberbullying_exactly.html (**this website was really hard to site because they did not list the author or the copyright) (2010). Cyberbullying research center.Retrieved from http://www.cyberbullying.us/ Twyman, Kimberly. (2010). Comparing Children and Adolescents Engaged in Cyberbullying to Matched Peers. Retrieved from http://ehis.ebscohost.com.jvlapps.nsuok.edu/ehost/pdfviewer/pdfviewer?vid=2&hid=5&sid=0d08118f-b15b-4eb8-84f3-7dc3f47a4b71%40sessionmgr14
  • 12. Test Questions What is Direct Attack Cyberbullying? What is Cyberbullying by Proxy? True or False: The Internet is not the problem, it is just a tool in an ongoing battle for attention, validation, and status.
  • 13. Answers Direct Attack Cyberbullying is when threats or harassment is sent directly to the child through text messages, E-mail, websites or impersonation. Cyberbullying by proxy is when a cyberbully gets someone else to do their dirty work. Cyberbullying by Proxy is the most dangerous type of cyberbullying. TRUE.