SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
Internet Safety and
   Cyberbullying
Mrs. Trudden
Mrs. Clifford
Website and Ad Safety
     Work on the assigned website
     only....don’t navigate away.
     Never click on advertisements....they are
     there to distract you.




 http://www.funbrain.com/brain/SweepsBrain/Password.html?GameName=DesertDive&Brain=kidsandparents&Grade=0&GameNumber=1
Downloading and
        File-Sharing
Download and share media
safely and from approved
websites
It is illegal to share copyrighted
materials without permission
You could unknowingly
download or distribute viruses
and illicit material.
                                     www.nonstopmac.com/ipod/
Email, IM, MySpace and
         Facebook
 Protect yourself by:
  Communicating with
people you know in person
  Keeping your personal
information private
  Not meeting offline
  Not responding to
offensive or any unknown
messages                    http://www.flickr.com/photos/luc/1824234195/
Cell Phones
   Never post your cell
phone number online
  Never send photos or
videos of yourself         http://www.flickr.com/photos/silly_a1804/2279068004/




  Don’t respond to harassing text
  Having a cell phone is a privilege,
not a right.
Make Safe Online Choices
You control your behavior and
reputation as well as how much
personal information is revealed.

Be a good friend and sibling and
encourage others to be safer online.

Talk to a trusted adult if
anything makes you feel
scared or uncomfortable.

          http://www.safeinyourspace.org/images/photokidscomputers.jpg
PRES Students are Technology PALS!

• P - Protection (about your identity and reputation)

• A - Appropriate (about inappropriate sites)

• L - Legal (about plagiarism, copying software/
  music)

• S - Safe & Responsible (about
  handling computers, software,
  equipment, backing up)



                                  http://www.flickr.com/photos/21976935@N03/2774496663
What is Bullying?
          P.I.C. Criteria

  P...purposeful
behavior
  I...imbalance of
power
  C...continual             http://www.citymasala.com/November2008/Bullying.gif
Cyberbullying




    http://www.uberreview.com/wp-content/uploads/cyberbully.jpg
What is Cyberbullying?
Spreading rumors and/or
gossip
Posting pictures without
consent
Stealing passwords to
assume someone’s
identity.
                        http://img.timeinc.net/TFK/media/news/2005a/050314_cyberbullies_special.jpg
Harrassing or
threatening with mean
or bad language

Most cases of
cyberbullying are
committed by someone
that you know
Warning Signs of
      Cyberbullying
• If someone tries to

  • isolate you from family and friends

  • turn you against your parents or guardians

  • tell you to keep secrets

  • sent inappropriate materials or talk about things
    that make you feel uncomfortable

  • threaten you
          Tell an adult you trust!
These warning signs apply online and offline!
What Not to Do!
•Don’t give your personal information to anyone....like
name, age, birthday, address, school, schedule
•Don’t post photos and videos of yourself or anyone
without permission
•NEVER give out your usernames and passwords to
anyone!




                  http://www.whostolemyidentity.com/uploads/Image/identity-theft.jpg
What to do!
•If you are ever cyberbullied:
 •Tell a trusted adult
 •Do not respond
 •Save the evidence
If anyone threatens you or you feel that
you are in immediate danger, talk to an
adult you trust and they will contact your
     local law-enforcement agency.
The Internet is
private.....right???
If it is on the internet, it
is NOT PRIVATE!
Real-Life Consequences
• Profiles and blogs are not only viewed
  by your friends, but also by:
 • Parents and Relatives
 • Teachers and Principals
 • Colleges and Universities
 • Employers
 • ONLINE PREDATORS
                               http://www.flickr.com/photos/32114411@N04/3021610899/

Weitere ähnliche Inhalte

Was ist angesagt?

Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyMariam Sb
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety PresentationMichael Richards
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parentssirchriss
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementaryjaimejoyh
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 

Was ist angesagt? (17)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Social Media Safety Teens - From NetSmartz
Social Media Safety Teens - From NetSmartzSocial Media Safety Teens - From NetSmartz
Social Media Safety Teens - From NetSmartz
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 

Andere mochten auch

Andere mochten auch (6)

Difficulties in Life ?
Difficulties in Life ?Difficulties in Life ?
Difficulties in Life ?
 
Web 20 5316 25603
Web 20 5316 25603Web 20 5316 25603
Web 20 5316 25603
 
Magic of words
Magic of wordsMagic of words
Magic of words
 
Next Generation Social Marketing 23120[1]
Next Generation Social Marketing 23120[1]Next Generation Social Marketing 23120[1]
Next Generation Social Marketing 23120[1]
 
Customer Engagement White Paper
Customer Engagement White PaperCustomer Engagement White Paper
Customer Engagement White Paper
 
Hiwi The Kiwi
Hiwi The KiwiHiwi The Kiwi
Hiwi The Kiwi
 

Ähnlich wie Pres Internet Safety Presentation

Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012KanelandSvihlik
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013KanelandSvihlik
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyDi Doersch
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipKaylon McGee
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011KanelandSvihlik
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safelysam31
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentationQEwebAdmin
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014KanelandSvihlik
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints PresentationProjectsByJen.com
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And KidsSandra Fathi
 
Internet safety
Internet safetyInternet safety
Internet safetydsansford
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipnhokanson
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 

Ähnlich wie Pres Internet Safety Presentation (20)

Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012
 
Ciejkalab4b
Ciejkalab4bCiejkalab4b
Ciejkalab4b
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and Technology
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints Presentation
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
Internet safety
Internet safetyInternet safety
Internet safety
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Kürzlich hochgeladen

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 

Kürzlich hochgeladen (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 

Pres Internet Safety Presentation

  • 1. Internet Safety and Cyberbullying Mrs. Trudden Mrs. Clifford
  • 2. Website and Ad Safety Work on the assigned website only....don’t navigate away. Never click on advertisements....they are there to distract you. http://www.funbrain.com/brain/SweepsBrain/Password.html?GameName=DesertDive&Brain=kidsandparents&Grade=0&GameNumber=1
  • 3. Downloading and File-Sharing Download and share media safely and from approved websites It is illegal to share copyrighted materials without permission You could unknowingly download or distribute viruses and illicit material. www.nonstopmac.com/ipod/
  • 4. Email, IM, MySpace and Facebook Protect yourself by: Communicating with people you know in person Keeping your personal information private Not meeting offline Not responding to offensive or any unknown messages http://www.flickr.com/photos/luc/1824234195/
  • 5. Cell Phones Never post your cell phone number online Never send photos or videos of yourself http://www.flickr.com/photos/silly_a1804/2279068004/ Don’t respond to harassing text Having a cell phone is a privilege, not a right.
  • 6. Make Safe Online Choices You control your behavior and reputation as well as how much personal information is revealed. Be a good friend and sibling and encourage others to be safer online. Talk to a trusted adult if anything makes you feel scared or uncomfortable. http://www.safeinyourspace.org/images/photokidscomputers.jpg
  • 7. PRES Students are Technology PALS! • P - Protection (about your identity and reputation) • A - Appropriate (about inappropriate sites) • L - Legal (about plagiarism, copying software/ music) • S - Safe & Responsible (about handling computers, software, equipment, backing up) http://www.flickr.com/photos/21976935@N03/2774496663
  • 8. What is Bullying? P.I.C. Criteria P...purposeful behavior I...imbalance of power C...continual http://www.citymasala.com/November2008/Bullying.gif
  • 9. Cyberbullying http://www.uberreview.com/wp-content/uploads/cyberbully.jpg
  • 10. What is Cyberbullying? Spreading rumors and/or gossip Posting pictures without consent Stealing passwords to assume someone’s identity. http://img.timeinc.net/TFK/media/news/2005a/050314_cyberbullies_special.jpg
  • 11. Harrassing or threatening with mean or bad language Most cases of cyberbullying are committed by someone that you know
  • 12. Warning Signs of Cyberbullying • If someone tries to • isolate you from family and friends • turn you against your parents or guardians • tell you to keep secrets • sent inappropriate materials or talk about things that make you feel uncomfortable • threaten you Tell an adult you trust! These warning signs apply online and offline!
  • 13. What Not to Do! •Don’t give your personal information to anyone....like name, age, birthday, address, school, schedule •Don’t post photos and videos of yourself or anyone without permission •NEVER give out your usernames and passwords to anyone! http://www.whostolemyidentity.com/uploads/Image/identity-theft.jpg
  • 14. What to do! •If you are ever cyberbullied: •Tell a trusted adult •Do not respond •Save the evidence If anyone threatens you or you feel that you are in immediate danger, talk to an adult you trust and they will contact your local law-enforcement agency.
  • 15. The Internet is private.....right??? If it is on the internet, it is NOT PRIVATE!
  • 16. Real-Life Consequences • Profiles and blogs are not only viewed by your friends, but also by: • Parents and Relatives • Teachers and Principals • Colleges and Universities • Employers • ONLINE PREDATORS http://www.flickr.com/photos/32114411@N04/3021610899/