This document discusses cyberbullying and its connection to power. It defines three categories of cyberbullying: direct attacks through threatening texts or emails, cyberbullying by proxy where others are targeted to bully on someone's behalf, and posting humiliating information online. The document advises that if someone is cyberbullied, they should not engage but should block the cyberbully, tell a trusted adult, and contact authorities if needed. Cyberbullying affects relationships, opportunities, and consequences can follow if the cyberbully misuses their power online. The document explores our responsibility and how cyberbullying works as part of understanding power in relationships.
2. How does cyberbullying connect to our
Central Idea?
❖
❖
❖
When the cyberbully uses his/her power to hurt others then it will affect
relationships as no one will like that particular person.
It affects access to opportunities because your employer could easily
trace your digital footprints. If you’ve been harmful then there’s a good
chance you won’t get accepted.
The cyberbully has the power, they can have consequences by getting in
trouble.
Our main inquiry is power through
cyberbullying.
3. Main Questions:
What is our responsibility if we get we get cyber bullied?
How does cyberbullying work?
4. What we found out
Answers to our questions (Samara)
When get cyber bullied you should/should not
● write back
● block cyberbullies from your computer
● if the cyberbully goes to your school contact the vice principal
● Tell a friend or adult you trust
This answer connects to our unit because:
● The cyberbully has the power
● If someone follows these tips
● Affecting relationships
● cyberbully can lose access to opportunities
5. What we found out
Answers to our questions (Michelle)
Cyberbullying comes in three different categoriesDirect Attacks consist of:
● Threatening texts, IMs or emails
● Creating websites that could be harmful to others
Cyberbullying-by-proxy attacks consist of:
● Misusing the internet by targeting others (accomplices) to do for them
● Stealing the password of others and locking them out of their own
account
Posting humiliating information and images
6. Video
Primary and secondary resources
Brain Pop video on Digital Etiquette:
www.brainpop.com/technology/computersandinternet/digitaletiquette/ Video