SlideShare ist ein Scribd-Unternehmen logo
1 von 16
CYBER BULLYING Marjon Ricketts April 14, 2010
Table of Contents  What is cyber bullying? Facts Social Networks used  Different forms of cyber bullying? Targeted groups The effects of cyber bullying? What can be done to stop cyber bullying? Summary and Conclusion References
Cyber bullying Cyber bullying is the harmful application of technology by parties wishing to extend the reach and impact of their behaviour.  It is the use of communication technologies to support repeated acts by an individual or group.  Acts carried out are intended to embarrass, humiliate or intimidate their victim.
Facts Over 40% of those bullied by way of information technology mediums are teenagers with internet access. Females are more likely than males to be targeted by way of harmful technological acts Currently the most common virtual locations for cyber bullying are chat rooms, social networking sites, e mail and instant message systems. Only 15% of those who experience this form of harassment seek help 60% of those who experience the act of cyber bullying experience this act in the home Psychological and emotional outcomes of cyber bullying are similar to that of being bullied face to face; however you may be able to end physical contact whereas the attempt to end cyber bullying is much more difficult. Of offenders interviewed most consider this act fun or instructive using this act as a means of trying to strengthening their victims.
Social Networking Service Social networking services are primarily used to aid in building social  relations.  Networks generally consist of individual profiles and or member representation  Networking sites currently used in the process of cyber bullying Bebo Facebook Formspring.me My Space Twitter Bebo and My Space Services now employ security officers to search account holder  profiles for inappropriate content, resulting in the freezing of a members account.
Forms of cyber bullying Sexting – the act of sending sexually explicit messages or photographs electronically primarily between mobile phones The story of Jessica LoganJessica Logan was an 18 year old teenager from Ohio. Her only crime was sending nude images of herself to her boyfriend’s mobile phone.When they broke up, he sent the images to other girls, who started harassing her, calling her a slut and a whore.Jessica, an only child, became miserable and depressed and stopped going to school.In May 2008 Jessica appeared on Cincinnati TV to tell her story "to make sure no one else will have to go through this again".Two months later, Jessica hanged herself in her bedroom. http://www.youtube.com/watch?v=VLTj3WBmY1k
Forms of cyber bullying General - threats and intimidation sent via e mail, networking sites, cellular phone and message boards. Cyber stalking – repeated and prolonged unwanted texting, e mail, or instant messaging whether explicitly offensive or not; online stalking involves the process of constantly monitoring a parties online activities. Defamation – the posting of upsetting or defamatory remarks as it pertains to an individual online, insults may be general or include prejudice or religious based bullying. Peer rejection or exclusion – the act of excluding someone by refusing to return or acknowledge messages. Unauthorized access and impersonation by way of identity theft – accessing and copying someone’s information, e.g. e mails, or pictures in order to harass or humiliate them.
Forms of cyber bullying Impersonation – by hacking into an individual account profile, parties are able to pretend to be the person whose account has been hacked. Sending or forwarding of private of personal information which include text, photograph and video. Manipulation – using online friendship status’ to suggest that a genuine friend would release personal information. Manipulation is also used by way of adults who have a sexual interest in children, to groom children adults have contacted them online in hopes of being able to set up a meeting. Gaming sites and virtual world – Live text or voice chat during online gaming, players repeatedly pick on weaker or less experienced players, at time killing their opponents players.
Targeted groups Youth aged 12 to 18, generally students Members of  various cultural and ethnic backgrounds Those with expressed sexual preference for the same sex Workplace employers Teachers Children under the age of 12 for the purposes of sexual exploitation Patrons with strong religious beliefs often designated to specified religious groups
The effects of cyber bullying Undermining of one’s confidence, self esteem and sense of security Limits social interactions, individuals choose to isolate themselves and avoid social forums Professional and peer interaction are impacted Distress – feeling highly anxious, unsafe and inadequate as a person Eating or sleeping disorders A desire to seek revenge Development of social phobias Self infliction of pain or scarring Loss of hope which may compound into a decision that life is not worth living http://www.cbsnews.com/video/watch/?id=6343317n&tag=related;photovideo
What can be done to prevent cyber bullying? Education and awareness of cyber bullying and its impact Promote the positive use of technology Place computers with internet access in an open space Never give out personal information such as passwords  Do not believe everything that you read Do not open a message from someone you do not know If it does not look or feel right it probably isn’t, trust your instincts
What can be done to prevent cyber bullying Do not erase or delete messages from cyber bullies as an investigation may lead you to your bully   Protect yourself, try not to arrange meetings with someone you met online Some anti virus programs such as McAffee offer chat messaging protection for both instant messaging and chat rooms Making the reporting of cyber bullying easier as it is often difficult for victims to  communicate this stress stopcyberbullying.org dedicated to prevention and counselling for those in need
Summary and Conclusion Technology is great as it provides a means to mass communication, social engagement and a wealth of insight and knowledge.  Though there are many positive facets, the misuse of technology through cyber bullying is painful for those targeted. Seeking an end to the hate epidemic deemed cyber bullying is an ongoing process as technology continues to evolve; however education is the first step in prevention
References Images  1 and 2 http://www.bing.com/images/search?q=cyber+bullying+pictures&FORM=BIFD#focal=8251eeff23d1e453bd7c66cd14bd3b8d&furl=http%3A%2F%2Fwww.cyberbullyalert.com%2Fblog%2Fwp-content%2Fuploads%2Fcyberbullying.jpg 3 http://ablogofourown.files.wordpress.com/2009/04/sexting.jpg 4 http://www.bing.com/images/search?q=cyber+bullying+pictures&FORM=BIFD#focal=2ce126f756d411680b4076a626ac64d3&furl=http%3A%2F%2Fwww.ryanpatrickhalligan.org%2Fimages%2Fcyber-bully.jpg 5 http://www.bing.com/images/search?q=questions&FORM=BIFD#focal=1b3c72bbe7b17cd03abe2f60d59c3e19&furl=http%3A%2F%2Fwww.freeclipartnow.com%2Fd%2F41525-2%2Fquestion-mark.jpg Video 1 http://www.youtube.com/watch?v=VLTj3WBmY1k 2 http://www.cbsnews.com/video/watch/?id=6343317n&tag=related;photovideo
References Definition http://en.wikipedia.org/wiki/Cyberbullying   Facts http://www.cyberbullyalert.com/blog/2008/08/cyber-bullying-statistics-that-may-shock-you/ Social Networking http://en.wikipedia.org/wiki/Social_networking_sites Forms of Cyber bullying/Targeted Groups/Effects/Prevention http://www.cyberbullyalert.com/blog/2008/08/cyber-bullying-statistics-that-may-shock-you/ http://www.puresight.com/Cyberbullying/o-and-onts-for-cyber-bullying-victims.html http://safety.lovetoknow.com/Cyber_Bullying_Statistics http://www.teachernet.gov.uk/wholeschool/behaviour/tacklingbullying/cyberbullying/understandingcyberbullying/formsofcyberbullying/ http://www.safesocialnetworking.com/img/safety/Cyberbullying_1.pdf http://www.youthlaw.asn.au/legalinfo/BullyingRacismReport.pdf
THANK YOU ARE THERE ANY QUESTIONS?

Weitere ähnliche Inhalte

Empfohlen

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Empfohlen (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Cyber Bullying

  • 1. CYBER BULLYING Marjon Ricketts April 14, 2010
  • 2. Table of Contents What is cyber bullying? Facts Social Networks used Different forms of cyber bullying? Targeted groups The effects of cyber bullying? What can be done to stop cyber bullying? Summary and Conclusion References
  • 3. Cyber bullying Cyber bullying is the harmful application of technology by parties wishing to extend the reach and impact of their behaviour. It is the use of communication technologies to support repeated acts by an individual or group. Acts carried out are intended to embarrass, humiliate or intimidate their victim.
  • 4. Facts Over 40% of those bullied by way of information technology mediums are teenagers with internet access. Females are more likely than males to be targeted by way of harmful technological acts Currently the most common virtual locations for cyber bullying are chat rooms, social networking sites, e mail and instant message systems. Only 15% of those who experience this form of harassment seek help 60% of those who experience the act of cyber bullying experience this act in the home Psychological and emotional outcomes of cyber bullying are similar to that of being bullied face to face; however you may be able to end physical contact whereas the attempt to end cyber bullying is much more difficult. Of offenders interviewed most consider this act fun or instructive using this act as a means of trying to strengthening their victims.
  • 5. Social Networking Service Social networking services are primarily used to aid in building social relations. Networks generally consist of individual profiles and or member representation Networking sites currently used in the process of cyber bullying Bebo Facebook Formspring.me My Space Twitter Bebo and My Space Services now employ security officers to search account holder profiles for inappropriate content, resulting in the freezing of a members account.
  • 6. Forms of cyber bullying Sexting – the act of sending sexually explicit messages or photographs electronically primarily between mobile phones The story of Jessica LoganJessica Logan was an 18 year old teenager from Ohio. Her only crime was sending nude images of herself to her boyfriend’s mobile phone.When they broke up, he sent the images to other girls, who started harassing her, calling her a slut and a whore.Jessica, an only child, became miserable and depressed and stopped going to school.In May 2008 Jessica appeared on Cincinnati TV to tell her story "to make sure no one else will have to go through this again".Two months later, Jessica hanged herself in her bedroom. http://www.youtube.com/watch?v=VLTj3WBmY1k
  • 7. Forms of cyber bullying General - threats and intimidation sent via e mail, networking sites, cellular phone and message boards. Cyber stalking – repeated and prolonged unwanted texting, e mail, or instant messaging whether explicitly offensive or not; online stalking involves the process of constantly monitoring a parties online activities. Defamation – the posting of upsetting or defamatory remarks as it pertains to an individual online, insults may be general or include prejudice or religious based bullying. Peer rejection or exclusion – the act of excluding someone by refusing to return or acknowledge messages. Unauthorized access and impersonation by way of identity theft – accessing and copying someone’s information, e.g. e mails, or pictures in order to harass or humiliate them.
  • 8. Forms of cyber bullying Impersonation – by hacking into an individual account profile, parties are able to pretend to be the person whose account has been hacked. Sending or forwarding of private of personal information which include text, photograph and video. Manipulation – using online friendship status’ to suggest that a genuine friend would release personal information. Manipulation is also used by way of adults who have a sexual interest in children, to groom children adults have contacted them online in hopes of being able to set up a meeting. Gaming sites and virtual world – Live text or voice chat during online gaming, players repeatedly pick on weaker or less experienced players, at time killing their opponents players.
  • 9. Targeted groups Youth aged 12 to 18, generally students Members of various cultural and ethnic backgrounds Those with expressed sexual preference for the same sex Workplace employers Teachers Children under the age of 12 for the purposes of sexual exploitation Patrons with strong religious beliefs often designated to specified religious groups
  • 10. The effects of cyber bullying Undermining of one’s confidence, self esteem and sense of security Limits social interactions, individuals choose to isolate themselves and avoid social forums Professional and peer interaction are impacted Distress – feeling highly anxious, unsafe and inadequate as a person Eating or sleeping disorders A desire to seek revenge Development of social phobias Self infliction of pain or scarring Loss of hope which may compound into a decision that life is not worth living http://www.cbsnews.com/video/watch/?id=6343317n&tag=related;photovideo
  • 11. What can be done to prevent cyber bullying? Education and awareness of cyber bullying and its impact Promote the positive use of technology Place computers with internet access in an open space Never give out personal information such as passwords Do not believe everything that you read Do not open a message from someone you do not know If it does not look or feel right it probably isn’t, trust your instincts
  • 12. What can be done to prevent cyber bullying Do not erase or delete messages from cyber bullies as an investigation may lead you to your bully Protect yourself, try not to arrange meetings with someone you met online Some anti virus programs such as McAffee offer chat messaging protection for both instant messaging and chat rooms Making the reporting of cyber bullying easier as it is often difficult for victims to communicate this stress stopcyberbullying.org dedicated to prevention and counselling for those in need
  • 13. Summary and Conclusion Technology is great as it provides a means to mass communication, social engagement and a wealth of insight and knowledge. Though there are many positive facets, the misuse of technology through cyber bullying is painful for those targeted. Seeking an end to the hate epidemic deemed cyber bullying is an ongoing process as technology continues to evolve; however education is the first step in prevention
  • 14. References Images 1 and 2 http://www.bing.com/images/search?q=cyber+bullying+pictures&FORM=BIFD#focal=8251eeff23d1e453bd7c66cd14bd3b8d&furl=http%3A%2F%2Fwww.cyberbullyalert.com%2Fblog%2Fwp-content%2Fuploads%2Fcyberbullying.jpg 3 http://ablogofourown.files.wordpress.com/2009/04/sexting.jpg 4 http://www.bing.com/images/search?q=cyber+bullying+pictures&FORM=BIFD#focal=2ce126f756d411680b4076a626ac64d3&furl=http%3A%2F%2Fwww.ryanpatrickhalligan.org%2Fimages%2Fcyber-bully.jpg 5 http://www.bing.com/images/search?q=questions&FORM=BIFD#focal=1b3c72bbe7b17cd03abe2f60d59c3e19&furl=http%3A%2F%2Fwww.freeclipartnow.com%2Fd%2F41525-2%2Fquestion-mark.jpg Video 1 http://www.youtube.com/watch?v=VLTj3WBmY1k 2 http://www.cbsnews.com/video/watch/?id=6343317n&tag=related;photovideo
  • 15. References Definition http://en.wikipedia.org/wiki/Cyberbullying   Facts http://www.cyberbullyalert.com/blog/2008/08/cyber-bullying-statistics-that-may-shock-you/ Social Networking http://en.wikipedia.org/wiki/Social_networking_sites Forms of Cyber bullying/Targeted Groups/Effects/Prevention http://www.cyberbullyalert.com/blog/2008/08/cyber-bullying-statistics-that-may-shock-you/ http://www.puresight.com/Cyberbullying/o-and-onts-for-cyber-bullying-victims.html http://safety.lovetoknow.com/Cyber_Bullying_Statistics http://www.teachernet.gov.uk/wholeschool/behaviour/tacklingbullying/cyberbullying/understandingcyberbullying/formsofcyberbullying/ http://www.safesocialnetworking.com/img/safety/Cyberbullying_1.pdf http://www.youthlaw.asn.au/legalinfo/BullyingRacismReport.pdf
  • 16. THANK YOU ARE THERE ANY QUESTIONS?