SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Cyberbullying
    By Josie Day
What is cyberbullying?
  Cyberbullying is when a student use the
       internet, cell phones, or other
 technological devices to send or post text
  or images intended to hurt, embarrass,
threaten, torment, humiliate, or intimidate
                their victim.
Cyberbullying Tactics
Gossip: posting or sending cruel gossip to damage a person’s reputation and relationships with others

Exclusion: deliberately excluding someone from an online group
Impersonation: breaking into someone’s online account and sending messages or making post that will
cause embarrassment or damage to the person’s reputation and affect his or her relationships with
others

Harassment: repeatedly posting or sending offensive, rude, and insulting messages or posts

Cyberstalking: posting or sending unwanted or intimidating messages, which may include threats

Flaming: online fights where scornful and offensive messages are posted on websites, forums, or blogs

Outing and Trickery: tricking someone into revealing secrets or embarrassing information, which is then
shared online

Cyberthreats: remarks on the internet threatening or implying violent behavior, displaying suicidal
tendencies
Students Take on Cyberbullying
http://www.youtube.com/watch?v=3WoP0y3Syl
Q
What are the effects of Cyberbullying?
•   Hurt Feelings
•   Sadness
•   Anxiety
•   Depression
•   Anger
•   Shame
•   Fear
•   Frustration
•   Low Self Esteem
•   Trust Issues
•   Poor academic performance
•   Suicide
•   Bullying others
Why is cyberbullying so hurtful?
Cyberbullying is more harmful than face-to-face bullying for many reasons:
• Permanence: The insults, comments or images can be preserved by the
   person who was bullied or by others so that the victim may read or view
   them over and over again and the harm is re-inflicted with each reading or
   viewing.
• Audience size: The size of the audience that is able to view or access the
   damaging material increases the victim’s humiliation.
• Familiarity: Many young people are friends with or know their cyber bully
   either through school or other personal connections, increasing the
   potential for embarrassment and humiliation.
• Social Networking: Social networking sites such as Facebook and MySpace
   allow cyber bullies to engage in campaigns against a particular person
   which may involve many others.
• Speed: The speed at which harmful messages can reach large audiences
   also plays a major part in making cyberbullying so damaging to the targets.
Cyberbullying 101
http://www.youtube.com/watch?feature=player
_embedded&v=0iwWxGNAMr0#!
Rachael Neblett
Rachael Neblett, a seventeen-year old student at Bullitt East High School. At less than 5 feet tall, her
small stature was an advantage in gymnastics and cheerleading. It seemed Rachael could tell her
parents anything. Or so they thought.

Because of her small size, Rachael was an easy target for bullies. In the summer of 2006, she began
receiving threatening emails through her MySpace account. Rachael would keep this from her
parents, maybe fearing they would make her close her MySpace account, or maybe she didn't want
them to worry.

The emails were not the usual type of bullying. These notes had a stalking terroristic nature. Also,
the person sending the emails was anonymous. Why Rachael kept going back and reading the
emails no one will ever know. Maybe the fear of the unknown was worse than knowing the threat.
Mark and Donna didn't ignore the problem. They went into action, taking the emails to the principal
at Bullitt East High School. It was obvious that the bully was another student at the school, since the
emails contained details of her movements during class and after school. The bully knew when she
caught the bus and where she lived. The principal had school officials watch Rachael as she got off
the bus and walked to class. But this did nothing to relieve Rachael's fear.

Desperation came early in October when Rachael received an email stating " I am not going to put
you in the hospital, I am going to put you in the morgue." After receiving that email, Rachael did not
want to go to school or go out with her friends.

On October 9, shortly after receiving the threatening email, Rachael took her own life.

Since Rachael had been receiving threats, her death was put under investigation by the Mt.
Washington police. In the end, it was ruled a suicide. The toxicology report show no drugs or
alcohol. No chemical reason for depression.

Mark and Donna feel certain that it was the cyberstalking that caused Rachael to end her life. No
person was ever arrested. Even though the police know the computer from which the emails were
sent there was not enough evidence to press charges
How to help prevent
   cyberbullying?
Encourage your students to…
• Block all communication with cyberbullies
• Do not forward any messages, comments, etc.
  that involve cyberbulling
• Always report any cyberbulling taking place to an
  adult
• Educate your students about the damages of
  cyberbullyig
How to prevent cyberbullying
             continued…
Encourage parents to…
• Get involved in their child’s cyberspace
• Open an account wherever your child has an
  account
• Know all your child’s passwords in order to
  have access to all your child’s accounts
• Check in weekly on your child’s Facebook page
  or other social media pages
References
• www.ncpc.org
• http://www.niot.org/front
• http://www.internetsafety101.org/cyberbullying.
  htm
• http://www.makeadifferenceforkids.org/index.ph
  p?id=8
• http://www.puresight.com/Cyberbullying/the-
  dangers-of-cyber-bullying.html
• Google Images

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
br03wood
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
TeamBanana
 
Bully presentation
Bully presentationBully presentation
Bully presentation
jay mckey
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
Sally Garza
 
Bullying Powerpoint
Bullying PowerpointBullying Powerpoint
Bullying Powerpoint
USAteacher
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
shannonmf
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
caitlynx48
 

Was ist angesagt? (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Bully presentation
Bully presentationBully presentation
Bully presentation
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
Bullying Powerpoint
Bullying PowerpointBullying Powerpoint
Bullying Powerpoint
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentation
 
Bullying In Schools Educ 350
Bullying In Schools Educ 350Bullying In Schools Educ 350
Bullying In Schools Educ 350
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 

Andere mochten auch

Bullying virtual
Bullying virtualBullying virtual
Bullying virtual
iesfa
 
Outfoxed
OutfoxedOutfoxed
Outfoxed
bganter
 
Agenda Setting Theory
Agenda Setting TheoryAgenda Setting Theory
Agenda Setting Theory
TaylerEaston
 
Research thesis (effects of bullying)
Research thesis (effects of bullying)Research thesis (effects of bullying)
Research thesis (effects of bullying)
frncsm13
 
Representation of gender and stereotypes
Representation of gender and stereotypesRepresentation of gender and stereotypes
Representation of gender and stereotypes
Liz Davies
 

Andere mochten auch (20)

CyberBullying
CyberBullyingCyberBullying
CyberBullying
 
Bullying
BullyingBullying
Bullying
 
Bullying virtual
Bullying virtualBullying virtual
Bullying virtual
 
Bullying verbal
Bullying verbalBullying verbal
Bullying verbal
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Unit 1 Representations
Unit 1 RepresentationsUnit 1 Representations
Unit 1 Representations
 
Outfoxed
OutfoxedOutfoxed
Outfoxed
 
Representation of Women in Disney
Representation of Women in DisneyRepresentation of Women in Disney
Representation of Women in Disney
 
Representation slideshare
Representation slideshareRepresentation slideshare
Representation slideshare
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
 
Microsoft Power Point Bullying
Microsoft Power Point   BullyingMicrosoft Power Point   Bullying
Microsoft Power Point Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Bullying
BullyingBullying
Bullying
 
Bullying apresentação
Bullying apresentaçãoBullying apresentação
Bullying apresentação
 
Trabalho sobre bullying
Trabalho sobre bullyingTrabalho sobre bullying
Trabalho sobre bullying
 
Dystopian Genre
Dystopian GenreDystopian Genre
Dystopian Genre
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Agenda Setting Theory
Agenda Setting TheoryAgenda Setting Theory
Agenda Setting Theory
 
Research thesis (effects of bullying)
Research thesis (effects of bullying)Research thesis (effects of bullying)
Research thesis (effects of bullying)
 
Representation of gender and stereotypes
Representation of gender and stereotypesRepresentation of gender and stereotypes
Representation of gender and stereotypes
 

Ähnlich wie Cyberbullying powerpoint

What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentation
Sally Garza
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying Presentation
Megan Townes
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
adewolfe
 
Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jf
John Field
 

Ähnlich wie Cyberbullying powerpoint (20)

School Cyber Bullying Among Students .pptx.pptx
School Cyber Bullying Among Students .pptx.pptxSchool Cyber Bullying Among Students .pptx.pptx
School Cyber Bullying Among Students .pptx.pptx
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying Presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cbp
CbpCbp
Cbp
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
Geek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingGeek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® Cyberbullying
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Digital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyDigital Citizenship by Mann Rentoy
Digital Citizenship by Mann Rentoy
 
Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By Anamika
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The Internet
 
Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jf
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Pencegahan Cyberbullying saat Sekolah Daring
Pencegahan Cyberbullying saat Sekolah DaringPencegahan Cyberbullying saat Sekolah Daring
Pencegahan Cyberbullying saat Sekolah Daring
 
FAQ's About Cyberbulling
FAQ's About CyberbullingFAQ's About Cyberbulling
FAQ's About Cyberbulling
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

Cyberbullying powerpoint

  • 1. Cyberbullying By Josie Day
  • 2. What is cyberbullying? Cyberbullying is when a student use the internet, cell phones, or other technological devices to send or post text or images intended to hurt, embarrass, threaten, torment, humiliate, or intimidate their victim.
  • 3. Cyberbullying Tactics Gossip: posting or sending cruel gossip to damage a person’s reputation and relationships with others Exclusion: deliberately excluding someone from an online group Impersonation: breaking into someone’s online account and sending messages or making post that will cause embarrassment or damage to the person’s reputation and affect his or her relationships with others Harassment: repeatedly posting or sending offensive, rude, and insulting messages or posts Cyberstalking: posting or sending unwanted or intimidating messages, which may include threats Flaming: online fights where scornful and offensive messages are posted on websites, forums, or blogs Outing and Trickery: tricking someone into revealing secrets or embarrassing information, which is then shared online Cyberthreats: remarks on the internet threatening or implying violent behavior, displaying suicidal tendencies
  • 4. Students Take on Cyberbullying http://www.youtube.com/watch?v=3WoP0y3Syl Q
  • 5. What are the effects of Cyberbullying? • Hurt Feelings • Sadness • Anxiety • Depression • Anger • Shame • Fear • Frustration • Low Self Esteem • Trust Issues • Poor academic performance • Suicide • Bullying others
  • 6. Why is cyberbullying so hurtful? Cyberbullying is more harmful than face-to-face bullying for many reasons: • Permanence: The insults, comments or images can be preserved by the person who was bullied or by others so that the victim may read or view them over and over again and the harm is re-inflicted with each reading or viewing. • Audience size: The size of the audience that is able to view or access the damaging material increases the victim’s humiliation. • Familiarity: Many young people are friends with or know their cyber bully either through school or other personal connections, increasing the potential for embarrassment and humiliation. • Social Networking: Social networking sites such as Facebook and MySpace allow cyber bullies to engage in campaigns against a particular person which may involve many others. • Speed: The speed at which harmful messages can reach large audiences also plays a major part in making cyberbullying so damaging to the targets.
  • 8. Rachael Neblett Rachael Neblett, a seventeen-year old student at Bullitt East High School. At less than 5 feet tall, her small stature was an advantage in gymnastics and cheerleading. It seemed Rachael could tell her parents anything. Or so they thought. Because of her small size, Rachael was an easy target for bullies. In the summer of 2006, she began receiving threatening emails through her MySpace account. Rachael would keep this from her parents, maybe fearing they would make her close her MySpace account, or maybe she didn't want them to worry. The emails were not the usual type of bullying. These notes had a stalking terroristic nature. Also, the person sending the emails was anonymous. Why Rachael kept going back and reading the emails no one will ever know. Maybe the fear of the unknown was worse than knowing the threat. Mark and Donna didn't ignore the problem. They went into action, taking the emails to the principal at Bullitt East High School. It was obvious that the bully was another student at the school, since the emails contained details of her movements during class and after school. The bully knew when she caught the bus and where she lived. The principal had school officials watch Rachael as she got off the bus and walked to class. But this did nothing to relieve Rachael's fear. Desperation came early in October when Rachael received an email stating " I am not going to put you in the hospital, I am going to put you in the morgue." After receiving that email, Rachael did not want to go to school or go out with her friends. On October 9, shortly after receiving the threatening email, Rachael took her own life. Since Rachael had been receiving threats, her death was put under investigation by the Mt. Washington police. In the end, it was ruled a suicide. The toxicology report show no drugs or alcohol. No chemical reason for depression. Mark and Donna feel certain that it was the cyberstalking that caused Rachael to end her life. No person was ever arrested. Even though the police know the computer from which the emails were sent there was not enough evidence to press charges
  • 9. How to help prevent cyberbullying? Encourage your students to… • Block all communication with cyberbullies • Do not forward any messages, comments, etc. that involve cyberbulling • Always report any cyberbulling taking place to an adult • Educate your students about the damages of cyberbullyig
  • 10. How to prevent cyberbullying continued… Encourage parents to… • Get involved in their child’s cyberspace • Open an account wherever your child has an account • Know all your child’s passwords in order to have access to all your child’s accounts • Check in weekly on your child’s Facebook page or other social media pages
  • 11. References • www.ncpc.org • http://www.niot.org/front • http://www.internetsafety101.org/cyberbullying. htm • http://www.makeadifferenceforkids.org/index.ph p?id=8 • http://www.puresight.com/Cyberbullying/the- dangers-of-cyber-bullying.html • Google Images