SlideShare ist ein Scribd-Unternehmen logo
1 von 16
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SOURCE: U.S. Department of Justice, Bureau of Justice Statistics, School Crime Supplement (SCS) to the National Crime Victimization Survey, 2007.
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Transient identiti Truth About Social for Teens
Transient identiti   Truth About Social for TeensTransient identiti   Truth About Social for Teens
Transient identiti Truth About Social for Teens
IdentitiLab
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
pa21raym
 
MRP Research Proposal - N.Reyhani copy
MRP Research Proposal - N.Reyhani copyMRP Research Proposal - N.Reyhani copy
MRP Research Proposal - N.Reyhani copy
Nicolette Reyhani
 
Marsali Hancock - iKeepSafe Presentation
Marsali Hancock - iKeepSafe PresentationMarsali Hancock - iKeepSafe Presentation
Marsali Hancock - iKeepSafe Presentation
Sammy Hislop
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
dh24gold
 
Cyberbullying class 97
Cyberbullying class 97Cyberbullying class 97
Cyberbullying class 97
herbison
 

Was ist angesagt? (20)

Transient identiti Truth About Social for Teens
Transient identiti   Truth About Social for TeensTransient identiti   Truth About Social for Teens
Transient identiti Truth About Social for Teens
 
Inormation Literacy Paper
Inormation Literacy PaperInormation Literacy Paper
Inormation Literacy Paper
 
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
 
Abney & Associates Technology Updates: Sheriff’s forum to open eyes of parent...
Abney & Associates Technology Updates: Sheriff’s forum to open eyes of parent...Abney & Associates Technology Updates: Sheriff’s forum to open eyes of parent...
Abney & Associates Technology Updates: Sheriff’s forum to open eyes of parent...
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Networked Privacy in the Age of Surveillance, Sousveillance, Coveillance
Networked Privacy in the Age of Surveillance, Sousveillance, CoveillanceNetworked Privacy in the Age of Surveillance, Sousveillance, Coveillance
Networked Privacy in the Age of Surveillance, Sousveillance, Coveillance
 
Digital Politics: Pew Research findings on technology and campaign 2012
Digital Politics: Pew Research findings on technology and campaign 2012Digital Politics: Pew Research findings on technology and campaign 2012
Digital Politics: Pew Research findings on technology and campaign 2012
 
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji... 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Internet in Schools
Internet in SchoolsInternet in Schools
Internet in Schools
 
MRP Research Proposal - N.Reyhani copy
MRP Research Proposal - N.Reyhani copyMRP Research Proposal - N.Reyhani copy
MRP Research Proposal - N.Reyhani copy
 
Flipbook
FlipbookFlipbook
Flipbook
 
Role of Information Technology in Social Society Cyber Bullying as a Contempo...
Role of Information Technology in Social Society Cyber Bullying as a Contempo...Role of Information Technology in Social Society Cyber Bullying as a Contempo...
Role of Information Technology in Social Society Cyber Bullying as a Contempo...
 
Marsali Hancock - iKeepSafe Presentation
Marsali Hancock - iKeepSafe PresentationMarsali Hancock - iKeepSafe Presentation
Marsali Hancock - iKeepSafe Presentation
 
Internet harassment and bullying behaviors: Implications for youth development
Internet harassment and bullying behaviors: Implications for youth developmentInternet harassment and bullying behaviors: Implications for youth development
Internet harassment and bullying behaviors: Implications for youth development
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
 
Bullying and harassment in the context of emerging technologies
Bullying and harassment in the context of emerging technologiesBullying and harassment in the context of emerging technologies
Bullying and harassment in the context of emerging technologies
 
NSBA2010
NSBA2010NSBA2010
NSBA2010
 
Cyberbullying class 97
Cyberbullying class 97Cyberbullying class 97
Cyberbullying class 97
 

Andere mochten auch (10)

Cyber Dangers
Cyber DangersCyber Dangers
Cyber Dangers
 
ILG CERT Presentation Final
ILG CERT Presentation FinalILG CERT Presentation Final
ILG CERT Presentation Final
 
[UniInfo 2014] Cost of cyber crime and how to prevent it
[UniInfo 2014] Cost of cyber crime and how to prevent it[UniInfo 2014] Cost of cyber crime and how to prevent it
[UniInfo 2014] Cost of cyber crime and how to prevent it
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Ähnlich wie Integrating technology1

Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
Ray Brannon
 
Glass RM Spring 2016 Final
Glass RM Spring 2016 FinalGlass RM Spring 2016 Final
Glass RM Spring 2016 Final
Elizabeth Glass
 
Running head FINAL PAPER .docx
 Running head FINAL PAPER                                      .docx Running head FINAL PAPER                                      .docx
Running head FINAL PAPER .docx
MARRY7
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
alanrgibson41217
 
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxIs Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
christiandean12115
 
BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16
BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16
BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16
VannaSchrader3
 
Powerpoint SB
Powerpoint SBPowerpoint SB
Powerpoint SB
brawl1sl
 
International Forum of Educational Technology & SocietyMid.docx
International Forum of Educational Technology & SocietyMid.docxInternational Forum of Educational Technology & SocietyMid.docx
International Forum of Educational Technology & SocietyMid.docx
LaticiaGrissomzz
 
Module 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review PaperModule 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review Paper
Meghan.V
 

Ähnlich wie Integrating technology1 (20)

Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Glass RM Spring 2016 Final
Glass RM Spring 2016 FinalGlass RM Spring 2016 Final
Glass RM Spring 2016 Final
 
Running head FINAL PAPER .docx
 Running head FINAL PAPER                                      .docx Running head FINAL PAPER                                      .docx
Running head FINAL PAPER .docx
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Essays On Cyber Bullying
Essays On Cyber BullyingEssays On Cyber Bullying
Essays On Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxIs Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
 
Cyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells UsCyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells Us
 
Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…
 
Thurston
ThurstonThurston
Thurston
 
BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16
BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16
BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Week 5
Week 5Week 5
Week 5
 
Powerpoint SB
Powerpoint SBPowerpoint SB
Powerpoint SB
 
Cyberbullying: Advice for Schools
Cyberbullying: Advice for SchoolsCyberbullying: Advice for Schools
Cyberbullying: Advice for Schools
 
International Forum of Educational Technology & SocietyMid.docx
International Forum of Educational Technology & SocietyMid.docxInternational Forum of Educational Technology & SocietyMid.docx
International Forum of Educational Technology & SocietyMid.docx
 
Essay On Violence In Schools
Essay On Violence In SchoolsEssay On Violence In Schools
Essay On Violence In Schools
 
Presentation1
Presentation1Presentation1
Presentation1
 
Module 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review PaperModule 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review Paper
 

Integrating technology1

  • 1.  
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. SOURCE: U.S. Department of Justice, Bureau of Justice Statistics, School Crime Supplement (SCS) to the National Crime Victimization Survey, 2007.
  • 15.
  • 16.