SlideShare ist ein Scribd-Unternehmen logo
1 von 17
WHAT PARENTS NEED TO KNOW
CYBER BULLYING
Presented by Jill Sooy
What is Cyber Bullying?
 Cyber bullying involves sending or posting
harmful or cruel text or images using the
Internet (instant messaging, e-mails, chat
rooms, or social networking sites) or other
digital communication devices such as cell
phones. It can involve stalking, threats,
harassment, impersonation, humiliation,
trickery, and exclusion.
The Facts:
 93% of teens 12-17 go online
 63% of online teens go online daily
 89% on online teen go online from home, and most of
them go online from home most often.
 77% go online at school
 71% go online from friends or relatives homes
 60% go online from a library
 27% go online from their mobile phone
 76% of household with teens go online via broadband,
10% via dial up, and 12% do not have access at home.
Teen Connections
 75% of teens have a cell phone
 No gender or race/ethnic differences in ownership
 50% of teens with phones talk to friends daily
 54% of teens send test messages daily
 27% use their phone to go online
 73% of teens use an online social network site
 37% of SNS users send messages through social
networks daily
 80% of teens have a game console
 51% of teens have a portable gaming device
 Teens connect and interact with others online through games
Bullying Statistics
 42% of kids have been bullied online. 1 in 4 have
had it happen more than once.
 35% have been threatened. Nearly 1 in 5 have
had it happen more than once.
 21% have received mean or threatening e-mail.
 53% admit having said something hurtful to
another person online.
 58% have not told their parents about something
hurtful done to them online.
 Based on 2004 i-SAFE survey on 1500 students in grades 1-4
Quiz for Parents
 Do you know what this means?
WUF
RUUP4IT
PAW
P911
MOTOS
IPN
What Parents Can Do to Help
 Talk with kids about risks of the Internet
 Learn what kids are doing on line and keep
track of online behavior
 Become familiar with sites kids visit (My
Space, Facebook,Twitter, etc.)
 Remind them to never give out personal info
 Remind kids they should never meet face-to-
face with someone they meet online.
Continued…
 Share examples of inappropriate incidents
that can happen online
 Communicate online rules to kids and enforce
rules with consequences
 Keep computers in a place where online
activity is hard to hide
 Explain that cyber bullies aren’t always
anonymous; they can be traced and located
 Use parental controls & tracking programs
What To Do if
Your Child is Bullied
 Be aware of warning signs
 Reluctance to use the computer
 Change in mood or behavior
 Reluctance to go to school
 Poor school performance
 Be alert that your child could be bullying
others
 Document any bullying
What To Do Continued…
 Tell child you won’t blame them if bullied.
 One main reason kids don’t tell adults is fear of
losing computer privileges
 Contact the school to seek help from school
psychologist, counselor, and principal
 File a complaint with the web site, ISP, or cell
phone company
 Contact the police if the cyber bullying
includes threats
What Kids Need to Know
 Never give out personal information online
 Do not tell anyone you password, even
friends
 Do not retaliate
 It can escalate the harassment & make it unclear
who was the aggressor
 Tell the bully to stop or ignore
 Make hard copies
 Show and adult before deleting anything
Continued…
 Block future communication and clean up
buddy lists
 Do not say anything online you are not
comfortable having other people know
 If a friend cyber bullies, tell them to stop
School Response
 Incorporate cyber bullying into all relevant
school policies
 Bullying
 Harassment
 Internet and cell phone policies
 Determine the extent of cyber bullying in the
school population
 Educate staff members, students, and
parents about cyber bullying
School Response continued…
 Closely monitor students’ computer use at
school. Use filtering and tracking software.
 Teach student internet safety
 Investigate all reports of cyber bullying NOW
 Support student who are victims
 Understand legal obligations and restrictions
 Contact police if acts involve threats,
extortion, harassment, or hate crimes
Cyber Bullying Effects
on Health
 Sleep disturbances
 Feelings of sadness or anger
 Stomach pain
 Headaches
 Anxiety
 Depression
 Substance abuse
 Suicidal thoughts
Cyber Bullying Effects on
School Performance
 Absenteeism
 Behavior problems
 Lack of confidence
 Declining performance in the classroom
 Limited goals for the future and decreased
desire to do well
Conclusion
 Ryan Halligan’s story and short video clip
 FinalThoughts
 Questions and Answers

Weitere ähnliche Inhalte

Was ist angesagt?

Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaamiliarguelles
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaasofisalazar00
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying estegiulimazziotti96
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngmiliarguelles1
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyinglheikkila
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying PresentationMegan Townes
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingsmeech
 
Digital Parenting Infographic
Digital Parenting InfographicDigital Parenting Infographic
Digital Parenting InfographicuKnow.com
 
Cyberbullying tips from connect safely
Cyberbullying tips from connect safelyCyberbullying tips from connect safely
Cyberbullying tips from connect safelyCurso RRSS
 
Statistics and salient information
Statistics and salient informationStatistics and salient information
Statistics and salient informationsmithmpa
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 

Was ist angesagt? (19)

Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying este
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Parents must know about cyber bullying 2
Parents must know about cyber bullying  2Parents must know about cyber bullying  2
Parents must know about cyber bullying 2
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Safety @ Cyber
Safety @ CyberSafety @ Cyber
Safety @ Cyber
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying Presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
 
Digital Parenting Infographic
Digital Parenting InfographicDigital Parenting Infographic
Digital Parenting Infographic
 
Parents must know about cyber bullying 1
Parents must know about cyber bullying 1Parents must know about cyber bullying 1
Parents must know about cyber bullying 1
 
Cyberbullying tips from connect safely
Cyberbullying tips from connect safelyCyberbullying tips from connect safely
Cyberbullying tips from connect safely
 
Statistics and salient information
Statistics and salient informationStatistics and salient information
Statistics and salient information
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 

Ähnlich wie Inservice cyberbullyingpwpt

Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaAndri Priyatna
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eveSimonBalle
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet SafetyMark Deming
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safetyrehmannb
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010adewolfe
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents PresentationToby Treacher
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safelysam31
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson Martinez
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngmiliarguelles1
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trElmer Sunga
 

Ähnlich wie Inservice cyberbullyingpwpt (20)

Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
Cyberbully
CyberbullyCyberbully
Cyberbully
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safety
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshare
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-tr
 

Kürzlich hochgeladen

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Kürzlich hochgeladen (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Inservice cyberbullyingpwpt

  • 1. WHAT PARENTS NEED TO KNOW CYBER BULLYING Presented by Jill Sooy
  • 2. What is Cyber Bullying?  Cyber bullying involves sending or posting harmful or cruel text or images using the Internet (instant messaging, e-mails, chat rooms, or social networking sites) or other digital communication devices such as cell phones. It can involve stalking, threats, harassment, impersonation, humiliation, trickery, and exclusion.
  • 3. The Facts:  93% of teens 12-17 go online  63% of online teens go online daily  89% on online teen go online from home, and most of them go online from home most often.  77% go online at school  71% go online from friends or relatives homes  60% go online from a library  27% go online from their mobile phone  76% of household with teens go online via broadband, 10% via dial up, and 12% do not have access at home.
  • 4. Teen Connections  75% of teens have a cell phone  No gender or race/ethnic differences in ownership  50% of teens with phones talk to friends daily  54% of teens send test messages daily  27% use their phone to go online  73% of teens use an online social network site  37% of SNS users send messages through social networks daily  80% of teens have a game console  51% of teens have a portable gaming device  Teens connect and interact with others online through games
  • 5. Bullying Statistics  42% of kids have been bullied online. 1 in 4 have had it happen more than once.  35% have been threatened. Nearly 1 in 5 have had it happen more than once.  21% have received mean or threatening e-mail.  53% admit having said something hurtful to another person online.  58% have not told their parents about something hurtful done to them online.  Based on 2004 i-SAFE survey on 1500 students in grades 1-4
  • 6. Quiz for Parents  Do you know what this means? WUF RUUP4IT PAW P911 MOTOS IPN
  • 7. What Parents Can Do to Help  Talk with kids about risks of the Internet  Learn what kids are doing on line and keep track of online behavior  Become familiar with sites kids visit (My Space, Facebook,Twitter, etc.)  Remind them to never give out personal info  Remind kids they should never meet face-to- face with someone they meet online.
  • 8. Continued…  Share examples of inappropriate incidents that can happen online  Communicate online rules to kids and enforce rules with consequences  Keep computers in a place where online activity is hard to hide  Explain that cyber bullies aren’t always anonymous; they can be traced and located  Use parental controls & tracking programs
  • 9. What To Do if Your Child is Bullied  Be aware of warning signs  Reluctance to use the computer  Change in mood or behavior  Reluctance to go to school  Poor school performance  Be alert that your child could be bullying others  Document any bullying
  • 10. What To Do Continued…  Tell child you won’t blame them if bullied.  One main reason kids don’t tell adults is fear of losing computer privileges  Contact the school to seek help from school psychologist, counselor, and principal  File a complaint with the web site, ISP, or cell phone company  Contact the police if the cyber bullying includes threats
  • 11. What Kids Need to Know  Never give out personal information online  Do not tell anyone you password, even friends  Do not retaliate  It can escalate the harassment & make it unclear who was the aggressor  Tell the bully to stop or ignore  Make hard copies  Show and adult before deleting anything
  • 12. Continued…  Block future communication and clean up buddy lists  Do not say anything online you are not comfortable having other people know  If a friend cyber bullies, tell them to stop
  • 13. School Response  Incorporate cyber bullying into all relevant school policies  Bullying  Harassment  Internet and cell phone policies  Determine the extent of cyber bullying in the school population  Educate staff members, students, and parents about cyber bullying
  • 14. School Response continued…  Closely monitor students’ computer use at school. Use filtering and tracking software.  Teach student internet safety  Investigate all reports of cyber bullying NOW  Support student who are victims  Understand legal obligations and restrictions  Contact police if acts involve threats, extortion, harassment, or hate crimes
  • 15. Cyber Bullying Effects on Health  Sleep disturbances  Feelings of sadness or anger  Stomach pain  Headaches  Anxiety  Depression  Substance abuse  Suicidal thoughts
  • 16. Cyber Bullying Effects on School Performance  Absenteeism  Behavior problems  Lack of confidence  Declining performance in the classroom  Limited goals for the future and decreased desire to do well
  • 17. Conclusion  Ryan Halligan’s story and short video clip  FinalThoughts  Questions and Answers