SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Cyberbullying
What is cyberbullying? Cyberbullying in any kind of negative virtual communication.
There are many ways to bully someone other than just sending them a message.
Ways of Cyberbullying ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Instant messaging Sending threatening messages through IM’s or texting.  Sending warning messages not to tell on them. Creating screen names that are 1 letter away from someone else’s screen name and sending offensive messages Texting wars and death threats
Stealing passwords Student’s may steal passwords and access other’s accounts to send offensive messages to anger them. Students may gain access to an account and then change the settings to lock them out.
Blogs Blogs are used as online journals to write damaging thing about someone’s reputation.
Web Sites Web sites are created to insult another student or a group of students.  Students also post pictures and personal information about other students.
Sending pictures through cell phones and email Sending degrading photos through e-mails; the emails can then be passed around to hundreds of emails within hours. New cell phones are now able to send photos and can be spread to an entire address book at once.
Sending Malicious Code Student send viruses, spyware and hacking programs to other computers as a form of harassment. Some programs can even give the student access to a victims computer.
Impersonation When a student impersonates another students they usually do this in a chat room.  The students reveals personal information that could include name, address and phone number.  This could lead to an attack on the victim.
Prevention Understand that teasing, threats and taking over someone’s identity are all forms of bullying. If this happens to you report the behaviors to an adult. Parents
Parents Tell you parents. Parents need to inform you school counselor of the cyberbullying. Parents need to tell your doctor. It may be necessary to have counseling until the problems are resolved. Netiquette
[object Object],[object Object],[object Object],Go to Quiz
[object Object],[object Object],[object Object],[object Object]
Go read for the answer again. Read here
Instant messaging Sending threatening messages through IM’s or texting.  Sending warning messages not to tell on them. Creating screen names that are 1 letter away from someone else’s screen name and sending offensive messages Texting wars and death threats Go back to question
NEXT QUESTION
[object Object],[object Object],[object Object],[object Object]
Go read for the answer again. Read here
Stealing passwords Student’s may steal passwords and access other’s accounts to send offensive messages to anger them. Students may gain access to an account and then change the settings to lock them out.  Go back to question
NEXT QUESTION
[object Object],[object Object],[object Object],[object Object]
Go read for the answer again. Read here
Web Sites Web sites are created to insult another student or a group of students.  Students also post pictures and personal information about other students.  Go back to question
NEXT QUESTION
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Go read for the answer again. Read here
Sending pictures through cell phones and email Sending degrading photos through e-mails; the emails can then be passed around to hundreds of emails within hours. New cell phones are now able to send photos and can be spread to an entire address book at once.  Go back to question
NEXT QUESTION
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Go read for the answer again. Read here
Sending Malicious Code Student send viruses, spyware and hacking programs to other computers as a form of harassment. Some programs can even give the student access to a victims computer.  Go back to question  Impersonation When a student impersonates another students they usually do this in a chat room.  The students reveals personal information that could include name, address and phone number.  This could lead to an attack on the victim.
NEXT PAGE
Congratulations  you have just finished  your Cyberbullying training.

Weitere ähnliche Inhalte

Was ist angesagt?

Internet saftey
Internet safteyInternet saftey
Internet safteyryanbud
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles schoolesksaints
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet SafetyKigose
 
Internet safety
Internet safetyInternet safety
Internet safetyjld1018
 
Digital citizenship contract
Digital citizenship contractDigital citizenship contract
Digital citizenship contractClaire Amos
 

Was ist angesagt? (6)

Internet saftey
Internet safteyInternet saftey
Internet saftey
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Digital citizenship contract
Digital citizenship contractDigital citizenship contract
Digital citizenship contract
 

Andere mochten auch

Herramientas de Comunicación 2.0
Herramientas de Comunicación 2.0Herramientas de Comunicación 2.0
Herramientas de Comunicación 2.0Rubén Cárdenas
 
Understanding what attributes can sustain 5 s for_slideshare
Understanding what attributes can sustain 5 s for_slideshareUnderstanding what attributes can sustain 5 s for_slideshare
Understanding what attributes can sustain 5 s for_slideshareSubikash Roy
 
Workshop 25.05.2016 a SPS Italia - SENECA LET'S - VPN Connectivity Solutions
Workshop 25.05.2016 a SPS Italia - SENECA LET'S - VPN Connectivity SolutionsWorkshop 25.05.2016 a SPS Italia - SENECA LET'S - VPN Connectivity Solutions
Workshop 25.05.2016 a SPS Italia - SENECA LET'S - VPN Connectivity SolutionsSENECA
 
5 s checklist practice - kaizenvietnam, inc
5 s  checklist practice - kaizenvietnam, inc5 s  checklist practice - kaizenvietnam, inc
5 s checklist practice - kaizenvietnam, incDao Nguyen
 
5S Implementation - The first step to continuous improvement
5S Implementation - The first step to continuous improvement5S Implementation - The first step to continuous improvement
5S Implementation - The first step to continuous improvementAdrian Oprea
 
5S Workshop &Visual management - Krishna Heda
5S Workshop &Visual management - Krishna Heda5S Workshop &Visual management - Krishna Heda
5S Workshop &Visual management - Krishna Hedakrishnaheda
 
Dispositivi GSM/GPRS per applicazioni universali
Dispositivi GSM/GPRS per applicazioni universaliDispositivi GSM/GPRS per applicazioni universali
Dispositivi GSM/GPRS per applicazioni universaliSENECA
 
Presentació taller conta contes (2)
Presentació taller conta contes (2)Presentació taller conta contes (2)
Presentació taller conta contes (2)JanetSelma
 
10 Tips for WeChat
10 Tips for WeChat10 Tips for WeChat
10 Tips for WeChatChris Baker
 
Benefits of drinking water
Benefits of drinking waterBenefits of drinking water
Benefits of drinking waterEason Chan
 
20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage Content20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage ContentBarry Feldman
 

Andere mochten auch (17)

Project2
Project2Project2
Project2
 
Herramientas de Comunicación 2.0
Herramientas de Comunicación 2.0Herramientas de Comunicación 2.0
Herramientas de Comunicación 2.0
 
World lit.
World lit.World lit.
World lit.
 
Understanding what attributes can sustain 5 s for_slideshare
Understanding what attributes can sustain 5 s for_slideshareUnderstanding what attributes can sustain 5 s for_slideshare
Understanding what attributes can sustain 5 s for_slideshare
 
Hoisting
HoistingHoisting
Hoisting
 
Workshop 25.05.2016 a SPS Italia - SENECA LET'S - VPN Connectivity Solutions
Workshop 25.05.2016 a SPS Italia - SENECA LET'S - VPN Connectivity SolutionsWorkshop 25.05.2016 a SPS Italia - SENECA LET'S - VPN Connectivity Solutions
Workshop 25.05.2016 a SPS Italia - SENECA LET'S - VPN Connectivity Solutions
 
5 s checklist practice - kaizenvietnam, inc
5 s  checklist practice - kaizenvietnam, inc5 s  checklist practice - kaizenvietnam, inc
5 s checklist practice - kaizenvietnam, inc
 
5S Implementation - The first step to continuous improvement
5S Implementation - The first step to continuous improvement5S Implementation - The first step to continuous improvement
5S Implementation - The first step to continuous improvement
 
5S Workshop &Visual management - Krishna Heda
5S Workshop &Visual management - Krishna Heda5S Workshop &Visual management - Krishna Heda
5S Workshop &Visual management - Krishna Heda
 
Dispositivi GSM/GPRS per applicazioni universali
Dispositivi GSM/GPRS per applicazioni universaliDispositivi GSM/GPRS per applicazioni universali
Dispositivi GSM/GPRS per applicazioni universali
 
Hikayat Patani
Hikayat PataniHikayat Patani
Hikayat Patani
 
Sakura Mengorak Kelopak
Sakura Mengorak KelopakSakura Mengorak Kelopak
Sakura Mengorak Kelopak
 
Panduan Pengendalian Blog
Panduan Pengendalian BlogPanduan Pengendalian Blog
Panduan Pengendalian Blog
 
Presentació taller conta contes (2)
Presentació taller conta contes (2)Presentació taller conta contes (2)
Presentació taller conta contes (2)
 
10 Tips for WeChat
10 Tips for WeChat10 Tips for WeChat
10 Tips for WeChat
 
Benefits of drinking water
Benefits of drinking waterBenefits of drinking water
Benefits of drinking water
 
20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage Content20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage Content
 

Ähnlich wie Keenright591 Interactive Presentation

Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among studentsjune21harsh
 
The Hazards Of Cyberbullying
The Hazards Of CyberbullyingThe Hazards Of Cyberbullying
The Hazards Of CyberbullyingIC
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingAntolduvai
 
Abhishek cyber bullying
Abhishek   cyber bullyingAbhishek   cyber bullying
Abhishek cyber bullyingparulata
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010adewolfe
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingsmeech
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingpscl
 
eSmart Cybersafety
eSmart CybersafetyeSmart Cybersafety
eSmart Cybersafetytekwire
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 

Ähnlich wie Keenright591 Interactive Presentation (20)

Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
The Hazards Of Cyberbullying
The Hazards Of CyberbullyingThe Hazards Of Cyberbullying
The Hazards Of Cyberbullying
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Abhishek cyber bullying
Abhishek   cyber bullyingAbhishek   cyber bullying
Abhishek cyber bullying
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
eSmart Cybersafety
eSmart CybersafetyeSmart Cybersafety
eSmart Cybersafety
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Kürzlich hochgeladen

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 

Kürzlich hochgeladen (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

Keenright591 Interactive Presentation

  • 2. What is cyberbullying? Cyberbullying in any kind of negative virtual communication.
  • 3. There are many ways to bully someone other than just sending them a message.
  • 4.
  • 5. Instant messaging Sending threatening messages through IM’s or texting. Sending warning messages not to tell on them. Creating screen names that are 1 letter away from someone else’s screen name and sending offensive messages Texting wars and death threats
  • 6. Stealing passwords Student’s may steal passwords and access other’s accounts to send offensive messages to anger them. Students may gain access to an account and then change the settings to lock them out.
  • 7. Blogs Blogs are used as online journals to write damaging thing about someone’s reputation.
  • 8. Web Sites Web sites are created to insult another student or a group of students. Students also post pictures and personal information about other students.
  • 9. Sending pictures through cell phones and email Sending degrading photos through e-mails; the emails can then be passed around to hundreds of emails within hours. New cell phones are now able to send photos and can be spread to an entire address book at once.
  • 10. Sending Malicious Code Student send viruses, spyware and hacking programs to other computers as a form of harassment. Some programs can even give the student access to a victims computer.
  • 11. Impersonation When a student impersonates another students they usually do this in a chat room. The students reveals personal information that could include name, address and phone number. This could lead to an attack on the victim.
  • 12. Prevention Understand that teasing, threats and taking over someone’s identity are all forms of bullying. If this happens to you report the behaviors to an adult. Parents
  • 13. Parents Tell you parents. Parents need to inform you school counselor of the cyberbullying. Parents need to tell your doctor. It may be necessary to have counseling until the problems are resolved. Netiquette
  • 14.
  • 15.
  • 16. Go read for the answer again. Read here
  • 17. Instant messaging Sending threatening messages through IM’s or texting. Sending warning messages not to tell on them. Creating screen names that are 1 letter away from someone else’s screen name and sending offensive messages Texting wars and death threats Go back to question
  • 19.
  • 20. Go read for the answer again. Read here
  • 21. Stealing passwords Student’s may steal passwords and access other’s accounts to send offensive messages to anger them. Students may gain access to an account and then change the settings to lock them out. Go back to question
  • 23.
  • 24. Go read for the answer again. Read here
  • 25. Web Sites Web sites are created to insult another student or a group of students. Students also post pictures and personal information about other students. Go back to question
  • 27.
  • 28. Go read for the answer again. Read here
  • 29. Sending pictures through cell phones and email Sending degrading photos through e-mails; the emails can then be passed around to hundreds of emails within hours. New cell phones are now able to send photos and can be spread to an entire address book at once. Go back to question
  • 31.
  • 32. Go read for the answer again. Read here
  • 33. Sending Malicious Code Student send viruses, spyware and hacking programs to other computers as a form of harassment. Some programs can even give the student access to a victims computer. Go back to question Impersonation When a student impersonates another students they usually do this in a chat room. The students reveals personal information that could include name, address and phone number. This could lead to an attack on the victim.
  • 35. Congratulations you have just finished your Cyberbullying training.