SlideShare una empresa de Scribd logo
1 de 16
Cyberbullying
Brindetta Cook
CSIS 200
April 29, 2013
Source: http://thinkprogress.org/wp-content/uploads/2012/06/Cyberbullying.jpg
What is “Cyberbullying”?
“Cyberbullying is bullying that takes place using
electronic technology. “
Statistics
The Harford County Examiner reported similarly concerning cyber bullying 
statistics:
• Around half of teens have been the victims of cyber bullying
• Only 1 in 10 teens tells a parent if they have been a cyber bully victim
• Fewer than 1 in 5 cyber bullying incidents are reported to law
enforcement
• 1 in 10 adolescents or teens have had embarrassing or damaging
pictures taken of themselves without their permission, often using cell
phone cameras
• About 1 in 5 teens have posted or sent sexually suggestive or nude
pictures of themselves to others
Causes
• revenge of other peers
• for entertainment purposes
• to boost their ego
• to get a laugh from their peers
• help bolster or remind people of their
own social standing
Effects
•Undermining your confidence, self-esteem and sense of
security
•Affecting your performance and attendance at school
•Causing stress and affecting your health
•Affecting your professional reputation and career
•Fueling prejudice in areas such as race, religion and
sexuality
•Leading to suicidal thoughts
Who is affected?
• Ages 15-17
• Females are about twice as likely as
males to be victims and perpetrators of
cyber bullying.
• Males are more likely to be threatened
by cyber bullies than females
• Affects all races
Tyler Clementi
Jessica Logan
Technology’s Role
• Over 80% of teens use a cell phone regularly, making it the
most common medium for cyber bullying
• Cyberbullying can happen 24 hours a day, 7 days a week
• Cyberbullying messages and images can be posted
anonymously and distributed quickly to a very wide
audience.
• Deleting inappropriate or harassing messages, texts, and
pictures is extremely difficult after they have been posted or
sent.
How you can help!
• Don’t engage in or support mean material,
gossip, or rumors posted online, or talk about
it
• Support the victim being targeted online by
posting positive messages!
• Print the evidence to share with an authority
Remember!
• we are not invisible online, and
anything we post can be traced back to
us. Monitor your online reputation
YOU have the power
• If cyberbullying becomes severe and involves
threats of violence, you should contact the
police immediately. Some states have
computer harassment laws to prosecute
offenders.
Governor Cuomo Signs Legislation to
Help Protect Students from
Cyberbullying
• Requires Schools to Act When Cyberbullying Occurs
• Ensures Proper Protocols Are in Place to Deal with
Cyberbullying
• Sets Training Requirements For School Employees to Help
Identify and Prevent Cyberbullying
Have you ever been a victim of cyberbullying?
• A.)YES
• B.) NO
Source:
http://samuelflinn.files.wordpress.com/2012/05/cyber-
bullying-poster.jpg
Resources
Anti Bullying Campaigns and Programs:
• The Great American NO BULL Challenge
• Internet Safety 101
• Olweus Bullying Prevention Program
• Stomp Out Bullying
• Delete Digital Drama
• Cyberbully411
• STOP Cyberbullying
Sources
" What are the effects of cyberbullying? | Cyberbullying | Teacher advice | Teachtoday."
Teachtoday. N.p., n.d. Web. 28 Apr. 2013. <http://www.teachtoday.eu/en/Teacher-
advice/Cyberbullying/What-are-the-effects-of-cyberbullying.aspx>.
"Cyber Bullying Statistics - Bullying Statistics." Bullying Statistics ­ Teen Violence, Anger, 
Bullying, Treatment Options. N.p., n.d. Web. 29 Apr. 2013.
<http://www.bullyingstatistics.org/content/cyber-bullying-statistics.html>.
"Cyberbullying Effects | End Of Bullying." EndofBullying.com. N.p., n.d. Web. 29 Apr. 2013.
<http://endofbullying.com/cyberbullying-effects/>.
Sources cont’d.
"Governor Cuomo Signs Legislation to Help Protect Students from Cyberbullying |
Governor Andrew M. Cuomo." Governor Andrew M. Cuomo. N.p., n.d. Web.
29 Apr. 2013. <http://www.governor.ny.gov/press/07092012cyberbullying>.
"InternetSafety101.org: Statistics." InternetSafety101.org: Home. N.p., n.d. Web.
29 Apr. 2013.
<http://www.internetsafety101.org/cyberbullyingstatistics.htm#_ftnref>.
"What is Cyberbullying | StopBullying.gov." Home | StopBullying.gov. N.p., n.d.
Web. 27 Apr. 2013. <http://www.stopbullying.gov/cyberbullying/what-is-
it/index.html>.
"my Secure Cyberspace:." Cyberbullying. N.p., n.d. Web. 28 Apr. 2013.
<www.mysecurecyberspace.com/encyclopedia/index/cyberbullying.html>.

Más contenido relacionado

La actualidad más candente

*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*Amber Dee
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingpscl
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying CarlosE15
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying PresentationCourtney Cole
 
Etiquette in the Digital World
Etiquette in the Digital WorldEtiquette in the Digital World
Etiquette in the Digital Worldmgastgoodman
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crimeAlisha Korpal
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
Misuse of internet
Misuse of internetMisuse of internet
Misuse of internetJincy24
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying griehl
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
Cyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxCyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxTejasSingh70
 
Cyberbullying Final Project by Group Anonymous
Cyberbullying Final Project by Group AnonymousCyberbullying Final Project by Group Anonymous
Cyberbullying Final Project by Group Anonymousccastronovo
 

La actualidad más candente (20)

*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cybersex 2m8
Cybersex 2m8Cybersex 2m8
Cybersex 2m8
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Digital safety
Digital safetyDigital safety
Digital safety
 
Etiquette in the Digital World
Etiquette in the Digital WorldEtiquette in the Digital World
Etiquette in the Digital World
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Misuse of internet
Misuse of internetMisuse of internet
Misuse of internet
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxCyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptx
 
Cyberbullying Final Project by Group Anonymous
Cyberbullying Final Project by Group AnonymousCyberbullying Final Project by Group Anonymous
Cyberbullying Final Project by Group Anonymous
 

Similar a Csis200 cyberbullying

Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jfJohn Field
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big ProblemGail Rebuck
 
Stop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measuresStop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measureskanika sharma
 
Cabatian & Estrada 1
Cabatian & Estrada 1Cabatian & Estrada 1
Cabatian & Estrada 1Samphiriane
 
Cyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItCyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItFeliciaDixon5
 
Cyber-bullying
Cyber-bullyingCyber-bullying
Cyber-bullyinganwidener
 
Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By AnamikaGisha Mathyari
 
Social and Ethical Issues in the Digital Era Presentation
Social and Ethical Issues in the Digital Era Presentation Social and Ethical Issues in the Digital Era Presentation
Social and Ethical Issues in the Digital Era Presentation courtneyjohnson105
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullyingZiar Khan
 
MultiMedia Presentation
MultiMedia PresentationMultiMedia Presentation
MultiMedia PresentationAshlynnH
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullyingsepulvedamd
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 

Similar a Csis200 cyberbullying (20)

Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jf
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big Problem
 
Bully
BullyBully
Bully
 
Stop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measuresStop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measures
 
Cabatian & Estrada 1
Cabatian & Estrada 1Cabatian & Estrada 1
Cabatian & Estrada 1
 
Symposium On Anti-Bullying In Schools
Symposium On Anti-Bullying In SchoolsSymposium On Anti-Bullying In Schools
Symposium On Anti-Bullying In Schools
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItCyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent It
 
Cyber-bullying
Cyber-bullyingCyber-bullying
Cyber-bullying
 
Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By Anamika
 
Social and Ethical Issues in the Digital Era Presentation
Social and Ethical Issues in the Digital Era Presentation Social and Ethical Issues in the Digital Era Presentation
Social and Ethical Issues in the Digital Era Presentation
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
MultiMedia Presentation
MultiMedia PresentationMultiMedia Presentation
MultiMedia Presentation
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 

Último

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Último (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Csis200 cyberbullying

  • 2. What is “Cyberbullying”? “Cyberbullying is bullying that takes place using electronic technology. “
  • 3. Statistics The Harford County Examiner reported similarly concerning cyber bullying  statistics: • Around half of teens have been the victims of cyber bullying • Only 1 in 10 teens tells a parent if they have been a cyber bully victim • Fewer than 1 in 5 cyber bullying incidents are reported to law enforcement • 1 in 10 adolescents or teens have had embarrassing or damaging pictures taken of themselves without their permission, often using cell phone cameras • About 1 in 5 teens have posted or sent sexually suggestive or nude pictures of themselves to others
  • 4. Causes • revenge of other peers • for entertainment purposes • to boost their ego • to get a laugh from their peers • help bolster or remind people of their own social standing
  • 5. Effects •Undermining your confidence, self-esteem and sense of security •Affecting your performance and attendance at school •Causing stress and affecting your health •Affecting your professional reputation and career •Fueling prejudice in areas such as race, religion and sexuality •Leading to suicidal thoughts
  • 6. Who is affected? • Ages 15-17 • Females are about twice as likely as males to be victims and perpetrators of cyber bullying. • Males are more likely to be threatened by cyber bullies than females • Affects all races
  • 8. Technology’s Role • Over 80% of teens use a cell phone regularly, making it the most common medium for cyber bullying • Cyberbullying can happen 24 hours a day, 7 days a week • Cyberbullying messages and images can be posted anonymously and distributed quickly to a very wide audience. • Deleting inappropriate or harassing messages, texts, and pictures is extremely difficult after they have been posted or sent.
  • 9. How you can help! • Don’t engage in or support mean material, gossip, or rumors posted online, or talk about it • Support the victim being targeted online by posting positive messages! • Print the evidence to share with an authority
  • 10. Remember! • we are not invisible online, and anything we post can be traced back to us. Monitor your online reputation
  • 11. YOU have the power • If cyberbullying becomes severe and involves threats of violence, you should contact the police immediately. Some states have computer harassment laws to prosecute offenders.
  • 12. Governor Cuomo Signs Legislation to Help Protect Students from Cyberbullying • Requires Schools to Act When Cyberbullying Occurs • Ensures Proper Protocols Are in Place to Deal with Cyberbullying • Sets Training Requirements For School Employees to Help Identify and Prevent Cyberbullying
  • 13. Have you ever been a victim of cyberbullying? • A.)YES • B.) NO Source: http://samuelflinn.files.wordpress.com/2012/05/cyber- bullying-poster.jpg
  • 14. Resources Anti Bullying Campaigns and Programs: • The Great American NO BULL Challenge • Internet Safety 101 • Olweus Bullying Prevention Program • Stomp Out Bullying • Delete Digital Drama • Cyberbully411 • STOP Cyberbullying
  • 15. Sources " What are the effects of cyberbullying? | Cyberbullying | Teacher advice | Teachtoday." Teachtoday. N.p., n.d. Web. 28 Apr. 2013. <http://www.teachtoday.eu/en/Teacher- advice/Cyberbullying/What-are-the-effects-of-cyberbullying.aspx>. "Cyber Bullying Statistics - Bullying Statistics." Bullying Statistics ­ Teen Violence, Anger,  Bullying, Treatment Options. N.p., n.d. Web. 29 Apr. 2013. <http://www.bullyingstatistics.org/content/cyber-bullying-statistics.html>. "Cyberbullying Effects | End Of Bullying." EndofBullying.com. N.p., n.d. Web. 29 Apr. 2013. <http://endofbullying.com/cyberbullying-effects/>.
  • 16. Sources cont’d. "Governor Cuomo Signs Legislation to Help Protect Students from Cyberbullying | Governor Andrew M. Cuomo." Governor Andrew M. Cuomo. N.p., n.d. Web. 29 Apr. 2013. <http://www.governor.ny.gov/press/07092012cyberbullying>. "InternetSafety101.org: Statistics." InternetSafety101.org: Home. N.p., n.d. Web. 29 Apr. 2013. <http://www.internetsafety101.org/cyberbullyingstatistics.htm#_ftnref>. "What is Cyberbullying | StopBullying.gov." Home | StopBullying.gov. N.p., n.d. Web. 27 Apr. 2013. <http://www.stopbullying.gov/cyberbullying/what-is- it/index.html>. "my Secure Cyberspace:." Cyberbullying. N.p., n.d. Web. 28 Apr. 2013. <www.mysecurecyberspace.com/encyclopedia/index/cyberbullying.html>.

Notas del editor

  1. http://www.stopbullying.gov/cyberbullying/what-is-it/index.html Examples of cyberbullying include: mean text messages or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles. Being a victim of cyberbullying can be a common and painful experience. Some youth who cyberbully: Pretend they are other people online to trick others Spread lies and rumors about victims Trick people into revealing personal information Send or forward private text messages, pictures, etc. Post pictures of victims without their consent Sending mean messages or threats to a person&apos;s email account or cell phone Spreading rumors online or through texts Posting hurtful or threatening messages on social networking sites or web pages Stealing a person&apos;s account information to break into their account and send damaging messages Pretending to be someone else online to hurt another person Taking unflattering pictures of a person and spreading them through cell phones or the Internet Sexting, or circulating sexually suggestive pictures or messages about a person
  2. Cyber world has become the new way to communicate in today&apos;s society People (students) in particular don’t think they can get caught Can lead to other devastating tragedies (school shootings, suicide, and other harm) http://www.bullyingstatistics.org/content/cyber-bullying-statistics.html
  3. The teen years can be cruel. Nearly everyone has been a part of some form of bullying during his or her lifetime, be it on the giving or receiving end. In general, cyber bullies have their own motives on why they are involved in cyber bullying. Some of their intentions have been identified as power, attention, retaliation, boredom, jealousy, and the pleasure of inflicting pain.
  4. Can have a lasting impression on you for the rest of your life
  5. Cyberbullying has become a prevalent problem globally Homosexual and bisexual teens are more likely to report bullying than heterosexual teens Students with disabilities are more likely to be the victims of bullying Females are more often the victims of bullying than males
  6. Tyler Clementi: jumped to his death from the George Washington Bridge. This occurred after a sexual encounter he had with a man in his dorm room was allegedly video streamed over the internet without Clementi&apos;s knowledge Jessica Logan: committed suicide after sexting a nude photo of herself to her boyfriend. When they broke up, he sent the photo to everyone else at her school. Jessica was cruelly harassed for months by the other girls at her school, Jessica Logan decided to tell her story on a Cincinnati television station. Her purpose was simple: “I just want to make sure no one else will have to go through this again.” The interview was in May 2008. Two months later, on July 3, 2008, Jessie attended the funeral of a boy who committed suicide, then came home and killed herself.
  7. The psychological and emotional outcomes of cyber bullying are similar to those of real-life bullying. The difference is, real-life bullying often ends when school ends. For cyber bullying, there is no escape. And, it’s getting worse. http://www.dosomething.org/tipsandtools/11-facts-about-cyber-bullying
  8. You may be able to sue a cyberbully or the bully&apos;s parents for damages if you can prove defamation, invasion of privacy, or intentional infliction of emotional distress. Damages can include money spent on counseling, limited college opportunities due to failing grades, etc.
  9. The new law goes into effect on July 1, 2013. The new law cracks down on cyberbullying through the following provisions: “ The new law is designed to strengthen a school&apos;s response to harassment and bullying through improved reporting, investigation, intervention, training and prevention. The new law requires schools to take action when students experience cyberbullying or other forms of harassment. It ensures that school districts take immediate steps to end harmful behavior, prevent recurrences, and ensure the safety of the targeted students. The legislation also establishes improved training to help teachers and administrators better prevent and respond to bullying and other harmful acts.” http://www.governor.ny.gov/press/07092012cyberbullying