SlideShare una empresa de Scribd logo
1 de 16
Cyber
Bullying

  United Against Violence
  Of Greater Dayton
What is Cyber
Bullying?
 Cyber Bullying is when a child is tormented,
  threatened, harassed, humiliated,
  embarrassed or otherwise targeted by
  another child using the Internet, interactive
  and digital technologies or cell phones. It
  has to have a minor on both sides, or at
  least have been instigated by a minor
  against another minor.
Cyber Bullies
    use…
 Social Networks : Facebook, My
  Space, Chat rooms
 E-mail
 Cell phones
 Instant messaging
 Bashing web sites
Bullying -Versus-
      Cyber Bullying
    Bullying                  Cyber Bullying
 Direct                     Can be anonymous
 Occurs on school           Usually occurs off school
  property                    property
 Poor relationships with    Good relationships with
  teachers                    teachers
 Fear retribution           Fear loss of privileges
  (Physical, Verbal and       (computer and cell
  Nonverbal)                  phones taken away)
                             Farther under the radar
                              than bullying
Types of Cyber
                      Bullying
 Cyber stalking: Repeatedly sending messages that
  include threats of harm or are highly intimidating
 Denigration: “Dissing” someone online. Sending or
  posting cruel gossip or rumors about a person
 Flaming: Online fights using messages with angry and
  vulgar language
 Harassment: Repeatedly sending offensive, rude, and
  insulting messages
 Impersonation: Pretending to be someone else and
  sending or posting material that makes a person look
  bad, gets them in trouble, or damages that person’s
  reputation or friendships
What
   Statistics say
 65% of kids between 8-14 have been involved directly or
  indirectly in a cyber bullying incident as the cyber bully,
  victim or friend.
 42% of kids have been bullied online. 35% have been
  threatened online.
 53% of kids admit to saying mean or hurtful things to
  someone online.
 50% has seen or heard of a website that bashes another
  student. 75% has visited a bashing website.
 90% of middle school students polled have had their
  feelings hurt online.
 58% of victims have not told their parents about the cyber
  bullying.
Why do kids cyber
        bully?
 They are often motivated by anger, revenge or frustration.
 Sometimes they do it for entertainment or because they
  are bored and have too much time on their hands.
 Many do it for laughs or to get a reaction.
 Some do it by accident, and either send a message to the
  wrong recipient or didn't think before they did something.
 The Power-hungry do it to torment others and for their ego.
 Mean girls do it to help boost or remind people of their own
  social standing.
 Some think they are righting wrong and standing up for
  others.
Preventing cyber
     bullying
-What parents can do-
  Discuss cyber bullying with your child.
  Educating the kids about the consequences (losing
   their cell phone and/or computer privileges) helps.
  Teaching them to respect others and to take a stand
   against bullying of all kinds helps too.

  Supervise and increase effective monitoring of the
   internet
  Know what your child is doing online and with their cell
   phones.
  Get to know your children's friends, are they the type of
   kids that are positive influences.
Preventing cyber
     bullying
-what kids can do -
 Block the cyber bully. You do not have to have
  them on your friends list.
 Ignore them. If you do not respond to a negative
  text, email, or comment online then the person
  may just calm down. It might take a while but be
  patient.
 Tell an adult if messages are continuous,
  threatening, or it’s affecting your daily routine.
 Talk, talk, talk to your parents or a trusted adult.
Preventing cyber
             bullying
     -what schools can do -
 Focus on values of kindness, respect,
  compassion, tolerance, and forgiveness.
 Develop problem solving skills.
 Provide staff, parent, and student
  education.
 Empower bystanders to speak up.
 Have written policies that address all types
  of bullying.
Help for victims of
      bullying
 Family supports, communication is the
  key to being supportive, listening to them
  and being there to talk.
 In-School counseling.
 Outside referral counseling.
 Anger management groups.
 Conflict resolution education.
What are the                         laws?
   House Bill                         276
 Sec. 3313.666. (A) As used in this section,
  "harassment, intimidation, or bullying" means any
  intentional written, verbal, or physical act that a
  student has exhibited toward another particular
  student more than once and the behavior both:
 (1) Causes mental or physical harm to the other
  student;
 (2) Is sufficiently severe, persistent, or pervasive
  that it creates an intimidating, threatening, or
  abusive educational environment for the other
  student.
What are the laws?
   Senate Bill 126(Pending)
      Introduced to senate in March 2011

 Sec. 3313.666. (A) As used in this section,
  "harassment:
 (1) "Electronic act" means an act committed through
  the use of a cellular telephone, computer, pager,
  personal communication device, or other electronic
  communication device.
 (2) "Harassment, intimidation, or bullying" means any
  intentional written, verbal, electronic, or physical act
  that a student has exhibited toward another particular
  student more than once and the behavior both:
 (1)(a) Causes mental or physical harm to the other
  student;
 (2)(b) Is sufficiently severe, persistent, or pervasive
  that it creates an intimidating, threatening, or abusive
  educational environment for the other student.
www.stopviolence.
      org
Works Sited-

               www.stopcyberbullying.org
              www.stopbullyingnow.hrsa.gov
                     www.isafe.org
                  www.facs.pppst.com
               www.legislature.state.oh.us

       Demysifying and Deescalating Cyber Bullying
                  Barbara Trolly, Ph.D. CRC
      Connie Hanel, M.S.E.d & Linda Shields, M.S.E.d
                   McKenna & Bargh, 2004
                   Ybarra & Mitchell, 2004
                  Nancy Willard, M.S., J.D.,
Director of the Center for Safe and Responsible Internet Use
Images sited
     Microsoft Clip Art
  Captaincollo.blogspot.com
          My.hsj.org
   Nikkihut.blogspot.com
    bullyingpictures.com
    Mainstreethardy.com
        Clipartof.com
  Healthylifestyles-news.org

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Bullying
BullyingBullying
Bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
 
Internet addiction
Internet addictionInternet addiction
Internet addiction
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Bullying powerpoint
Bullying powerpointBullying powerpoint
Bullying powerpoint
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 
Bullying Powerpoint
Bullying PowerpointBullying Powerpoint
Bullying Powerpoint
 

Destacado

Cyberbullying power pot student copy
Cyberbullying  power pot student copyCyberbullying  power pot student copy
Cyberbullying power pot student copybrlewis1971
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingzackkay
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingbl03cook
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingwirsi
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingbuech1cj
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?AJ Tivol
 
Cyber Bullying Presentation
Cyber Bullying PresentationCyber Bullying Presentation
Cyber Bullying Presentationamate1cl
 
Aet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingAet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingcschoeneman
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullyingMelissa
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullyingZiar Khan
 
The Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingThe Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingKatie_Waters
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.katnaylan
 
cyber bullying parent workshop 2012
cyber bullying parent workshop 2012cyber bullying parent workshop 2012
cyber bullying parent workshop 2012atomikey
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying PresentationCourtney Cole
 
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?""Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"DefinetheLine
 
Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetinganniebee3509
 

Destacado (20)

Cyberbullying power pot student copy
Cyberbullying  power pot student copyCyberbullying  power pot student copy
Cyberbullying power pot student copy
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?
 
Cyber Bullying Presentation
Cyber Bullying PresentationCyber Bullying Presentation
Cyber Bullying Presentation
 
Aet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingAet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullying
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
The Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingThe Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber Bullying
 
491 nasilje na internetu
491 nasilje na internetu491 nasilje na internetu
491 nasilje na internetu
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
 
cyber bullying parent workshop 2012
cyber bullying parent workshop 2012cyber bullying parent workshop 2012
cyber bullying parent workshop 2012
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?""Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
 
Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meeting
 

Similar a Cyber Bullying

Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Sarah doty cyber bullying
Sarah doty cyber bullyingSarah doty cyber bullying
Sarah doty cyber bullyingSarah Doty
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullyingsepulvedamd
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28thDoctora2017
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28thJohn Field
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying John Field
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
CyberbullyingspecR Smith
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
CyberbullyingspecR Smith
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfCharanBobby69CB
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingR Smith
 
Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson Martinez
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingdrumcut
 

Similar a Cyber Bullying (20)

Olmv cyberbullying
Olmv cyberbullyingOlmv cyberbullying
Olmv cyberbullying
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Sarah doty cyber bullying
Sarah doty cyber bullyingSarah doty cyber bullying
Sarah doty cyber bullying
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshare
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Más de Joe Gauder

UAVGD - Violent Crime Update Q4 2017
UAVGD - Violent Crime Update Q4 2017UAVGD - Violent Crime Update Q4 2017
UAVGD - Violent Crime Update Q4 2017Joe Gauder
 
SBH Stop Violence Crime Stats Q3 2016
SBH Stop Violence Crime Stats Q3 2016SBH Stop Violence Crime Stats Q3 2016
SBH Stop Violence Crime Stats Q3 2016Joe Gauder
 
Uav gun crime 2016 q1-2 update_mcsoupdatefromnancy
Uav gun crime 2016 q1-2 update_mcsoupdatefromnancyUav gun crime 2016 q1-2 update_mcsoupdatefromnancy
Uav gun crime 2016 q1-2 update_mcsoupdatefromnancyJoe Gauder
 
UAVGD Crime Stats - 4th Quarter 2015
UAVGD Crime Stats - 4th Quarter 2015UAVGD Crime Stats - 4th Quarter 2015
UAVGD Crime Stats - 4th Quarter 2015Joe Gauder
 
United Against Violence - Gun Crime 2014 Q4 Update
United Against Violence - Gun Crime 2014 Q4 UpdateUnited Against Violence - Gun Crime 2014 Q4 Update
United Against Violence - Gun Crime 2014 Q4 UpdateJoe Gauder
 
SBH UAV Gun Crime 2014 Q3 Stats
SBH UAV Gun Crime 2014 Q3 StatsSBH UAV Gun Crime 2014 Q3 Stats
SBH UAV Gun Crime 2014 Q3 StatsJoe Gauder
 
United Against Violence - Gun Crime - 2014 - Q2
United Against Violence - Gun Crime - 2014 - Q2United Against Violence - Gun Crime - 2014 - Q2
United Against Violence - Gun Crime - 2014 - Q2Joe Gauder
 
Uav gun-crime-2013-eoy-update
Uav gun-crime-2013-eoy-updateUav gun-crime-2013-eoy-update
Uav gun-crime-2013-eoy-updateJoe Gauder
 
Uav gun crime 2013_q3 update
Uav gun crime 2013_q3 updateUav gun crime 2013_q3 update
Uav gun crime 2013_q3 updateJoe Gauder
 
Uav gun crime 2013_q2 update
Uav gun crime 2013_q2 updateUav gun crime 2013_q2 update
Uav gun crime 2013_q2 updateJoe Gauder
 
Dayton Gun and Violent Crime Statistics
Dayton Gun and Violent Crime StatisticsDayton Gun and Violent Crime Statistics
Dayton Gun and Violent Crime StatisticsJoe Gauder
 

Más de Joe Gauder (11)

UAVGD - Violent Crime Update Q4 2017
UAVGD - Violent Crime Update Q4 2017UAVGD - Violent Crime Update Q4 2017
UAVGD - Violent Crime Update Q4 2017
 
SBH Stop Violence Crime Stats Q3 2016
SBH Stop Violence Crime Stats Q3 2016SBH Stop Violence Crime Stats Q3 2016
SBH Stop Violence Crime Stats Q3 2016
 
Uav gun crime 2016 q1-2 update_mcsoupdatefromnancy
Uav gun crime 2016 q1-2 update_mcsoupdatefromnancyUav gun crime 2016 q1-2 update_mcsoupdatefromnancy
Uav gun crime 2016 q1-2 update_mcsoupdatefromnancy
 
UAVGD Crime Stats - 4th Quarter 2015
UAVGD Crime Stats - 4th Quarter 2015UAVGD Crime Stats - 4th Quarter 2015
UAVGD Crime Stats - 4th Quarter 2015
 
United Against Violence - Gun Crime 2014 Q4 Update
United Against Violence - Gun Crime 2014 Q4 UpdateUnited Against Violence - Gun Crime 2014 Q4 Update
United Against Violence - Gun Crime 2014 Q4 Update
 
SBH UAV Gun Crime 2014 Q3 Stats
SBH UAV Gun Crime 2014 Q3 StatsSBH UAV Gun Crime 2014 Q3 Stats
SBH UAV Gun Crime 2014 Q3 Stats
 
United Against Violence - Gun Crime - 2014 - Q2
United Against Violence - Gun Crime - 2014 - Q2United Against Violence - Gun Crime - 2014 - Q2
United Against Violence - Gun Crime - 2014 - Q2
 
Uav gun-crime-2013-eoy-update
Uav gun-crime-2013-eoy-updateUav gun-crime-2013-eoy-update
Uav gun-crime-2013-eoy-update
 
Uav gun crime 2013_q3 update
Uav gun crime 2013_q3 updateUav gun crime 2013_q3 update
Uav gun crime 2013_q3 update
 
Uav gun crime 2013_q2 update
Uav gun crime 2013_q2 updateUav gun crime 2013_q2 update
Uav gun crime 2013_q2 update
 
Dayton Gun and Violent Crime Statistics
Dayton Gun and Violent Crime StatisticsDayton Gun and Violent Crime Statistics
Dayton Gun and Violent Crime Statistics
 

Último

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Último (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

Cyber Bullying

  • 1. Cyber Bullying United Against Violence Of Greater Dayton
  • 2. What is Cyber Bullying?  Cyber Bullying is when a child is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child using the Internet, interactive and digital technologies or cell phones. It has to have a minor on both sides, or at least have been instigated by a minor against another minor.
  • 3. Cyber Bullies use…  Social Networks : Facebook, My Space, Chat rooms  E-mail  Cell phones  Instant messaging  Bashing web sites
  • 4. Bullying -Versus- Cyber Bullying Bullying Cyber Bullying  Direct  Can be anonymous  Occurs on school  Usually occurs off school property property  Poor relationships with  Good relationships with teachers teachers  Fear retribution  Fear loss of privileges (Physical, Verbal and (computer and cell Nonverbal) phones taken away)  Farther under the radar than bullying
  • 5. Types of Cyber Bullying  Cyber stalking: Repeatedly sending messages that include threats of harm or are highly intimidating  Denigration: “Dissing” someone online. Sending or posting cruel gossip or rumors about a person  Flaming: Online fights using messages with angry and vulgar language  Harassment: Repeatedly sending offensive, rude, and insulting messages  Impersonation: Pretending to be someone else and sending or posting material that makes a person look bad, gets them in trouble, or damages that person’s reputation or friendships
  • 6. What Statistics say  65% of kids between 8-14 have been involved directly or indirectly in a cyber bullying incident as the cyber bully, victim or friend.  42% of kids have been bullied online. 35% have been threatened online.  53% of kids admit to saying mean or hurtful things to someone online.  50% has seen or heard of a website that bashes another student. 75% has visited a bashing website.  90% of middle school students polled have had their feelings hurt online.  58% of victims have not told their parents about the cyber bullying.
  • 7. Why do kids cyber bully?  They are often motivated by anger, revenge or frustration.  Sometimes they do it for entertainment or because they are bored and have too much time on their hands.  Many do it for laughs or to get a reaction.  Some do it by accident, and either send a message to the wrong recipient or didn't think before they did something.  The Power-hungry do it to torment others and for their ego.  Mean girls do it to help boost or remind people of their own social standing.  Some think they are righting wrong and standing up for others.
  • 8. Preventing cyber bullying -What parents can do-  Discuss cyber bullying with your child.  Educating the kids about the consequences (losing their cell phone and/or computer privileges) helps.  Teaching them to respect others and to take a stand against bullying of all kinds helps too.  Supervise and increase effective monitoring of the internet  Know what your child is doing online and with their cell phones.  Get to know your children's friends, are they the type of kids that are positive influences.
  • 9. Preventing cyber bullying -what kids can do -  Block the cyber bully. You do not have to have them on your friends list.  Ignore them. If you do not respond to a negative text, email, or comment online then the person may just calm down. It might take a while but be patient.  Tell an adult if messages are continuous, threatening, or it’s affecting your daily routine.  Talk, talk, talk to your parents or a trusted adult.
  • 10. Preventing cyber bullying -what schools can do -  Focus on values of kindness, respect, compassion, tolerance, and forgiveness.  Develop problem solving skills.  Provide staff, parent, and student education.  Empower bystanders to speak up.  Have written policies that address all types of bullying.
  • 11. Help for victims of bullying  Family supports, communication is the key to being supportive, listening to them and being there to talk.  In-School counseling.  Outside referral counseling.  Anger management groups.  Conflict resolution education.
  • 12. What are the laws? House Bill 276  Sec. 3313.666. (A) As used in this section, "harassment, intimidation, or bullying" means any intentional written, verbal, or physical act that a student has exhibited toward another particular student more than once and the behavior both:  (1) Causes mental or physical harm to the other student;  (2) Is sufficiently severe, persistent, or pervasive that it creates an intimidating, threatening, or abusive educational environment for the other student.
  • 13. What are the laws? Senate Bill 126(Pending) Introduced to senate in March 2011  Sec. 3313.666. (A) As used in this section, "harassment:  (1) "Electronic act" means an act committed through the use of a cellular telephone, computer, pager, personal communication device, or other electronic communication device.  (2) "Harassment, intimidation, or bullying" means any intentional written, verbal, electronic, or physical act that a student has exhibited toward another particular student more than once and the behavior both:  (1)(a) Causes mental or physical harm to the other student;  (2)(b) Is sufficiently severe, persistent, or pervasive that it creates an intimidating, threatening, or abusive educational environment for the other student.
  • 15. Works Sited- www.stopcyberbullying.org www.stopbullyingnow.hrsa.gov www.isafe.org www.facs.pppst.com www.legislature.state.oh.us Demysifying and Deescalating Cyber Bullying Barbara Trolly, Ph.D. CRC Connie Hanel, M.S.E.d & Linda Shields, M.S.E.d McKenna & Bargh, 2004 Ybarra & Mitchell, 2004 Nancy Willard, M.S., J.D., Director of the Center for Safe and Responsible Internet Use
  • 16. Images sited Microsoft Clip Art Captaincollo.blogspot.com My.hsj.org Nikkihut.blogspot.com bullyingpictures.com Mainstreethardy.com Clipartof.com Healthylifestyles-news.org