SlideShare una empresa de Scribd logo
1 de 10
Cyber-Bullying
What is Cyber-Bullying? ,[object Object]
The Information Highway ,[object Object]
Examples of Cyber-Bullying ,[object Object],[object Object],[object Object],[object Object],[object Object]
Where does Cyber-Bullying Occur? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cyber-Bullying Awareness ,[object Object],[object Object],[object Object]
Can Cyber-Bullying Be Tracked???? Sending cyber messages can be traced.  Every computer contains an unique  address that can be traced by your Internet Service Provider.  JUST BECAUSE YOU HIT DELETE, DOES NOT MEAN THAT YOUR MESSAGE HAS BEEN DELETED!  It can still be tracked!!!! SENDING INAPPROPRIATE MESSAGES CAN GET YOUR CHILD AND YOU THE PARENT IN SERIOUS TROUBLE!!!
What Can Parents Do To Help??? ,[object Object],[object Object],[object Object],[object Object],[object Object]
For More Information ,[object Object],[object Object],[object Object],[object Object],[object Object]
This information has been compiled  for you from  the  www.stopcyberbullying.org  website.   Created by:  Rachel R. Adams and Shawna P. Crum Pike County Adult Education Instructors

Más contenido relacionado

La actualidad más candente

Benefitsandhazards
BenefitsandhazardsBenefitsandhazards
Benefitsandhazards
dgieseler1
 
Protecting Your Child Online
Protecting  Your  Child  OnlineProtecting  Your  Child  Online
Protecting Your Child Online
dgieseler1
 
Pink Pecha kucha
Pink Pecha kuchaPink Pecha kucha
Pink Pecha kucha
mrparslow
 
eSmart Cybersafety
eSmart CybersafetyeSmart Cybersafety
eSmart Cybersafety
tekwire
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
jpl17
 
Social_Suicide_A_Psychoanalysis_of_Adole-2
Social_Suicide_A_Psychoanalysis_of_Adole-2Social_Suicide_A_Psychoanalysis_of_Adole-2
Social_Suicide_A_Psychoanalysis_of_Adole-2
Tamasine Preece
 

La actualidad más candente (20)

Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe online
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Benefitsandhazards
BenefitsandhazardsBenefitsandhazards
Benefitsandhazards
 
Protecting Your Child Online
Protecting  Your  Child  OnlineProtecting  Your  Child  Online
Protecting Your Child Online
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Pink Pecha kucha
Pink Pecha kuchaPink Pecha kucha
Pink Pecha kucha
 
eSmart Cybersafety
eSmart CybersafetyeSmart Cybersafety
eSmart Cybersafety
 
Glow Internet Safety Talk
Glow Internet Safety TalkGlow Internet Safety Talk
Glow Internet Safety Talk
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
Hamad Rabban.It
Hamad Rabban.ItHamad Rabban.It
Hamad Rabban.It
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Internet Safety Keypoints Handout
Internet Safety Keypoints HandoutInternet Safety Keypoints Handout
Internet Safety Keypoints Handout
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for Kids
 
Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents
 
Social_Suicide_A_Psychoanalysis_of_Adole-2
Social_Suicide_A_Psychoanalysis_of_Adole-2Social_Suicide_A_Psychoanalysis_of_Adole-2
Social_Suicide_A_Psychoanalysis_of_Adole-2
 

Destacado

SD Cloud Comp
SD Cloud CompSD Cloud Comp
SD Cloud Comp
A H
 
Pike Ky Digital Citizenship
Pike Ky Digital CitizenshipPike Ky Digital Citizenship
Pike Ky Digital Citizenship
cynthia.warner
 

Destacado (12)

Do U Txt Msg
Do U Txt MsgDo U Txt Msg
Do U Txt Msg
 
Manifesting His Glory - Part 3: Manifest His Glory Through Life and Ministry
Manifesting His Glory - Part 3: Manifest His Glory Through Life and MinistryManifesting His Glory - Part 3: Manifest His Glory Through Life and Ministry
Manifesting His Glory - Part 3: Manifest His Glory Through Life and Ministry
 
Nota flip flop
Nota flip flopNota flip flop
Nota flip flop
 
SD Cloud Comp
SD Cloud CompSD Cloud Comp
SD Cloud Comp
 
Pike Ky Digital Citizenship
Pike Ky Digital CitizenshipPike Ky Digital Citizenship
Pike Ky Digital Citizenship
 
proyecto de innovacion tecnologica
proyecto de innovacion tecnologicaproyecto de innovacion tecnologica
proyecto de innovacion tecnologica
 
Dead women talking (in morocco)
Dead women talking (in  morocco)Dead women talking (in  morocco)
Dead women talking (in morocco)
 
LODLearning: Enhancing e-Learning content by using Semantic Web technologies
LODLearning: Enhancing e-Learning content by using Semantic Web technologiesLODLearning: Enhancing e-Learning content by using Semantic Web technologies
LODLearning: Enhancing e-Learning content by using Semantic Web technologies
 
Nature view farm case study
Nature view farm case studyNature view farm case study
Nature view farm case study
 
Gastronomía cusqueña
Gastronomía cusqueñaGastronomía cusqueña
Gastronomía cusqueña
 
Positive Attitude
Positive AttitudePositive Attitude
Positive Attitude
 
Dir & chitral
Dir & chitralDir & chitral
Dir & chitral
 

Similar a Stop Cyberbullying Parent Presentation

Cyber Bullying Student Presentation
Cyber Bullying Student PresentationCyber Bullying Student Presentation
Cyber Bullying Student Presentation
cynthia.warner
 
Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02
Joyce Hirsh
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
shannonmf
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
katnaylan
 
Define cyberbullying and use two workable ethical theories to analyz.pdf
Define cyberbullying and use two workable ethical theories to analyz.pdfDefine cyberbullying and use two workable ethical theories to analyz.pdf
Define cyberbullying and use two workable ethical theories to analyz.pdf
alshaikhkhanzariarts
 

Similar a Stop Cyberbullying Parent Presentation (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying Student Presentation
Cyber Bullying Student PresentationCyber Bullying Student Presentation
Cyber Bullying Student Presentation
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyberbullying by alex pitcher
Cyberbullying by alex pitcherCyberbullying by alex pitcher
Cyberbullying by alex pitcher
 
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
 
How to stop cyber bullying
How to stop cyber bullyingHow to stop cyber bullying
How to stop cyber bullying
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
 
Define cyberbullying and use two workable ethical theories to analyz.pdf
Define cyberbullying and use two workable ethical theories to analyz.pdfDefine cyberbullying and use two workable ethical theories to analyz.pdf
Define cyberbullying and use two workable ethical theories to analyz.pdf
 
Cyberbullying powerpoint davon b
Cyberbullying powerpoint davon bCyberbullying powerpoint davon b
Cyberbullying powerpoint davon b
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
 
Parents guide to cyberbullying
Parents guide to cyberbullyingParents guide to cyberbullying
Parents guide to cyberbullying
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Stop Cyberbullying Parent Presentation

  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Can Cyber-Bullying Be Tracked???? Sending cyber messages can be traced. Every computer contains an unique address that can be traced by your Internet Service Provider. JUST BECAUSE YOU HIT DELETE, DOES NOT MEAN THAT YOUR MESSAGE HAS BEEN DELETED! It can still be tracked!!!! SENDING INAPPROPRIATE MESSAGES CAN GET YOUR CHILD AND YOU THE PARENT IN SERIOUS TROUBLE!!!
  • 8.
  • 9.
  • 10. This information has been compiled for you from the www.stopcyberbullying.org website. Created by: Rachel R. Adams and Shawna P. Crum Pike County Adult Education Instructors