SlideShare una empresa de Scribd logo
1 de 8
Answer these questions:
•How many of you have ever received a mean or threatening
e-mail or IM (FB, BBM, SMS, etc)?
•If so, did you tell anyone? Who?
•Have you ever received e-mails or IM’s from someone you
did not know?
•Did you respond to them? Why? Or why not?
•What would you do if you knew a friend of yours was
sending threatening anonymous e-mails or IM’s to someone?
•What is your theory about why people send bad messages
via the Internet?
•How would you propose that this type of “bullying” be
stopped?
Answer these questions on a Word document:
•What are one or two words to describe your feelings about his
film?
•Have you ever been frightened like Susan was from a message
being sent to you via-email or through an IM?
•What would you guess are the reasons why Amanda decided to
threaten Susan through the Internet?
•How can “just teasing” your friends this way be dangerous?
•What do you think would have happened if Susan had told her
parents what was being e-mailed to her?
•What do you think should happen to Amanda for what she did?
•If you were one of Susan’s friends, what action would you take
considering what happened to your friend?
•If you were to write a conclusion to this film, how would you have
it end?
Create a Digital Poster (Glogster)that will include:
1. Statistics of abductions(kidnaps) or deaths due to cyber bullying. Include
some examples of the most known stories.
2. Trace the history of internet usage and abuse over the past 10 years. You
may show it as a timeline.
3. Create a mind map with all the CC values(
trustworthiness, respect, responsibility, fairness, caring, citizenship) and
how each of them can be applied to cyber bullying
4. Generate a list of rules on basic safety for students in the correct use of the
internet.
5. Show some ways of cyber bullying
6. Say a message to ALL the world about how and why we should stop Cyber
bullying. And what can you do if it happens
• You may include:
a. a speaking avatar
b. Images
c. Videos
d. Sounds
http://wiigamer.glogster.com/Whats-Bullying/
http://xxroboticzxx.glogster.com/Stop-Cyberbullying/
Assignment

Possible tools
or web 2.0
options to use

1. Statistics of abductions(kidnaps) or deaths due to cyber
bullying. Include some examples of the most known stories.

You tube
videos, Voki
,sound recorder

2. Trace the history of internet usage and abuse over the past 10
years. You may show it as a timeline.

timetoast, dipity, ex
cel

3. Create a mind map with all the CC values(
trustworthiness, respect, responsibility, fairness, caring, citizens
hip) and how each of them can be applied to cyber bullying

Popplet, mindomo

4. Generate a list of rules on basic safety for students in the
correct use of the internet.

Prezi, voki, text,
sound recorder

5. Show some ways of cyberbullying

Wordle, tagul,
tagxedo, text,
image

6. Say a message to ALL the world about how and why we should
stop Cyber bullying. And what can you do if it happens.

Doppel me, voki
Resources
Computer history
• http://www.computerhistory.org/highlights/publicweb20th/
Cyberbullying resources:
• https://docs.google.com/a/cag.edu.gt/viewer?a=v&pid=gmail&attid=0.2&thid=12f073
13ff3049ed&mt=application/pdf&url=https://mail.google.com/mail/u/0/?ui%3D2%26ik
%3Db8ddbf4b50%26view%3Datt%26th%3D12f07313ff3049ed%26attid%3D0.2%26
disp%3Dsafe%26realattid%3D3cf3305559982028_0.2%26zw&sig=AHIEtbR_qE_gF
7kdGGuNZ85wIRuZMb-Yxg
• http://charactercounts.org/pdf/bullying/CyberbullyingOnlineResources.pdf
• http://charactercounts.org/chron/2011/01/07/decreasebullying/
• http://www.edweek.org/tm/articles/2011/09/06/bullying_bb.html

Web 2.0 Tools
• http://edu.glogster.com/
• http://www.doppelme.com/
• http://prezi.com/
• http://www.voki.com/
• http://www.youtube.com/
• http://cooltext.com/

•
•
•
•
•
•

http://www.wordle.net/
http://www.popplet.com/
http://www.mindomo.com/
http://www.tagxedo.com/
http://tagul.com/
http://www.timetoast.com/
“Cyber bullying involves the use of
information and communication
technologies to support deliberate,
repeated, and hostile behavior by
an individual or group, that is
intended to harm others.“
Bill Belsey
http://www.youtube.com/watch?v=pmD8OKl8vVM – Kitchen bullying..
http://www.youtube.com/watch?v=CE2Ru-jqyrY – Once posted…
http://www.youtube.com/watch?v=sZPDjz7L0Uw&feature=related – Words hurt
https://www.youtube.com/watch?feature=player_embedded&v=QX9iUnyV55Y –
Online Safety
My understanding:

Word:

Description:

Drawing:

1

2

3

4

5

Más contenido relacionado

La actualidad más candente

Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation introkscheidy
 
Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYINGRene Ge
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingpscl
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingsus22
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying griehl
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointHannahMorrell
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpointjosiebrookeday
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*Amber Dee
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingJoe Gauder
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power pointmb29thom
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingMarc Kuhn
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullyingsepulvedamd
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying PresentationCourtney Cole
 

La actualidad más candente (20)

Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
 
Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYING
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power point
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Similar a Cyberbullying assignment

Cyberbullying Assignment - Inbox The movie
Cyberbullying Assignment - Inbox The movieCyberbullying Assignment - Inbox The movie
Cyberbullying Assignment - Inbox The movieMichelle Urdiales
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
Etiquette in the Digital World
Etiquette in the Digital WorldEtiquette in the Digital World
Etiquette in the Digital Worldmgastgoodman
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for ParentsRodolfo Salazar
 
Social Media - The Good, The Bad, and The Ugly
Social Media  - The Good, The Bad, and The UglySocial Media  - The Good, The Bad, and The Ugly
Social Media - The Good, The Bad, and The UglyDr. Joel Evans
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipErica Reid
 
Internet 1 lesson plan
Internet 1 lesson planInternet 1 lesson plan
Internet 1 lesson planQuennith
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 
Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1Quennith
 
Internet safety guide
Internet safety guide Internet safety guide
Internet safety guide Dee Tutino
 
Internet safety-presentation(1)
Internet safety-presentation(1)Internet safety-presentation(1)
Internet safety-presentation(1)andreburtont
 

Similar a Cyberbullying assignment (20)

Cyberbullying Assignment - Inbox The movie
Cyberbullying Assignment - Inbox The movieCyberbullying Assignment - Inbox The movie
Cyberbullying Assignment - Inbox The movie
 
Bully
BullyBully
Bully
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Etiquette in the Digital World
Etiquette in the Digital WorldEtiquette in the Digital World
Etiquette in the Digital World
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
 
Chatter
ChatterChatter
Chatter
 
Social Media - It Can Be Good, Bad, and Ugly
Social Media  - It Can Be Good, Bad, and UglySocial Media  - It Can Be Good, Bad, and Ugly
Social Media - It Can Be Good, Bad, and Ugly
 
Social Media - The Good, The Bad, and The Ugly
Social Media  - The Good, The Bad, and The UglySocial Media  - The Good, The Bad, and The Ugly
Social Media - The Good, The Bad, and The Ugly
 
Myspace
MyspaceMyspace
Myspace
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
What Is Spam
What Is SpamWhat Is Spam
What Is Spam
 
Internet 1 lesson plan
Internet 1 lesson planInternet 1 lesson plan
Internet 1 lesson plan
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Internet safty
Internet saftyInternet safty
Internet safty
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1
 
Internet safety guide
Internet safety guide Internet safety guide
Internet safety guide
 
Internet safety-presentation(1)
Internet safety-presentation(1)Internet safety-presentation(1)
Internet safety-presentation(1)
 

Último

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Último (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Cyberbullying assignment

  • 1.
  • 2. Answer these questions: •How many of you have ever received a mean or threatening e-mail or IM (FB, BBM, SMS, etc)? •If so, did you tell anyone? Who? •Have you ever received e-mails or IM’s from someone you did not know? •Did you respond to them? Why? Or why not? •What would you do if you knew a friend of yours was sending threatening anonymous e-mails or IM’s to someone? •What is your theory about why people send bad messages via the Internet? •How would you propose that this type of “bullying” be stopped?
  • 3. Answer these questions on a Word document: •What are one or two words to describe your feelings about his film? •Have you ever been frightened like Susan was from a message being sent to you via-email or through an IM? •What would you guess are the reasons why Amanda decided to threaten Susan through the Internet? •How can “just teasing” your friends this way be dangerous? •What do you think would have happened if Susan had told her parents what was being e-mailed to her? •What do you think should happen to Amanda for what she did? •If you were one of Susan’s friends, what action would you take considering what happened to your friend? •If you were to write a conclusion to this film, how would you have it end?
  • 4. Create a Digital Poster (Glogster)that will include: 1. Statistics of abductions(kidnaps) or deaths due to cyber bullying. Include some examples of the most known stories. 2. Trace the history of internet usage and abuse over the past 10 years. You may show it as a timeline. 3. Create a mind map with all the CC values( trustworthiness, respect, responsibility, fairness, caring, citizenship) and how each of them can be applied to cyber bullying 4. Generate a list of rules on basic safety for students in the correct use of the internet. 5. Show some ways of cyber bullying 6. Say a message to ALL the world about how and why we should stop Cyber bullying. And what can you do if it happens • You may include: a. a speaking avatar b. Images c. Videos d. Sounds http://wiigamer.glogster.com/Whats-Bullying/ http://xxroboticzxx.glogster.com/Stop-Cyberbullying/
  • 5. Assignment Possible tools or web 2.0 options to use 1. Statistics of abductions(kidnaps) or deaths due to cyber bullying. Include some examples of the most known stories. You tube videos, Voki ,sound recorder 2. Trace the history of internet usage and abuse over the past 10 years. You may show it as a timeline. timetoast, dipity, ex cel 3. Create a mind map with all the CC values( trustworthiness, respect, responsibility, fairness, caring, citizens hip) and how each of them can be applied to cyber bullying Popplet, mindomo 4. Generate a list of rules on basic safety for students in the correct use of the internet. Prezi, voki, text, sound recorder 5. Show some ways of cyberbullying Wordle, tagul, tagxedo, text, image 6. Say a message to ALL the world about how and why we should stop Cyber bullying. And what can you do if it happens. Doppel me, voki
  • 6. Resources Computer history • http://www.computerhistory.org/highlights/publicweb20th/ Cyberbullying resources: • https://docs.google.com/a/cag.edu.gt/viewer?a=v&pid=gmail&attid=0.2&thid=12f073 13ff3049ed&mt=application/pdf&url=https://mail.google.com/mail/u/0/?ui%3D2%26ik %3Db8ddbf4b50%26view%3Datt%26th%3D12f07313ff3049ed%26attid%3D0.2%26 disp%3Dsafe%26realattid%3D3cf3305559982028_0.2%26zw&sig=AHIEtbR_qE_gF 7kdGGuNZ85wIRuZMb-Yxg • http://charactercounts.org/pdf/bullying/CyberbullyingOnlineResources.pdf • http://charactercounts.org/chron/2011/01/07/decreasebullying/ • http://www.edweek.org/tm/articles/2011/09/06/bullying_bb.html Web 2.0 Tools • http://edu.glogster.com/ • http://www.doppelme.com/ • http://prezi.com/ • http://www.voki.com/ • http://www.youtube.com/ • http://cooltext.com/ • • • • • • http://www.wordle.net/ http://www.popplet.com/ http://www.mindomo.com/ http://www.tagxedo.com/ http://tagul.com/ http://www.timetoast.com/
  • 7. “Cyber bullying involves the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm others.“ Bill Belsey http://www.youtube.com/watch?v=pmD8OKl8vVM – Kitchen bullying.. http://www.youtube.com/watch?v=CE2Ru-jqyrY – Once posted… http://www.youtube.com/watch?v=sZPDjz7L0Uw&feature=related – Words hurt https://www.youtube.com/watch?feature=player_embedded&v=QX9iUnyV55Y – Online Safety