SlideShare una empresa de Scribd logo
1 de 17
WHAT PARENTS NEED TO KNOW
CYBER BULLYING
Presented by Jill Sooy
What is Cyber Bullying?
 Cyber bullying involves sending or posting
harmful or cruel text or images using the
Internet (instant messaging, e-mails, chat
rooms, or social networking sites) or other
digital communication devices such as cell
phones. It can involve stalking, threats,
harassment, impersonation, humiliation,
trickery, and exclusion.
The Facts:
 93% of teens 12-17 go online
 63% of online teens go online daily
 89% on online teen go online from home, and most of
them go online from home most often.
 77% go online at school
 71% go online from friends or relatives homes
 60% go online from a library
 27% go online from their mobile phone
 76% of household with teens go online via broadband,
10% via dial up, and 12% do not have access at home.
Teen Connections
 75% of teens have a cell phone
 No gender or race/ethnic differences in ownership
 50% of teens with phones talk to friends daily
 54% of teens send test messages daily
 27% use their phone to go online
 73% of teens use an online social network site
 37% of SNS users send messages through social
networks daily
 80% of teens have a game console
 51% of teens have a portable gaming device
 Teens connect and interact with others online through games
Bullying Statistics
 42% of kids have been bullied online. 1 in 4 have
had it happen more than once.
 35% have been threatened. Nearly 1 in 5 have
had it happen more than once.
 21% have received mean or threatening e-mail.
 53% admit having said something hurtful to
another person online.
 58% have not told their parents about something
hurtful done to them online.
 Based on 2004 i-SAFE survey on 1500 students in grades 1-4
Quiz for Parents
 Do you know what this means?
WUF
RUUP4IT
PAW
P911
MOTOS
IPN
What Parents Can Do to Help
 Talk with kids about risks of the Internet
 Learn what kids are doing on line and keep
track of online behavior
 Become familiar with sites kids visit (My
Space, Facebook,Twitter, etc.)
 Remind them to never give out personal info
 Remind kids they should never meet face-to-
face with someone they meet online.
Continued…
 Share examples of inappropriate incidents
that can happen online
 Communicate online rules to kids and enforce
rules with consequences
 Keep computers in a place where online
activity is hard to hide
 Explain that cyber bullies aren’t always
anonymous; they can be traced and located
 Use parental controls & tracking programs
What To Do if
Your Child is Bullied
 Be aware of warning signs
 Reluctance to use the computer
 Change in mood or behavior
 Reluctance to go to school
 Poor school performance
 Be alert that your child could be bullying
others
 Document any bullying
What To Do Continued…
 Tell child you won’t blame them if bullied.
 One main reason kids don’t tell adults is fear of
losing computer privileges
 Contact the school to seek help from school
psychologist, counselor, and principal
 File a complaint with the web site, ISP, or cell
phone company
 Contact the police if the cyber bullying
includes threats
What Kids Need to Know
 Never give out personal information online
 Do not tell anyone you password, even
friends
 Do not retaliate
 It can escalate the harassment & make it unclear
who was the aggressor
 Tell the bully to stop or ignore
 Make hard copies
 Show and adult before deleting anything
Continued…
 Block future communication and clean up
buddy lists
 Do not say anything online you are not
comfortable having other people know
 If a friend cyber bullies, tell them to stop
School Response
 Incorporate cyber bullying into all relevant
school policies
 Bullying
 Harassment
 Internet and cell phone policies
 Determine the extent of cyber bullying in the
school population
 Educate staff members, students, and
parents about cyber bullying
School Response continued…
 Closely monitor students’ computer use at
school. Use filtering and tracking software.
 Teach student internet safety
 Investigate all reports of cyber bullying NOW
 Support student who are victims
 Understand legal obligations and restrictions
 Contact police if acts involve threats,
extortion, harassment, or hate crimes
Cyber Bullying Effects
on Health
 Sleep disturbances
 Feelings of sadness or anger
 Stomach pain
 Headaches
 Anxiety
 Depression
 Substance abuse
 Suicidal thoughts
Cyber Bullying Effects on
School Performance
 Absenteeism
 Behavior problems
 Lack of confidence
 Declining performance in the classroom
 Limited goals for the future and decreased
desire to do well
Conclusion
 Ryan Halligan’s story and short video clip
 FinalThoughts
 Questions and Answers

Más contenido relacionado

La actualidad más candente

Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaamiliarguelles
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaasofisalazar00
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying estegiulimazziotti96
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngmiliarguelles1
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyinglheikkila
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying PresentationMegan Townes
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingsmeech
 
Digital Parenting Infographic
Digital Parenting InfographicDigital Parenting Infographic
Digital Parenting InfographicuKnow.com
 
Cyberbullying tips from connect safely
Cyberbullying tips from connect safelyCyberbullying tips from connect safely
Cyberbullying tips from connect safelyCurso RRSS
 
Statistics and salient information
Statistics and salient informationStatistics and salient information
Statistics and salient informationsmithmpa
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 

La actualidad más candente (19)

Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying este
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Parents must know about cyber bullying 2
Parents must know about cyber bullying  2Parents must know about cyber bullying  2
Parents must know about cyber bullying 2
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Safety @ Cyber
Safety @ CyberSafety @ Cyber
Safety @ Cyber
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying Presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
 
Digital Parenting Infographic
Digital Parenting InfographicDigital Parenting Infographic
Digital Parenting Infographic
 
Parents must know about cyber bullying 1
Parents must know about cyber bullying 1Parents must know about cyber bullying 1
Parents must know about cyber bullying 1
 
Cyberbullying tips from connect safely
Cyberbullying tips from connect safelyCyberbullying tips from connect safely
Cyberbullying tips from connect safely
 
Statistics and salient information
Statistics and salient informationStatistics and salient information
Statistics and salient information
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 

Similar a Inservice cyberbullyingpwpt

Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaAndri Priyatna
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eveSimonBalle
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet SafetyMark Deming
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safetyrehmannb
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010adewolfe
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents PresentationToby Treacher
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safelysam31
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson Martinez
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngmiliarguelles1
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trElmer Sunga
 

Similar a Inservice cyberbullyingpwpt (20)

Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
Cyberbully
CyberbullyCyberbully
Cyberbully
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safety
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshare
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-tr
 

Último

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 

Último (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

Inservice cyberbullyingpwpt

  • 1. WHAT PARENTS NEED TO KNOW CYBER BULLYING Presented by Jill Sooy
  • 2. What is Cyber Bullying?  Cyber bullying involves sending or posting harmful or cruel text or images using the Internet (instant messaging, e-mails, chat rooms, or social networking sites) or other digital communication devices such as cell phones. It can involve stalking, threats, harassment, impersonation, humiliation, trickery, and exclusion.
  • 3. The Facts:  93% of teens 12-17 go online  63% of online teens go online daily  89% on online teen go online from home, and most of them go online from home most often.  77% go online at school  71% go online from friends or relatives homes  60% go online from a library  27% go online from their mobile phone  76% of household with teens go online via broadband, 10% via dial up, and 12% do not have access at home.
  • 4. Teen Connections  75% of teens have a cell phone  No gender or race/ethnic differences in ownership  50% of teens with phones talk to friends daily  54% of teens send test messages daily  27% use their phone to go online  73% of teens use an online social network site  37% of SNS users send messages through social networks daily  80% of teens have a game console  51% of teens have a portable gaming device  Teens connect and interact with others online through games
  • 5. Bullying Statistics  42% of kids have been bullied online. 1 in 4 have had it happen more than once.  35% have been threatened. Nearly 1 in 5 have had it happen more than once.  21% have received mean or threatening e-mail.  53% admit having said something hurtful to another person online.  58% have not told their parents about something hurtful done to them online.  Based on 2004 i-SAFE survey on 1500 students in grades 1-4
  • 6. Quiz for Parents  Do you know what this means? WUF RUUP4IT PAW P911 MOTOS IPN
  • 7. What Parents Can Do to Help  Talk with kids about risks of the Internet  Learn what kids are doing on line and keep track of online behavior  Become familiar with sites kids visit (My Space, Facebook,Twitter, etc.)  Remind them to never give out personal info  Remind kids they should never meet face-to- face with someone they meet online.
  • 8. Continued…  Share examples of inappropriate incidents that can happen online  Communicate online rules to kids and enforce rules with consequences  Keep computers in a place where online activity is hard to hide  Explain that cyber bullies aren’t always anonymous; they can be traced and located  Use parental controls & tracking programs
  • 9. What To Do if Your Child is Bullied  Be aware of warning signs  Reluctance to use the computer  Change in mood or behavior  Reluctance to go to school  Poor school performance  Be alert that your child could be bullying others  Document any bullying
  • 10. What To Do Continued…  Tell child you won’t blame them if bullied.  One main reason kids don’t tell adults is fear of losing computer privileges  Contact the school to seek help from school psychologist, counselor, and principal  File a complaint with the web site, ISP, or cell phone company  Contact the police if the cyber bullying includes threats
  • 11. What Kids Need to Know  Never give out personal information online  Do not tell anyone you password, even friends  Do not retaliate  It can escalate the harassment & make it unclear who was the aggressor  Tell the bully to stop or ignore  Make hard copies  Show and adult before deleting anything
  • 12. Continued…  Block future communication and clean up buddy lists  Do not say anything online you are not comfortable having other people know  If a friend cyber bullies, tell them to stop
  • 13. School Response  Incorporate cyber bullying into all relevant school policies  Bullying  Harassment  Internet and cell phone policies  Determine the extent of cyber bullying in the school population  Educate staff members, students, and parents about cyber bullying
  • 14. School Response continued…  Closely monitor students’ computer use at school. Use filtering and tracking software.  Teach student internet safety  Investigate all reports of cyber bullying NOW  Support student who are victims  Understand legal obligations and restrictions  Contact police if acts involve threats, extortion, harassment, or hate crimes
  • 15. Cyber Bullying Effects on Health  Sleep disturbances  Feelings of sadness or anger  Stomach pain  Headaches  Anxiety  Depression  Substance abuse  Suicidal thoughts
  • 16. Cyber Bullying Effects on School Performance  Absenteeism  Behavior problems  Lack of confidence  Declining performance in the classroom  Limited goals for the future and decreased desire to do well
  • 17. Conclusion  Ryan Halligan’s story and short video clip  FinalThoughts  Questions and Answers