17
Cyber Bullyin g

Cyberbullying

Embed Size (px)

DESCRIPTION

Cyberbullying presentation for teachers

Citation preview

  • 1. Cyber Bullying

2. What is Cyberbullying? 3. What is Cyberbullying? Cyberbullying s br- -l-i, -b noun bu -The use of digital media tools, such as the Internet and cell phones, to deliberately and repeatedly hurt, harass, or embarrass someone else. 4. Together, we can: Prevent kids from adopting bullying behaviorSupport kids who are targetedInspire the other 2/3 of kids stop bullying when they see it 5. Cyberbullying in Elementary School Being mean onlineName-calling or hurtful comments in emails, games, or messagesUsing another childs passwords to: Deface games or cheat in worlds like Club Penguin Get the other child in trouble with friends or parents Send fake emails or instant messagesBridges school and homeKids dont always connect actions to outcomesCyberbullies arent always kids wed expectTargets commonly experience sadness, social anxiety, or acting out 6. Cyberbullying in Middle School Being mean online or digital dramaExamples of cyberbullying behavior: Publicly sharing messages or images meant to be private sometimes sexting Repeatedly sending hurtful, harassing, or threatening messages Spreading rumors, lies, or embarrassing stories Posting cruel comments on the Internet Setting up fake social networking pages to make fun of targetsCyberbullies arent always the kids wed expectSocial pressure often motivates behaviorMore public, permanent, and inescapable than traditional school yard bullying Targets commonly experience sadness, social anxiety, or acting out Crosses-over between school and home 7. How Does A Cyberbully Attack? Using technology such as: The Internet (including e-mail, social media, interactive gaming, instant messaging, etc.) Cell Phones (including text messages, photos, etc.) 8. Instant Messaging/ Text Messaging Sending hateful or threatening messages to other kids Creating a similar screen Text wars or text attacks Texting threats 9. Emmas Story 10. Stealing Passwords and Impersonating Impersonating another child in chats Change victims profile Lock victim out of their own account 11. Blogs Post negative messages about someone Damaging gossip to ruin reputations Invasion of privacy and personal lives Creating pages for humiliation 12. Social Networking 1. Have their accounts stolen. 2. Have negative things posted on the network message boards. 3. Harsh comments made to their photos. 4. Threatening emails sent to their account. 5. Blocked from users who pretended to be their friend just to hurt them. 13. Interactive Gaming Any electronic game and involves human interaction with other online users. Verbal abuse Threats Lewd language Hacking their account Locked out of their game 14. Internet Polls 15. Dealing WithCyberbullying TargetBullyOffer support Help them stop it Stand up for them Prevent future incidentsAcknowledge the problem Appeal to their feelings Enact consequences Get help if neededBystanderUpstanderThank them for sharing Encourage action Keep the lines openCommend their good choices Encourage community 16. Start the Conversation Discuss what it means to be a good friend Talk about online vs. offline talk Model good communication Ask if theyve seen kids being mean online Encourage the stand up, not stand by policy Emphasize that your door is always open 17. Information provided fromwww.commonsense.org/cyberbullyinghttp://stopcyberbullying.org/