Cyberbullying - davis.k12.ut.us

Download Report

Transcript Cyberbullying - davis.k12.ut.us

News Anchor
Story
What is Cyber
Bullying?
Technologies
Forms of
Cyberbullying
Facts
Glossary
Consequences
Broken
Friendship
You Can’t
Take it Back
Quiz
What Now?
WHAT IS CYBERBULLYING
Cyberbullying occurs when
teens use communication
technology to say hurtful,
embarrassing, or threatening
things about another teen.
Cyberbullying can be very
emotionally damaging to
teens, and can have legal
consequences for teens and
parents.
Back
Next
TECHNOLOGIES USED
Cyberbullying can come through many types of technology,
including:

Emails

Instant messages sent over the Internet

Chat rooms, where teens talk to each other online

Text messages sent to a teen's cell phone

Web sites

Blogs, or web logs, which are public online journals
Next
TECHNOLOGIES USED

Interactions through online games

Social networking sites, like Facebook and MySpace, where
individuals have a page about themselves where others can
post messages

Twitter, which sends short messages to a teen’s online account
and cell phone
Back
Next
FORMS OF CYBERBULLYING
There are many types of Cyberbullying, including:

Sending mean messages to a person through email or text

Spreading rumors or lies about someone online through email
or text

Excluding someone from online social groups

Creating a web site to make fun of someone

Threatening or harassing someone online

Tricking someone into sharing secrets and then spreading that
information around
Next
FORMS OF CYBERBULLYING
More forms of Cyber Bullying:

Taking pictures of a person and sharing them online without
the person's consent.

Posting hurtful or threatening messages on social networking
sites or web pages

Stealing a person's account information to break into their
account and send damaging messages

Pretending to be someone else online to hurt another person

Sexting, or circulating sexually suggestive pictures or messages
about a person
Back
Next
FACTS ABOUT CYBERBULLYING
Visit DoSomething.org to find facts about cyberbullying
List the 6 facts you think apply most to you
Back
Next
GLOSSARY OF TERMS
Flaming: Online fights using electronic messages
with angry and vulgar language.
Harassment: Repeatedly sending offensive, rude
and insulting messages.
Cyberstalking: Repeatedly sending message that
include threats of harm or are highly intimidating;
engaging in other online activities that make a
person afraid for his or her safety.
Next
GLOSSARY OF TERMS
Denigration: “Dissing” someone online. Sending or
posting cruel gossip or rumors about a person to
damage his or her reputation or friendships.
Exclusion: Intentionally excluding someone from an
online group, like a “buddy list” or a game.
Trolling: Intentionally posting provocative messages
about sensitive subjects to create conflict, upset
people, and bait them into “flaming” or fighting.
Next
GLOSSARY OF TERMS
Impersonation: Breaking into someone’s account,
posing as that person and sending messages to
make the person look bad, get that person in
trouble or danger, or damage that person's
reputation or friendships.
Outing and trickery: Sharing someone’s secrets or
embarrassing information online. Tricking someone
into revealing secrets or embarrassing information,
which is then shared online.
Back
Next
CONSEQUENCES
Under the Utah Criminal Code, electronic
communication harassment of a minor is a third
degree felony.
Next
CONSEQUENCES

Utah defines electronic communication
harassment as communication "with intent to
annoy, alarm, intimidate, offend, abuse,
threaten, harass, frighten, or disrupt the
electronic communications of another person".
This includes communicating insults, taunts,
challenges, threats to inflict injury, physical harm,
or threats to damage property.
Next
CONSEQUENCES

Back
Electronic communication harassment can be as
simple as repeated trying to contact a person or
their electronic device after the person has
asked you not to contact them. Causing
someone's electronic device to ring excessively
to the point that it causes a disruption or
jamming/overloading a system through
excessive message traffic is electronic
communication harassment.
Next
VIDEOS
Broken Friendship and You Can’t Take it Back
Netsmartz.org Real Life Stories
Back
Next
QUIZ
Are you a Cyberbully?
Take the Quiz…What is your score?
Cyberbully quiz
Back
Next
WHAT DO DO ABOUT
CYBERBULLYING
Review the tips below so you can be prepared if you are ever
the victim of Cyberbullying:

Tell an adult you trust about what is happening!

Do not respond to rude e-mails, messages, and comments.

Save the evidence, such as e-mail and text messages, and
take screenshots of comments and images. Also, take note of
the date and time when the harassment occurs.

Contact your Internet service provider (ISP) or cell phone
provider. Ask the website administrator or ISP to remove any
Web page created to hurt your you.
Next
WHAT DO DO ABOUT
CYBERBULLYING

If harassment is via e-mail, social networking sites, IM, and chat
rooms, “block” bullies or delete your current account and
open a new one.

If harassment is via text and phone messages, change your
phone number and only share the new number with
trustworthy people. Also, check out phone features that may
allow the number to be blocked.

Get your school involved. Learn the school’s policy on
cyberbullying and urge administrators to take a stance against
all forms of bullying.

Make a report to www.cybertipline.com, and if you feel
something illegal has occurred, inform law enforcement.
Next
WHAT DO YOU THINK
ABOUT CYBERBULLYING?
Record your thoughts in your listening guide