Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Stop Cyber-bullying!

This presentation talks about what Cyberbullying is and how students can work to stop it.
by

Ben Dimond

on 25 November 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Stop Cyber-bullying!

Cyberbullying!
STOP
What is Bullying?
1. Bullying is unfair and one-sided

2. It happens when someone keeps hurting, frightening, threatening, or leaving someone out on purpose.
What is "Cyber"-Bullying?
* Sending or posting harmful material or doing other forms of aggression using the internet or other technology.
- Using email, cell phones, social networking sites, IMs, texts, blogs, or other personal technology to hurt other people.

For Example:
You have used a cell phone
You have used email, chat rooms, Instant Messaging, Instagram, Facebook, Twitter, Snapchat, or any other sites.
You have been online
You have used a computer
Please raise your
hand if you
HAVE done any
of the following
things in the
past week:

http://www.kstp.com/article/12303/?vid=3021977&v=1
Real Cyber-bullying in Minnesota!
Common Types of Cyberbullying:
*
Flaming:
- Online fights using electronic messages
with vulgar language.

*
Harassment:
- Repeatedly sending nasty, mean and
insulting messages

*
Denigration:
- "Dissing" someone online. Sending or
posting gossip or rumors about a person to damage his or her reputation or friendships.

*
Impersonation:
- Pretending to be someone else
- Sending/posting stuff to get that person
in trouble or danger or to damage that person's reputation/friendships
*
Outing:
- Sharing someone's secrets,
embarrassing information or images.

*
Trickery:
- Tricking someone into revealing secrets
or embarrassing information, then sharing it online.

*
Exclusion:
- Intentionally and cruelly excluding
someone from an online group.

*
"Cyber-stalking":
-
Repeated, intense harassment and
denigration that includes threats or creates significant fear
What type of Cyber-bullying is each scenario?
"Traditional" Bullying
Cyber-Bullying
How are these two forms of Bullying the same?
How are they different?
How to prevent Cyber-Bullying:
REFUSE
to pass along cyber-bullying messages
DON'T RESPOND

to rude and harassing emails, messages, and postings
TELL OTHERS TO

STOP
cyber-bullying
BLOCK

cyber-bullies
REPORT

cyber-bullying to an adult
All of these are forms of cyber-technology.
All of these can be used to cyber-bully.
What do all of these things have in common?
Extra tips concerning cyber-bullying:
DON'T DELETE

messages or posts from cyber-bullies because they can be used to take action against the bully
- Even if you do delete messages and pictures, they are still saved by the sites themselves
AVOID

sites where attacks have been known to happen.
Change your email address, account, username, or phone # if necessary.
~ What else do we know about bullying?
Tips for Staying Safe:
Remember that the internet is accessed by millions of people all over the world
Never post or share your personal information online
Never share your passwords with anyone, except your parents
Talk with your parents about what you do online
If you wouldn't say it in person, DON'T SAY IT ONLINE.

Delete Cyber-bullying.

DON'T WRITE IT. DON'T FORWARD IT.
YOU Can
References
Presentation adapted from "Stop Cyberbullying", Katie Gerdts (2013)
Talent Show - Cyberbullying Prevention Commercial. (2008). Youtube.com
Fairmont Bullying. KSTP-TV, LLC. (2011). http://kstp.com/article/12303/?vid=3021977&v=1
Second Step. (2012). http://www.secondstep.org
Full transcript