Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Cyber-Bullying

No description
by

Olivia Paige

on 30 September 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Cyber-Bullying

Cyber-Bullying
Introduction
Olivia Paige
September 27, 2013

This project will explain how to identify cyber-bullying and how to prevent/avoid it.
What is cyber-bullying?
Cyber-bullying is defined as the use of electronic communication to bully someone, typically by sending messages of an intimidating or threatening nature.
It consists of using the internet or other technologies to harm or harass others in a deliberate, repeated, and hostile manner.
Cyber-bullying laws?
The safety of schools is finally becoming a focus of law enforcement. School bullying and harassment policies are being created to provide students protection from cyber-bullying and make it clear that it will not be tolerated or go unnoticed.
Many states are also enforcing cyber-bullying and harassment laws that are stating that cyber-bullying can be considered a criminal offense with serious repercussions.
It's taken a while for laws to keep up with social media because for a while, people didn't take social media harassment seriously or believe that anything could be done to prevent it.
Sharing personal information online
Sharing personal information online may seem like no big deal but it can be very dangerous.
People can get information about you online by looking through the profiles and information you have posted about yourself online; many people don’t realize how much they actually post online. People can also find information by searching off of the little personal information you have posted.
It's also important to think about what you're sharing online before you post it: is it respectful? Is it necessary? Is is true? Would you want your parents to see it?
Keyboard Bravery
Feeling anonymous can affect someone’s tendency to cyber-bully because the bully doesn’t have to physically see the victim’s reaction to what is being said. This is commonly referred to as "keyboard bravery." Hiding behind a computer screen allows you to think about what you want to say and word it carefully, yet ultimately say whatever you want because you don’t have to have the courage to say it to someone’s face.
People say things just because they think they have the freedom to do so, even if they don’t mean it, without thinking of how it affects the other person or the repercussions of the situation. This can cause cyber-bullying to get extremely intense and personal even if it was never intended from the start.
Examples of Cyber-bullying
Jodi Plumb is a teenage girl who lives in Mansfield, Nottinghamshire. She found a website made by some kids at her school which bashed her for her weight and other cruel comments, including an estimated time of death. The website provoked people to attack her in school and several people even took pictures of her for the website.
David Knight
David Knight is a teenage boy from Burlington, Ontario. David had been a victim of cyber-bullying for several months before he even realized it was occurring.
Some kids at his school had created a website making fun of him and his family to invite others to join the page, calling him a pedophile, a homosexual, and dirty.
Amanda Marcuson
Amanda is a young girl from Birmingham, Michigan. Some girls from school stole her things one day and she reported it to retrieve what was hers. The girls who had taken her belongings were angry with her for getting them in trouble, so they sent her a surplus of instant messages calling her mean names and accusing her of being a tattletale. Amanda tried to defend herself but the girls continued harassing her, yet never said a word of it to her face.
What can/should be done?
It's important to help people understand the severity of the effects cyber-bullying can have and the serious consequences that can result for both the victim and the bully. If we want kids to believe that cyber-bullying is a serious matter, we have to treat it seriously. There should be serious reprimanding for cyber-bullies to make them understand it won't be tolerated. It's just as important to make sure kids who are being cyber-bullied know they have someone to turn to and that what is happening to them isn't okay.
Citations
"Real Life Examples of Cyber-bullying - Cease Cyber-bullying." Real Life Examples of Cyber-bullying - Cease Cyber-bullying. N.p., n.d. Web. 30 Sept. 2013.
"STOP Cyberbullying: What Is Cyberbullying, Exactly?" STOP Cyberbullying: What Is Cyberbullying, Exactly? N.p., n.d. Web. 30 Sept. 2013.
http://www.ncsl.org/issues-research/educ/cyberbullying.aspx
"What Is Cyberbullying?" Sgrouples Online Privacy Blog. N.p., n.d. Web. 30 Sept. 2013.

Images:
http://truce.castleberryisd.net/UserFiles/Servers/Server_885451/Image/STOP%20Cyberbullying%20Logo.JPG
http://4.bp.blogspot.com/-SNCaVqspi_Q/UBKIcrribUI/AAAAAAAAGc4/5mXUr24r9O0/s1600/4280254856_ecb6b435f0.jpg
http://www.dosomething.org/files/styles/blog_landscape/public/pictures/cyber%20bully%203%20final.jpg?itok=b8xLFgks
http://infactcollaborative.com/wp-content/uploads/2011/11/Cyber-bullying-facts-Threating-email.jpg
http://3.bp.blogspot.com/-CnjRTS07Tfw/UGTCCIatzqI/AAAAAAAAAGE/3LdR55JJD3w/s1600/cyberbullying2.jpg
http://blog.sgrouples.com/wp-content/uploads/2013/03/cyberbullying_2_1.jpg
Full transcript