Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Internet Safety

Discussion about Cyber Bullying & other Internet Safety Advice

Adnan Iftekhar

on 27 May 2011

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Internet Safety

CYBER BULLYING IS… Being cruel to others by sending or posting harmful
material using technological means Also known as:
‘Electronic Bullying’ &
‘Online Social Cruelty’ an individual or group that uses
information and communication involving
electronic technologies to facilitate
deliberate and repeated harassment or
threat to an individual or group. CYBER BULLY CATEGORIES Inadvertent Role-play May not realize it’s cyber bullying Vengeful Angel Protecting themselves Righting wrongs Mean Girls (and boys) Ego based; promote own social status Bored; Entertainment Often do in a group Power-Hungry Controlling with fear Want reaction Revenge Throw ‘cyber-weight’ around Often Victims of school-yard bullies CYBER BULLYING TYPES “Flaming”: Online fights using electronic messages with angry and vulgar language “Harassment”: Repeatedly sending offensive, rude, and insulting messages “Cyber stalking”: Repeatedly sending messages that include threats of harm or are highly intimidating. “Denigration”: ‘Dissing’ someone online. Sending or posting cruel gossip or rumors about a person to damage his or her reputation or friendships. “Impersonation”: Pretending to be someone else and sending or posting material online that makes that person look bad. “Outing and Trickery”: Sharing someone’s secret or embarrassing information online. CYBER BULLYING STATS Cyber bullying typically starts at about 9 years of age and usually ends after 14 years of age; after 14, it becomes cyber or sexual harassment due to nature of acts and age of actors 90% of middle school students they polled had their feelings hurt online. YET...... Only 15% of parents polled knew what cyber bullying was. 65% of students between 8-14 have been involved directly or indirectly in a cyber bullying incident as the cyber bully, victim or friend. 40% had their password stolen and changed by a bully (locking them out of their own account) or sent communications posing as them. 58% have not told their parents or an adult about something mean or hurtful that happened to them online. Criminal Law http://www.boston.com/news/local/massachusetts/articles/2010/01/24/the_untouchable_mean_girls/ Internet Safety How YOU can be safe? Cybersafety Rules Never give out Personal Information
Never talk to internet strangers
Never chat online with someone you do not know in real life
Report Cyber Bullying - never respond to a cyber bully
Only go online when your parents are home - talk to them
Tell your parent or teacher if something makes you uncomfortable
TURN IT OFF The following kinds of speech can lead to arrest & prosecution: Making threats of violence to people or their property. Engaging in coercion Making obscene or harassing phone calls. Harassment or stalking Hate or bias crimes Creating or sending sexually explicit images of teens. Sexual exploitation Taking a photo of someone in place where privacy expected. Educator Responsabilities Law Enforcement should be contacted if
educator becomes aware of: Death threats or threats of other forms of violence to a person or property. Excessive intimidation or extortion Threats or intimidation that involve any form of bias or discrimination. Any evidence of sexual exploitation http://abcnews.go.com/Technology/TheLaw/teens-charged-bullying-mass-girl-kill/story?id=10231357&page=1 NEVER SHARE PERSONAL INFORMATION WHAT IS PERSONAL INFORMATION? INFORMATION THAT A STRANGER COULD USE TO LOCATE YOU NAME HI, MY NAME IS SUSAN, WHAT'S YOUR NAME? ADDRESS I LIVE IN SAN FRANCISCO, WHAT ABOUT YOU? PHONE NUMBER HEY, WHAT'S YOUR PHONE NUMBER SO I CAN CALL YOU? SCHOOL I GO TO JONES ELEMENTARY, WHERE DO YOU GO TO SCHOOL? EMAIL MY MOM DOES NOT LET ME GO ON THIS SITE MUCH, SEND ME YOUR EMAIL ADDRESS SO WE CAN TALK PHOTO I'LL SEND YOU A PHOTO IF YOU SEND ME ONE NEVER GIVE OUT PERSONAL INFO

YOU CAN NEVER KNOW WHO YOU ARE REALLY TALKING TO “As an educational…tool users can learn about virtually any topic…” researcher
publisher with great power comes great responsibility ability to respond CYBER BULLIES’ TECHNOLOGY E-Mail Cell Phones Chat Rooms Instant Messaging Text Messages Personal Web Sites Social Networks YOU are in control
YOU have the power
YOU have the ability to respond
YOU are responsible Safe from what? Physical safety
Psychological safety
Reputational and legal safety
Identity, property, and community safety
Full transcript