Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.
Cyber Bullying Presentation
Transcript of Cyber Bullying Presentation
Say NO to applications that allow anonymous posting. Remind your child that the internet is a worldwide billboard.
WHAT PARENTS CAN DO TO PREVENT/RESPOND TO
Talk to your kids about the dangers of sharing information on their social media sites.
The more information your child puts out there, the greater the chance this information could be used to bully your child.
Keep communication open
Monitor your child’s text and data usage.
If they abuse it, discontinue these services.
File a complaint with website
Florida has laws against bullying
Involve law enforcement
Contact your child's school
The six most common forms of cyber bullying have been described as:
Repeatedly sending offensive, rude, and insulting messages
Distributing information about another that is derogatory and untrue through posting it on a web page, sending it to others through email or instant messaging, or posting or sending digitally altered photos of someone.
Online "fighting" using electronic messages with angry, vulgar language
Breaking into an email or social networking account and using that person's online identity to send or post vicious or embarrassing material to /about others.
Outing and Trickery:
Sharing someone's secrets or embarrassing information, or tricking someone into revealing secrets or embarrassing information and forwarding it to others.
Repeatedly sending messages that include threats of harm or are highly intimidating, or engaging in other online activities that make a person afraid for his or her safety (depending on the content of the message, it may be illegal)
Jeffrey Johnston Stand Up for All Students Act
Learn about and monitor the Web sites that your child visits while on the computer.
Put your home computer in a visible public place.
Check the history to see what sites your child is visiting.
Know the terms and condition of the websites
and social media your kids regularly use i.e., MySpace, Facebook, Twitter, etc.
Web sites will shut down perpetrators’
accounts if they know an individual is being harassed.
Keep a record of all e-mails, text messages and instant messages that you have received
from the cyber bully.
Make sure your password is safe
Lindsay has just moved to town from Oregon and enrolls in the local middle school. Very pretty, outgoing, and funny, she quickly wins the attention of a number of the school’s football players—much to the humiliation of the school’s cheerleaders. Bonnie, the head cheerleader, is concerned about Lindsay stealing away her boyfriend Johnny, who plays quarterback. With the help of her cheerleader friends, Bonnie decides to create a “We Hate Lindsay” Web site, where girls can post reasons why they hate Lindsay and why they think she should move back to Oregon. Soon, the entire school becomes aware of the site’s Web address, and many others begin to post hurtful sentiments about Lindsay. Desperately wanting to make friends in a new town, Lindsay's crushed and begins to suffer from depression and a lack of desire to do anything aside from crying in bed.
If you were her mom or dad, what would you do? What might the school do to help Lindsay? If you were her best friend, what might you say or do to help?
A mother is walking by her son Jonathan while he is on the computer and notices that he keeps hiding the screen when she walks by. Upon further observation, the mother sees that Jonathan is making fun of someone else via instant
What should the mother do first? Does the mother need to contact the parents of the other child? Should Jonathan be allowed to use the computer?
Recommendations for Creating a Unique Password
• Use passwords with at least seven characters
• Make a mixture of UPPER and lower case letters, numbers,
and non-alphabetic characters
• Use first letters of an uncommon sentence, song, poem, quote, etc.
• Use word fragments not found in the dictionary (mihtaupyn)
• Use short words separated by characters (dog%door; candy$trip)
• Transliteration: like “vanity license plates” (e.g., “Elite One” becomes “E1te0nE”)
• Lines from a childhood verse or popular song (“Baby you’re a firework, Come on let your colors burst” becomes ByafColycb)
• Phrases from movies (“May the Force be with you” becomes MtFbwu)
• Expressions inspired by the name of a city (“Big lights will inspire you, let’s hear it for New York” becomes BLwiylhifNY)
• Interweave characters in two words: (“Play Date” becomes PateDlay)
How do I set up Google Alerts?
Setting up Google Alerts is a simple process--you don't even have to have a Gmail account to use Google Alerts.
1.Go to http://www.google.com/alerts/ where you'll see this page:
2.Sign in if you have a Gmail account. If you don't have a Gmail account, you can just start filling out the Google Alert form.
3.Enter the search terms you want to track, separated by commas. You can edit this later if you find you have too many or too few terms. If you're not sure what to track, start with your name and your blog's name. You may also want to include keywords related to your brand and your niche.
4.Choose the Type of search you want Google Alerts to create.
News (includes the latest news articles that mention your terms and "appear in the top ten results of your Google News search.")
•Blogs (includes blog articles that mention your terms and "appear in the top ten results of your Google Blog search.")
•Web (includes web pages that mention your terms and "appear in the top twenty results of your Google Web search.")
•Comprehensive (includes results from News, Blogs, and Web, etc. that mention your terms. It's, um, comprehensive.)
•Video (includes videos that mention your terms and "appear in the top ten results of your Google Video search.")
•Groups (includes posts that mention your search terms and "appear in the top fifty results of your Google Groups search.")
5.Choose how often you'd like to receive your Google Alerts. I like to receive mine once a day simply because I'm trying to cut down on the time I spend checking e-mail. However, if you're tracking a timely project or news story, you may want to choose as-it-happens. Likewise, if you're just keeping tabs on something that mildly interests you, but isn't critical, you can choose once a week.
6.Choose where you'd like the Google Alerts delivered. If you have a Gmail account, you can receive them via gmail. If you'd rather, you can receive them via RSS or another e-mail account.
7.Click the Create Alert button and finish.
15% percent of the young people surveyed say they have sent nude photos or videos of themselves
56% of teens say they have been the target of some type of online harassment
29% of teens have posted mean info, embarrassing photos or spread rumors about someone
22% of teens have been cyberpranked
55% of teens have given out personal info to someone they don’t know, including photos and physical descriptions
24% of teens have had private or embarrassing info made public without their permission
29% of teens have been stalked or contacted by a stranger or someone they don’t know
41% of teens have experienced some form of digital dating abuse — including checking in multiple times a day, reading messages without permission, pressuring others to respond to messages or spreading rumors
21% of teens say they've received nude photos or videos from others. About half of those involved say they felt pressured to do so
Web-Speak: Breaking Down Online Lingo
Do you know online lingo?
73% of teens are on a social network
Your child may be the victim of cyberbullying if he or she:
Becomes sad, angry, or distressed during or after using the Internet or cell phone.
Appears anxious when receiving a text, IM, or email.
Avoids discussions or is secretive about computer or cell phone activities.
Withdraws from family, friends, and activities they previously enjoyed.
Suffers an unexplained drop in grades.
Refuses to go to school or to specific classes, or avoids group activities.
Shows changes in mood, behavior, sleep, appetite, or shows signs of depression or anxiety.
ABC News. (Producer). (2010, 10 22). Web-Speak: Breaking down online lingo. [Web Video].
Retrieved from http://abcnews.go.com/GMA/Parenting/video/web-speak-breaking-down-online-lingo-11945575
Elegant Themes. (Designer). Free Social Media Icons Vector and PNG Mega Pack [Print Photo]. Retrieved from http://www.snap2objects.com/2010/03/free-social-media-icons-vector-and-png-mega-pack/
Facebook. (Producer). (2011, 12 30). What does idk, ly & ttyl mean? [Print Photo]. Retrieved from
Hinduja, S., Ph. D. & Patchin, P., W., Ph. D. (2009). Taking screenshots to preserve evidence of cyberbullying. Retrieved from
Robinson, L., & Segal, J. P. D. (2013, June). Tips for parents and teachers to stop cyberbullying. Retrieved from http://www.helpguide.org/mental/cyber-bullying.htm
Smelttzer, K. (Producer). (2009, July 02). A Cyber Bullying Suicide Story -- Ryan Halligan age 13 [Web Video]. Retrieved from http://www.youtube.com/watch?v=E1LG9NymhTEWebWise Kids. (n.d.).
Facts and statistics on teens and technology. Retrieved from
WebWise Kids. (2010). Stopping bullies: Cyberbullying & digital citizenship for classrooms. Retrieved from http://www.webwisekids.org/pdf/Cyberbullying-Prevention-and-Response-Kit.pdf
CYBER BULLYING...WHAT IS IT?