Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.
Transcript of Cyber Bullying
CyberBullying Prevention Apps
like comment share
Cyberbullying is bullying that takes place using electronic technology including cell phones, computers, tablets, and communication tools such as social media sites, text messages, chat, and websites.
The Power of Our Words
like comment share
Lend A Helping Hand
Digital Advocacy is using social media to engage your community. We are all Responsible for keeping the internet a safe place to Socialize, Learn, and Grow.
Cyber Safety Golden Rules
like comment share
Role Play Scenario #1 - Nasty Email & Website
Treat Others the way you want to be Treated Online
Role Play Scenario #3 - Revealing Photos & Video
like comment share
AIS Responsible Use Policy (RUP)
Technology is a powerful tool for education and communication. ΛIS supports and encourages the use of technology in classrooms to assist with lessons, research, group work, and communication between teachers and classmates. While technology can aid in learning, if misused, it can also distract from learning. To ensure that technology is being used in a positive manner in our school community, all students are expected to follow these guidelines when using technology in the building and when communicating with classmates and teachers online.
Most Recommended Apps
Be Smart & Safe
Best Apps For Parents
Examples of cyberbullying include mean text messages or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles.
STOP CYBERBULLYING STOP CYBERBULLYING STOP CYBERBULLYING STOP CYBERBULLYING STOP CYBERBULLYING STOP CYBERBULLYING STOP CYBERBULLYING STOP CYBERBULLYING STOP CYBERBULLYING STOP CYBERBULLYING STOP CYBERBULLYING STOP CYBERBULLYING STOP CYBERBULLYING STOP CYBERBULLYING STOP CYBERBULLYING STOP CYBERBULLYING STOP CYBERBULLYING STOP CYBERBULLYING
·BER·BUL·LY·ING · CY·BER·BUL·LY·ING · CY·BE
· · CY·BER·BUL·LY·ING · CY·BER·BUL·
Over 50% of adolescents and teens have been Bullied online, 10-20% experience it regularly, and about 50% have engaged in CyberBullying.
Cyber Bullying Victims are More Likely to:
Abuse Drugs & Alcohol
Drop Out of School
Have Low Self Esteem
Suffer from Depression
If You Experience Cyber Bullying
* DON'T RESPOND
* BLOCK &
Avira Social Shield searches social networks looking for alerts. They monitor inappropriate language, drugs, violence, and suspicious contacts/friends. It also searches photos that have been posted about you.
U Know Kids app monitors Facebook, My Space, Twitter, and Instagram. They also monitor all mobile phones: Android, iPhone, and Blackberry.
Bully Block allows a child to report, block, or record a bully. It can capture inappropriate emails, which can be saved and used as evidence. This evidence can be given to school authorities or a Human Resources department if someone is being harassed in their workplace.
With the Mama Bear app parents know where their children are, who their with, what their saying, and when their speeding. Parents can set a tracking GPS on their childrens electronic devices, get alerted to bad language, signs of bullying, photos
and locations their tagged in.
Net Nanny is not an app but a software package that you purchase. It protects against Cyberbullying, and online predators. It monitors your child’s social networks and instant messages.
When CyberBullying happens, it is important to document and report the behavior so it can be addressed.
Report CyberBullying to Online Service Providers
Report CyberBullying to Law Enforcement
Report CyberBullying to Schools
Cyberbullying violates the terms of service established by social media sites. Report cyberbullying so they can take action against users abusing the terms of service.
When Cyberbullying involves these activities - threats of violence, sending sexually explicit messages or photos, stalking and hate crimes - it is considered a crime and should be reported to law enforcement.
Cyberbullying disrupts the safe learning environment every student is entitled to and is often related to in-person bullying. The school can use the information to educate, implement preventative and responsive strategies.
Safety Web allows parents to track and monitor their children's texts and instant messages. In addition to monitoring cellphones, they also patrol Facebook, My Space, and Twitter.
Role Play Scenario #2 - Cliques That Exclude
Role Play Scenario #4 - "Stealing" & Revealing Information
A boy receives disrespectful messages and learns that photos, text, and even a poll that ridicule him are on a Website for the entire world to see.
A girl begs her parents for an IM account only to find the girls she wants to IM with aren't interested in including her in their online conversations.
Unknown to others at a party, a student with a cell phone films a video of students behaving inappropriately. He sends the video to others in the class.
A student gets personal information from others through Instant Messaging conversations. She posts this information online for all to see.