Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Cyber Bullying_Theory_Spring10

No description
by

Manpreet Kalra

on 8 June 2010

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Cyber Bullying_Theory_Spring10

Cyberbullying Threaten Harass Embarass Socially Exclude Willful and Repeated Harm StopHate.gov Why is it an important issue? C PPA Our Solution Our Campaign: Creating Awareness Implications Child Online Privacy Protection Act Privacy of Info Parental Involvement ELM (Cacioppo, Petty & Schumann, 1983):
Peripheral Route
Central Route Agenda Setting
(McCombs & Shaw, 1972) Objective Awareness
Behavior Target Audience Parents of children ages 11-18 Message Cyberbullying is a Problem Rise in youth violence is correlated with cyberbullying (Li, 2007) Agenda Setting Third
Person Affect
(Perloff, 1999) Q&A Fear Appeal
(Dillard & Anderson, 2004) Aware Proactive Information
Knowledge Gap
(Trichenor, Donohue & Olien, 1970) ELM
Cacioppo, Petty
& Schumann, 1983) Uses and Gratification
(Katz & Gurevitch, 1973) Resonance
(Gerbner, Morgan & Signorielli, 1994) Cultivation (Gerbner, Morgan & Signorielli, 1994) Boston "Anti-Bullying" Bill Electronic Communication Computer literacy starts younger and younger (Lunders, 2009) Bullying in childhood leads to depression and suicidal ideation later in life (Due, Damsgaard, Lund, Holstein, 2009) (McCombs & Shaw, 1972)
Full transcript