cyberbullying
Download
Skip this Video
Download Presentation
CYBERBULLYING

Loading in 2 Seconds...

play fullscreen
1 / 12

CYBERBULLYING - PowerPoint PPT Presentation


  • 232 Views
  • Uploaded on

CYBERBULLYING. Victims of Cyberbullying who eventually took their own lives. What Does Cyberbullying Involve? (Chisholm, 2006). Cyberbullying occurs via: chat rooms online bulletin boards e-mail instant messaging web sites cell phones on-line multiplayer video games

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' CYBERBULLYING' - china


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
what does cyberbullying involve chisholm 2006
What Does Cyberbullying Involve?(Chisholm, 2006)
  • Cyberbullying occurs via:
    • chat rooms
    • online bulletin boards
    • e-mail
    • instant messaging
    • web sites
    • cell phones
    • on-line multiplayer video games
  • Cyberbullying involves:
    • harassing
    • humiliating
    • intimidating
    • sending derogatory insults or threats in messages
    • teasing
    • using inappropriate language
what makes cyberbullying different from traditional bullying
What Makes Cyberbullying Different From Traditional Bullying
  • Anonymity
    • People often act in ways that they usually would not act because the other person can’t physically see them (Mishna, Saini, & Solomon, 2009)
  • Rampant Distribution
    • Something that is posted on the internet or sent over text messages spreads very fast
  • Around the Clock
    • There doesn’t have to be physical contact for cyberbullying to take place
social networking sites and cyberbullying
Social Networking Sites and Cyberbullying
  • Breeding ground for rumors, derogatory comments, and threats
    • Word meanings are often misunderstood when they are only read
  • Stolen passwords
    • Friends often share passwords or steal passwords which results in inaccurate posts- PROTECT YOUR PASSWORDS!
  • Exclusion
    • Things can be said about a person without them knowing. This isn’t fair because they are unable to defend themselves
text messaging and cyberbullying
Text Messaging and Cyberbullying
  • Using other’s phones
    • Be careful to whom you lend your phone. You never know what they are sending. You could get into some serious trouble.
  • Sending inappropriate pictures
    • Sexting
      • It is against the law to take, send, and receive sexually explicit pictures of minors
      • The act of sexting becomes cyberbullying when the pictures are circulated without consent resulting in 2 serious offenses.
types of cyberbullies chisholm 2006
Types of Cyberbullies(Chisholm, 2006)
  • “Vengeful Angels”
    • Those who are trying to “take up for” a friend who is getting picked on.
      • Don’t get in the middle of someone else’s cyberbullying situation. The best advice you can give your friend is to stop communicating with the bully/bullies.
  • “Power Hungry”
    • Those who pick on others only to make themselves feel powerful or dominant.
      • Be aware of these types of bullies. Try to avoid contributing to their mission to gain power by taking their side.
  • “Inadvertent Cyberbully”
    • Those who send a message that is misunderstood.
      • Be careful that what you say through the internet or text messaging is clear and cannot be misunderstood
  • “Mean Girls”
    • Girls who gang up on other girls and try to exclude them or humiliate them.
      • Don’t be a part of the “gang”
sticks and stones may break my bones but words will never hurt me
Sticks and Stones May Break My Bones but Words Will Never Hurt Me?
  • NOT TRUE!
  • Cyberbullying can cause
    • Emotional distress
    • Academic problems
    • Absenteeism
    • Violence
    • Suicide
washington state law
Washington State Law
  • According to RCW § 9.61.260 it is a against the law to harass, intimidate, torment, or embarrass someone through electronic communications.
  • Arrests have been made in cases where cyberbullying led to tragedy
what can you do
What Can YOU Do?
  • Be aware of the way that you communicate with others through electronic means of communication
  • Don’t jump in the middle of a Facebook/Myspace argument or bullying situation. Instead, tell an adult if it is a situation that has gotten out of hand
  • Delete “friends” who constantly seem to be causing problems on social networking sites
  • Tell the counselor or a teacher if you know of a situation in which someone that you know is being bullied

*There are also instructions for reporting harassment in your student handbook

  • Considering the consequences of cyberbullying
slide12

References

  •  American School Counseling Association. (2003). The ASCA national model: A framework for school counseling programs. Alexandria, VA: ASCA.
  • Auerbach, S. (2009). Screening out cyberbullies: Remedies for victims on the internet playground. Cardozo Law Review, 30(4), 1641-1675. Retrieved from Academic Search Complete database.
  • Bakken, L., Gentes, C., & Solberg, N. (n.d.). Middle school cyberbullying curriculum. Seattle Public
  • Schools. Retrieved from http://www.seattleschools.org/area/prevention/cbms.html
  • Billitteri, T. J. (2008). Cyberbullying. CQ Researcher, 18 (17), 385-408. Retrieved April 3, 2010,
  • from CQ Researcher Online, http://library.cqpress.com/cqresearcher/cqresrre2008050200.
  • Chisholm, J. (2006). Cyberspace violence against girls and adolescent females. Annals of the New York Academy of Sciences, 1087(1), 74-89. doi:10.1196/annals.1385.022
  • Eckholm, E., Zezima. (2010, March). 6 teenagers are charged after classmate’s suicide. The New York
  • Times. Retrieved from http://www.nytimes.com/2010/03/30/us/30bully.html?pagewant=all
  • Gentile, C. (2009, February). Student fights record of \'cyberbullying\'. New York Times. Retrieved from http://ntserver1.wsulibs.wsu.edu:2067/us/lnacademic/auth/checkbrowser.do?rand
  • Hinduja, S. & Patchin, J. W. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29(2), 129-156. doi:10.1080/01639620701457816
  • Li, Q. (2006) Cyberbullying in schools. School Psychology International, 27(2), 157-170.
  • Mishna, F., Saini, M., Solomon, S. (2009). Ongoing and online: Children and youth’s perceptions of cyber bullying. Children and Youth Services Review, 31, 1222- 1228. doi: 10.1016/j.child youth.2009.05.004
  • Stone, C. (2009). School Counseling Principles: Ethic and Law (2ND ed.). Alexandria, VA: ASCA.
  • Tokunaga, R. (2010). Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Computers in Human Behavior, 26, 277-287.
  • Washington Revised Code RCW § 9.61.260 (2004). Retrieved from http://apps.leg.wa.gov/RCW/default.aspx?cite=9.61.260
  • Washington Revised Code § 28A 300-285 (2010). Retrieved from http://apps.leg.wa.gov/RCW/default.aspx?cite=28A.300.285
  • Willard, N. (2007). Cyberbullying legislation and school policies: Where are the boundaries of the “schoolhouse gate” in the virtual world?
  • Wiseman, R. (2009). Bullies without boundaries. ASCASchoolcounselor47(2) 23-27.
ad