1 / 10

WAMLE October 11, 2012 Aïda Michlowski, PhD, JD

Terror by Technology. WAMLE October 11, 2012 Aïda Michlowski, PhD, JD. Inappropriate content. Inappropriate contact. Inappropriate conduct. What is cyberbullying ?. How does cyberbullying differ from physical (F2F) bullying?. Malicious code. Impersonating. Interactive gaming.

stacia
Download Presentation

WAMLE October 11, 2012 Aïda Michlowski, PhD, JD

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Terror by Technology WAMLE October 11, 2012 Aïda Michlowski, PhD, JD

  2. Inappropriate content Inappropriate contact Inappropriate conduct What is cyberbullying?

  3. How does cyberbullying differ from physical (F2F) bullying?

  4. Malicious code Impersonating Interactive gaming Stealing passwords Sending porn Internet polling Mass emails Text attack Blogging Textual harassment What are the methods of cyberbullying?

  5. Where does occur?

  6. Megan Meier Ryan Halligan 160, 000 CyberBullycide Jessica Logan Who are the victims or targets of cyberbullying?

  7. Anthony Stand Lori Drew Why do they do it? Who are the perpetrators?

  8. Keep safe, Keep away, Keep telling! Stop, Block, Tell! What are the warning signs?

  9. Keep current, Keep checking, Keep communicating Take 5 How do we deal with cyberbullying? ID the Creep

  10. Think before you click!

More Related