1 / 15

Stop Cyberbullying

Stop Cyberbullying. Anonymity. Anonymity is when the people who cyberbully hide who they are. This can stop you, the police or your school from finding out who the cyberbully is to stop them. E.g.: texting you a threatening message with a fake phone number. Pseudonyms.

truong
Download Presentation

Stop Cyberbullying

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Stop Cyberbullying

  2. Anonymity • Anonymity is when the people who cyberbully hide who they are. • This can stop you, the police or your school from finding out who the cyberbully is to stop them. • E.g.: texting you a threatening message with a fake phone number.

  3. Pseudonyms • Pseudonyms are fake name used by both bullies to keep their privacy and normal people. • In some situations, bullies can change their name to something offensive.

  4. Flaming • An often long, angry argument online, often with CAPITAL LETTERS, $ymb01s or g . • Often takes place over IM, Email or Online Chat Rooms. Pictures

  5. Masquerading • Masquerading is a form of bullying where a bully pretends to be someone they aren’t. • The bully could be using another’s phone, Email, IM account etc. to bully the victim.

  6. Cyberstalking • A form of harassment. Messages are sent through personal communications, such as IM or text. • Victims believe this can turn into real stalking.

  7. Outing • The display of personal communications, through the internet, printing out and showing, or even reading out loud. • The information revealed is often personal or sexual. • This can cause real psychological damage if the information revealed is personal.

  8. Harassment • The sending of messages that are offensive to the targeted person or group or people. • Often many messages are sent, or the messages are sent at odd times of day and night. • The messages can be sent personally or through public chat boards.

  9. Exclusion • To leave people out of activities because they don’t have a cellphone. • This is often done by girls. Boys are more likely to threaten will physical violence.

  10. How to stop Cyberbullying… • Report it! • If you or someone else is being cyberbullied, report it to the appropriate place. • Youtube- http://www.google.com/support/youtube/bin/request.py?contact_type=contact_us • Instagram- http://help.instagram.com/165828726894770/ • Facebook- http://www.facebook.com/report • Myspace- http://www.myspace.com/index.cfm?fuseaction=help.reportabuse • Save full email headers! • Eg. X-Message-Info: JGTYoYF78jEHjJx36Oi8+Z3TmmkSEdPtfpLB7P/ybN8=Received: from hotmail.com ([65.54.174.26]) by MC8-F19.hotmail.com with Microsoft SMTPSVC(6.0.3790.211);Thu, 9 Jun 2005 03:36:19 -0700Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC;Thu, 9 Jun 2005 03:13:41 -0700Message-ID: <BAY103-F16185361BFA8152B9701EDE2FC0@phx.gbl>Received: from 65.54.174.200 by by103fd.bay103.hotmail.msn.com with HTTP;Thu, 09 Jun 2005 10:13:41 GMTX-Originating-IP: [65.54.174.200]X-Originating-Email: [bully@example.com]X-Sender: bully@hotmail.comIn-Reply-To: <BAY103-DAV16418913D7F32B48B6F4B9D1FD0@phx.gbl>From: "BULLY" <bully@hotmail.com>To: victim@hotmail.comBcc: Date: Thu, 09 Jun 2005 20:13:41 +1000Mime-Version: 1.0Content-Type: text/html; format=flowedX-OriginalArrivalTime: 09 Jun 2005 10:13:41.0375 (UTC) FILETIME=[E910B0F0:01C56CDB]Return-Path: bully@hotmail.com • Continued…

  11. …Continued • Take screenshots! • There should be a key on keyboards that says PrtScnor Print Screen. If you press that button, a picture of your screen will be copied, which can be pasted onto paint and then saved. On laptops, you will likely need to press the Fn (Function) key at the same time. With iPods & iPhones, press the lock and home button at the same time (this saves the picture to your pictures). • Send the screenshot to the website companies “contact us”. • Mobile phones • Don’t delete or alter anything about the message. • Record the time and date you receive the message.

  12. How it Affects People • Cyberbullying is just as bad, if not worse than, traditional bullying. • It can follow people home and disturb them even when they aren’t at school; even home becomes unsafe to them. • Most victims experience depression, withdrawal, shame, anger and embarrassment. • In extreme cases the bullied may even commit suicide.

  13. Related Links • http://www.cyberbullying.info/resources/headers.php • http://www.cyberbullying.info/news/latestnews.php • http://www.cyberbullying.info/resources/resources.php • http://www.cyberbullying.info/resources/report.php • http://www.cyberbullying.info/tips/internetsafetytips.php • http://www.cyberbullying.info/whatis/whatis.php • http://www.cyberbullying.info/references.php

  14. References • http://www.cyberbullying.info/bookcase.php (info) • http://blog.timesunion.com/kristi/get-a-number-give-a-number-on-facebook/57307/ • http://aspanational.wordpress.com/2012/02/07/cyber-bullying-a-question-of-punishment/ • http://info.uknowkids.com/blog/bid/235846/4-Steps-to-End-Facebook-Bullying (x3) • http://gigaom.com/2011/07/25/google-and-the-loss-of-online-anonymity/ • http://ib2012-itgs.wikispaces.com/Privacy+and+anonymity • http://www.rossipotti.de/inhalt/literaturlexikon/sachbegriffe/pseudonym.html • http://8elafourth.edublogs.org/tag/vocabulary/page/2/ • http://bitchspot.jadedragononline.com/2013/08/14/a-name-by-any-other-pseudonym/ • http://www.toptenz.net/top-10-internet-flame-wars.php • http://www.mediafocus.com/stock-photo-word-flaming-on-keyboard-rs1120541922.html • http://cyberbullyingtodays.blogspot.ca/ • http://etcjournal.com/2011/02/17/7299/ • http://www.yalelawtech.org/uncategorized/bullying-in-the-21st-century/ • http://ca.norton.com/cyberstalking/article • http://dasas.net/stalking/cyberstalking • http://www.uic.edu/depts/owa/cyberstalking.html • http://vccoordinator.wordpress.com/category/cyber-bullying/ • http://www.haverford.k12.pa.us/domain/456 • Continued…

  15. …Continued • http://metalifestream.com/wordpress/?p=2213 • http://kiwicommons.com/blog.php?p=10953&tag=cyberbullying-study-shows-long-term-impact-of-online-harassment • http://regardingnannies.com/2011/03/digital-harassment-how-to-deal-with-it/ • http://cyberbullyingwrt.weebly.com/types-of-cyberbullying.html • http://darkpsychology.co/2013/08/cyberbullying-cyber-harassment-cyberstalking/ • http://www.educationviews.org/cyberbullying-tactic-1-information-news-education-news-announcement/ • http://www.bubblews.com/news/17493-effects-of-cyberbullying-on-children • http://cyberbullying2010.wikispaces.com/4.+Psychological+Effects+and+Differences • http://www.dit.ie/news/archive2013/ditresearchshowsirishchildrenmuchmorelikelytobeaffectedbycyber/

More Related