Keenright591 Interactive Presentation

Preview:

DESCRIPTION

This is a lesson for studnets to learn about cyberbullying.

Citation preview

What is cyberbullying?

Cyberbullying in any kind of negative virtual communication.

There are many ways to bully someone other than just sending them a

message.

Ways of CyberbullyingWays of CyberbullyingInstant Messaging Instant Messaging Stealing passwordsStealing passwordsBlogsBlogsWeb SitesWeb SitesSending pictures through phones and Sending pictures through phones and emailemailSending malicious codeSending malicious codeImpersonationsImpersonationsPreventionPrevention

Instant messagingSending threatening messages through IM’s or texting.

Sending warning messages not to tell on them.

Creating screen names that are 1 letter away from someone else’s screen name and sending offensive messages

Texting wars and death threats

Stealing passwordsStudent’s may steal passwords and access other’s accounts to send offensive messages to anger them.

Students may gain access to an account and then change the settings to lock them out.

BlogsBlogs are used as online journals to write damaging thing about someone’s reputation.

Web Sites

Web sites are created to insult another student or a group of students.

Students also post pictures and personal information about other students.

Sending pictures through cell phones and email

Sending degrading photos through e-mails; the emails can then be passed around to hundreds of emails within hours.

New cell phones are now able to send photos and can be spread to an entire address book at once.

Sending Malicious Code

Student send viruses, spyware and hacking programs to other computers as a form of harassment.

Some programs can even give the student access to a victims computer.

ImpersonationWhen a student impersonates another students they usually do this in a chat room. The students reveals personal information that could include name, address and phone number. This could lead to an attack on the victim.

PreventionUnderstand that teasing, threats and taking over someone’s identity are all forms of bullying.

If this happens to you report the behaviors to an adult.

Parents

ParentsTell you parents.

Parents need to inform you school counselor of the cyberbullying.

Parents need to tell your doctor.

It may be necessary to have counseling until the problems are resolved.

Netiquette

Netiquette

• Never send your name, address or phone number to someone on the internet

• Don’t send out an email when you are mad; wait and reread it when you are calm.

Go to Quiz

What is one way that someone could use their cell phone to cyberbully?

B.Call their mom

C.Send you a threatening message

D. Call information

Go read for the answer again.

Read here

Instant messagingSending threatening messages through IM’s or texting.

Sending warning messages not to tell on them.

Creating screen names that are 1 letter away from someone else’s screen name and sending offensive messages

Texting wars and death threatsGo back to question

NEXT QUESTION

Stealing passwords could not allow someone to:

B.Access my account

C.Be good at playing games

D.Send emails under my account without my knowledge

Go read for the answer again.

Read here

Stealing passwordsStudent’s may steal passwords and access other’s accounts to send offensive messages to anger them.

Students may gain access to an account and then change the settings to lock them out.

Go back to question

NEXT QUESTION

These can be created to post pictures on the internet:

B.Channels

C.Web sites

D.Stations

Go read for the answer again.

Read here

Web Sites

Web sites are created to insult another student or a group of students.

Students also post pictures and personal information about other students.

Go back to question

NEXT QUESTION

What can spread pictures and information the fastest?

B.Mail

C.Word of Mouth

D.Computers

E.Cell Phones

F. Both C & D

Go read for the answer again.

Read here

Sending pictures through cell phones and email

Sending degrading photos through e-mails; the emails can then be passed around to hundreds of emails within hours.

New cell phones are now able to send photos and can be spread to an entire address book at once.

Go back to question

NEXT QUESTION

What can happen if someone gets into your computer?

B.They can send your personal information to other recipients

C. A virus could be sent to infect your computer

D. Someone would be able to act like you in a chat room.

E. A & C

F. All of the above

Go read for the answer again.

Read here

Sending Malicious Code

Student send viruses, spyware and hacking programs to other computers as a form of harassment.

Some programs can even give the student access to a victims computer.

Go back to question

Impersonation

When a student impersonates another students they usually do this in a chat room. The students reveals personal information that could include name, address and phone number. This could lead to an attack on the victim.

NEXT PAGE