stop cyberbullying

13
Stop Cyberbullyi ng By Tyanna Paling and Manpreet Gill

Upload: talen

Post on 22-Feb-2016

42 views

Category:

Documents


0 download

DESCRIPTION

Stop Cyberbullying. By Tyanna Paling and Manpreet Gill . Anonymity. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Stop Cyberbullying

Stop CyberbullyingBy Tyanna Paling and Manpreet Gill

Page 2: Stop Cyberbullying

Anonymity Anonymity is when someone makes

threatening comments to you, but is able to hide who they are. That it is difficult for you to try and figure out who is sending you threatening message or email. Anonymity also includes usage of Aliases or Pseunionyms. When someone else uses another persons phone you send you a message, email or text.

Page 4: Stop Cyberbullying

Flaming Flaming is a really intense argument, that

regularly takes place in a chat rooms over instant messages. Flaming bullies use capital letters, images and symbols to add emotion to the argument. This is a real life example: “I was instant messaging my best friend, and we had an argument over a guy...The next day she printed the conversation and handed it to a group of girls, but she’d changed it. It read like I had said all these really mean things (about them) that I never said, and they believed her.” *Never reply to a bully when you are angry!.. Wait a bit.*

Page 5: Stop Cyberbullying

Masquerading Masquerading is a form of cyberbullying when the

bully try's to pretend to be someone else when they aren’t. they create fake email addresses or messaging names, they might use another persons cell number to bully you. Example: “A 13-year-old gave her password to her best friend. After they had a fight, the ex-friend used the girls screen name to enter on an adult chat room and gave out the girl’s phone number. A man from the chat room called the girl’s house- but luckily intercepted by the mother.

Page 7: Stop Cyberbullying

Outing Outing is a public display of personal

communications like text messages. Some bullies print out or screen shot email or messaging conversations, also containing sexual or personal information. And will like to decide to send by text or show them to face friends or other people around them the conversation.

Page 8: Stop Cyberbullying

Harassment Harassment includes bullies sending

offensive messages towards an individual or a group. Bullies send the same messages over and over again every hour of the day everyday. Example: “I’m going to kill you.” How would you feel if someone sends that to?

Page 9: Stop Cyberbullying

Exclusion Exclusion: A teenager who didn’t have a mobile

phone are excluded from the other teenagers who do have a mobile phone. Girls are to be more likely to exclude others. Boys try to threaten physical violence. Example: “ an 11-year-old American, Natalie recalled in an newspaper interview how every girl in a class was invited but one to a recent sleepover. The girls at the party went on the internet that night and taunted the one who had been left out.”

Page 10: Stop Cyberbullying

How to stop cyberbullying Cyberbullying occurs when electronic

communications such as text messages, emails, instant messages, and social media updates are used to threaten or humiliate someone. Its consequences can be just as serious as the effects of bullying that occurs in person.

Page 11: Stop Cyberbullying

3 ways to help stop cyberbullying…1 way Look for sings of harassments. Cyberbullying often

takes the form of one person harassing another through emails, instant messaging, text messages or other modes of electronic communication.

Hateful or threatening messages. This includes name-calling, attempts to control someone’s behavior by threatening to expose embarrassing information and or threats of violence.

Embarrassing or threatening images. An unending barrage of emails, instant messages, or

text, whether or not they are threatening in nature.

Page 12: Stop Cyberbullying

2 way… Look for signs of public humiliation. Another common

form of cyberbullying happens when the bully harasses a target by the way of public embarrassment, rather than directly contacting them, cyber bullies may use these public tactics:

Posting humiliating messages on a social media site, a blog, or another public space.

Spreading rumors and gossip using social media, text messages and other tools.

Sharing pictures that are embarrassing or explicit in nature, or are altered with the internet to humiliate, on social ,media websites and through text messaging.

Page 13: Stop Cyberbullying

3 way… Look for signs of impersonation. A less obvious, but

equally harmful form of cyberbullying takes place wen the bully attacks someone by impersonating them as a way to bring about humiliation or punishment. In this case it is more difficult to identify the perpetrator.

In some cases the bully may create a screen name nearly identical to the screen name used by someone, then use that name to create embarrassing or threatening situations for them.

The bully may steal the target’s password, hack their accounts ,and send embarrassing message to others or make expensive purchases.