Exclution When you have a phone you are often treated as you are in the group. But when you don’t...

22

Transcript of Exclution When you have a phone you are often treated as you are in the group. But when you don’t...

Page 1: Exclution When you have a phone you are often treated as you are in the group. But when you don’t you are often taunted but not in your face, online because.
Page 2: Exclution When you have a phone you are often treated as you are in the group. But when you don’t you are often taunted but not in your face, online because.

Exclution

When you have a phone you are often

treated as you are in the group. But when you

don’t you are often taunted but not in your

face, online because it is so much easier to

gloat online than to there faces. Also because

you can’t see it, because they think that just

because you don’t have a phone you can’t

look at what you posted. You could just ask

for your friend’s phone but even if you don’t

there most likely be talk about you in the

hallway. So you will find out even if you don’t

have a phone at the moment.

Page 3: Exclution When you have a phone you are often treated as you are in the group. But when you don’t you are often taunted but not in your face, online because.

Sad Story

Ghyslain became an internet sensation in May 2003 when

four classmates discovered a private video of him pretending

to be a Jedi Knight. Rather than laughing at the video in the

privacy of their homes, the classmates decided to upload the

video to the internet. Within weeks it had been seen by

millions. According to www.jedimaster.net, Ghyslain is now the

most downloaded male on the internet. While the world laughs,

and spin-offs are created at an average of one per day,

Ghyslain and his parents don't find the situation very funny.

The parents have filed a lawsuit against the classmates that

uploaded the video. The lawsuit is accompanied by instant

messaging transcripts, in which the classmates gloat over their

success. Ghyslain was forced to drop out of high school, and

finished the year at a faculty specializing in child psychiatry.

Page 4: Exclution When you have a phone you are often treated as you are in the group. But when you don’t you are often taunted but not in your face, online because.

Harassment

Harassment is when you bully someone by repeating the same

thing over and over again until they actually think that what you say

is true. If somebody said that your ugly you would probably just

ignore it, but if it happened more than once and by multiple people

you would start to feel offended and even think that its true too.

Some people even make several accounts that they could harass you

with you thinking that its actually more people that think your ugly.

This is most likely where bullying starts. Either this or people start

bullying you at school and then take it to there computers.

Page 5: Exclution When you have a phone you are often treated as you are in the group. But when you don’t you are often taunted but not in your face, online because.

Trying To Help

In the past few years, teen suicide attempts have been on the rise around the

nation, and many experts believe it may be tied in part to bullying on social media

sites. According to the Centers for Disease Control and Prevention (CDC), 1 in 6

American high school students has seriously considered suicide, and 1 in 12 has

attempted it. Figures suggest that 1 out of 3 children who have access to the

Internet or mobile phones are involved in "cyber bullying," bullying using the

Internet. Although a recent study by the American Academy of Pediatrics (AAP)

National Conference suggested that cyber bullying is rarely the sole reason that

teens commit suicide, the study did find that females, especially those with mood

disorders, were more likely to commit suicide after being harassed on and/or offline.

To address these alarming statistics, the New Kent Sheriff's Office and New Kent

High School PTSO and guidance department will host a free cyber bullying

information session on Wednesday, Dec. 4, from 6:30 - 7:30 p.m. in the New Kent

High School media center. There, parents can find out how New Kent County and

other local students may be affected by social media by learning the latest trends

in cyber bullying, warning signs, and ways in which they can help their children if

they are being bullied or are bullying other students. Although recently, some legal

reprimands have been handed down in court to cyber bullying teens, many get

away with it anonymously. This is one of the reasons that incidents of cyber bullying

have risen, the CDC reported.

Page 6: Exclution When you have a phone you are often treated as you are in the group. But when you don’t you are often taunted but not in your face, online because.

Outing

Outing is practiced online and offline. When you tell

something secretive to someone and then they turn on you

and post it online. Like if I found a weird picture of my best

friend and I show someone it. Then they may go online and

show everyone who I’m friends with. Outing isn’t really

harassment because it only needs to happen once and that

is enough. Outing is mostly a way to embarrass you un front

of everyone and trying to get revenge.

Page 7: Exclution When you have a phone you are often treated as you are in the group. But when you don’t you are often taunted but not in your face, online because.

Mobile Tips Only give your phone number out to people that you want to have it. You can hide your number by setting it to

'private' in the settings of your phone, but there's an even easier way - dial 1831 before you call. For example, if

you wanted to call 02 9870 2200, but didn't want the person on the other end to see your number, you should ring

1831 02 9870 2200 instead.(This works when you're ringing from and to a mobile or a landline phone! This has

been tested in Australia, there may be another prefix you should dial elsewhere in the world)

If you've got Bluetooth switched on, on your mobile phone, and your phone is not set to 'hidden', chances are

you're open to blue jacking, bluesnarfing or blue bugging. What does this mean? Read on below.

Blue jacking - the sending of unwanted messages from one Bluetooth device to another. While Blue jacking is

normally harmless, often people who receive these types of messages don't know what has happened, and may

think that someone has taken over their phone.Bluesnarfing - the unauthorized access of information from a wireless device (such as a mobile phone) through a

Bluetooth connection. By 'hacking' into the phone, someone can have access to the calendar, pictures, contacts,

text messages, and any other content stored on the phone.

Blue bugging - another form of Bluetooth attack, in which someone takes control of your phone, to call their phone.

This means that someone can simply listen to any conversation their victim is having in real life. Further

development of blue bugging tools has allowed users to totally take over their victim's phone, making calls and

sending text messages from the victim's phone.By turning off blue tooth when you're not using it, and/or by setting your phone's bluetooth settings to 'hidden', you

can remove the risk of these threats.

Page 8: Exclution When you have a phone you are often treated as you are in the group. But when you don’t you are often taunted but not in your face, online because.

Cyber Stalking

Cyber Stalking is a way of harassing someone online.

Cyber Stalking is basically just a way to stalk someone

online, that for he other person o the computer is real. This

person who is or was bullied believes that whatever the

stalker said is true. These people tend to follow you around

and are usually people you know really well. Stalking, online

or offline, is just someone that follows you around and when

they catch personal info they immediately use it against

you.

Page 9: Exclution When you have a phone you are often treated as you are in the group. But when you don’t you are often taunted but not in your face, online because.

Sadder Story

At 13 Alex hung with a popular crowd, had a quick wit and got good grades.

Unknown to his parents, a group of girls at his school had been taunting him for

about a month through instant messages, teasing him about his size and

challenging him to perform physical activities he couldn't accomplish, like

running around the school track in a certain time or jumping across a ditch. Alex

spent many hours chatting online in his bedroom. Other kids knew he was

thinking about taking his own life, his mother says. "They were trying to dare

him to commit suicide, thinking it was a big joke.” He was deadly serious. One

afternoon last June, while he was home alone, Alex pulled his grandfather's

antique shotgun out from under a bed, loaded it with shells and killed himself.

He had deleted every file from his computer but left a final message on it that

read, "The only way to get the respect you deserve is to die." Only later did his

parents learn about the online teasing, when his mother overheard some girls

talking about it. "If someone is picking on you in the school yard, you can go

home," says his mother, who is haunted by thoughts that she should have been

more vigilant monitoring Alex's Web use. "When it's on the computer at home,

you have nowhere to go. "No one knew what was going on," says a guidance

counsellor at his school. "Not his Sunday school teachers, not his school

teachers, not his parents. If this could happen to him, it could happen to

anyone."

Page 10: Exclution When you have a phone you are often treated as you are in the group. But when you don’t you are often taunted but not in your face, online because.

M

asquerading Masquerading is an elaborate form of cyberbullying where the

bully pretends to be someone who they aren’t. Basically it’s the art

of being someone your not, like acting. They might create fake

email addresses, instant messaging names or they might use

someone else’s email or mobile phone to bully you. This would

make it appear as if the threats have been sent by someone else,

again keeping the bully’s identity hidden. This also means that

they can pretend to be your friend and be someone your not. Some

people will tell you that you would give them your password if you

were a ‘real’ friend. Do not give out your password to anyone. Lets

just say a 13-year-old girl gave her password to her best friend.

After they had a fight, the ex-friend used the girl's screen name to

enter an adult chat room and gave out the girl's phone number. A

man from the chat room called the girl's home – but was luckily

intercepted by the mother. That would have been a close call but

what if that girl answered that phone, what would have began?

Page 11: Exclution When you have a phone you are often treated as you are in the group. But when you don’t you are often taunted but not in your face, online because.

A Less Sadder Story

"David Knight's life at school has been hell. He was teased, taunted and punched for

years. But the final blow was the humiliation he suffered every time he logged onto the

Internet. Someone had set up an abusive Web site about him that made life unbearable.

Rather than just some people, say 30 in a cafeteria, hearing them all yell insults at you, it's

up there for 6 billion people to see. Anyone with a computer can see it," says David.

Another boy at school sent David an email telling him to look at a website. David went to

the site and found "my photo on this Web site saying 'Welcome to the Web site that makes

fun of Dave Knight' and just pages of hateful comments directed at me and everyone in

my family.“ The person who created the website asked others to join in and post hateful

comments about David and his family. His mother said that David began "withdrawing

completely, isolating himself from everyone.“ David felt that he couldn't continue with all

of this happening at school, and decided to finish his last year of school at home. After

talking with the police, the Knight family contacted Yahoo! (a very popular site), where the

site had been hosted. After a number of weeks of unreturned phone calls, the Knights

threatened legal action, and Yahoo! took the site down off the internet. Yahoo! is just one

of thousands of internet companies offering free website hosting services. Most companies

have policies about what content can and can not be published on the internet, but these

policies are rarely enforced - most of the time, people can write what they like. David is

now trying to recover from the cyberbullying incident, and is training to become a pilot,

hoping to, one day, be a fighter pilot in the Canadian Armed Forces

Page 12: Exclution When you have a phone you are often treated as you are in the group. But when you don’t you are often taunted but not in your face, online because.

Flaming Flaming is an intense argument, that normally takes

place in chat rooms, over instant messages or email. These

bullies use capital letters, images and symbols to add

emotion to their argument. This is a real life example from

People magazine: "I was instant messaging my best friend,

and we had an argument over a guy…The next day she

printed the conversation and handed it to a group of girls,

but she'd changed it. It read like I had said all these really

mean things [about them all] that I never said, and they

believed her.“ Look how the results of that flame worked

out. Never send a reply to a bully whilst you are angry. Wait

a period of time, to cool down, before you reply, if you even

have to reply at all. These flames often bring out stuff you

of you, that you don’t want others to see. This is sometimes

how bullies start to bully.

Page 13: Exclution When you have a phone you are often treated as you are in the group. But when you don’t you are often taunted but not in your face, online because.

Picture Messages

Picture messages are small photos, taken with a camera

phone, that can be sent to other mobile phones, or to the

internet, instantaneously. In one case, students at a local

high school used a camera phone to take a photo of a

classmate in the shower after gym. The picture was sent

throughout the school in minutes. "Marcus Andrews, 11,

was the victim of a vicious attack in the school corridors...

Children pounced on him, broke his arm, and photographed

his agony with their mobile phones, before emailing the

pictures to friends.“ This was cruel and harassing to the

poor kid.

Page 14: Exclution When you have a phone you are often treated as you are in the group. But when you don’t you are often taunted but not in your face, online because.

Pseudonym

A pseudonym is like a nickname. Bullies may call

themselves a different name when they are online, to when

they are offline. Like someone would call themself

KattieKupKake online and there real name is Katherine

James or something. Basicly it’s a pen name only online,

because you aren’t writing letters. They do this to keep

their real identity a secret from you. When you use instant

messaging services like MSN Messenger or Yahoo

Messenger, you are known to others online by a nickname

that you have chosen. This is an example of a pseudonym.

Bullies can use this same feature to change their name to

something that you wouldn’t expect. Similarly, bullies may

change their name to something offensive. Anyone can.

Page 15: Exclution When you have a phone you are often treated as you are in the group. But when you don’t you are often taunted but not in your face, online because.

Emails

Email is the third most common form of cyberbullying. Email can be

used by a cyberbully in a number of ways: Sending harassing or

threatening messages, attaching viruses to emails, or even including

private information about a victim and sending it to hundreds of

people. There are many more ways email has and can been used as a

weapon. One email can be sent to hundreds of people, across the

globe, at the touch of a button. "It was a non-stop nightmare... I

dreaded going on my computer," says one girl of an incident where

she was constantly being bombarded by threatening emails. Email is

used by almost everyone because you use it for work, school

accounts, billing and other things too.

Page 16: Exclution When you have a phone you are often treated as you are in the group. But when you don’t you are often taunted but not in your face, online because.

Anonymity

Anonymity is when someone makes threatening

comments to you, but is able to hide who they are. This

means that it can be hard for you to figure out who sent you

a threatening message or email. Anonymity can include the

use of aliases or pseudonyms. Have a look at the book on

pseudonyms on the bookcase. Anonymity is a big issue in

terms of cyberbullying. If someone is sending you

threatening text messages on your mobile phone, unless

you recognize the phone number it is sent from, you're

unlikely to know who sent you the message. Or they may

use someone else's phone to send you the message. These

are examples of anonymity, where the bully’s identity

remains hidden.

Page 17: Exclution When you have a phone you are often treated as you are in the group. But when you don’t you are often taunted but not in your face, online because.

Greg Frawly’s Story

Greg Frawley left Hurlstone Agricultural High School after unidentified

students set up a website to accuse him and another teacher of being

child molesters who should be killed. Students anonymously set up a

website, called ThrowStones. This website recommended that two

teachers at the school be executed. It accused one teacher of being a

pedophile. It accused another of stealing. "Can you imagine how you

would feel, if a story posted on the internet, stated that you were a child

molester, and that this message was rapidly communicated to students

you taught?" Greg Frawley told The Daily Telegraph. To this day, the

students behind the website have not been caught. The police have lain

no charges. The incident has been dubbed "one of the states worst

cases of cyberbullying.“ "I haven't slept for six months," Frawley said.

"The department of Education offered me team teaching work one day

a week but I feel so threatened I can't go back."Frawley believes that he

has been stained with the "worst social stigma of all". He believes that a

student or teacher will commit suicide over one of these websites.

Sadly, he did not realize that many children already had done just that.

Page 18: Exclution When you have a phone you are often treated as you are in the group. But when you don’t you are often taunted but not in your face, online because.

Very Sad Story

Cyberbullying not only causes suicide but also murder of little

kids. Listen to this. In June 2003, an eleven-year-old Japanese

girl killed her classmate. The girl told police that she killed her

classmate because she was angry about messages that had

been posted about her on the internet. Here were two, young,

Japanese school girls. They were best friends. One was twelve

years old, the other eleven. They often sent text messages to

each other - police were told that they had been arguing over

messages posted on the internet. Police were told that the girl

called her classmate over to her with the intent to kill her. The

classmate died of massive blood loss in a study room at a local

primary school after her neck was slashed with a paper cutter.

Page 19: Exclution When you have a phone you are often treated as you are in the group. But when you don’t you are often taunted but not in your face, online because.

Silent Killer

Helen Adgar believes her teenage son died after being on

the receiving end of a silent but potent form of bullying -

text messaging. The nature of the internet and of mobile

phones, is that you can be reached 24 hours a day, 7 days a

week, no matter where you are. Sometime during the night

in this incident above, this boy received a text message.

Whatever was contained in that message caused him to

leave his house and go to the top of a cliff. He jumped off

the cliff. His mother believes those text messages that he

received were a significant factor in his death. "Bullying

claims the lives of around 20 teenagers a year."

Page 20: Exclution When you have a phone you are often treated as you are in the group. But when you don’t you are often taunted but not in your face, online because.

Phoebe’s Story

Each night, Phoebe would receive abusive text messages

from other girls at her school. She also received up to 20

calls a day from the same girls, bullying her. Phoebe's

parents noticed that she was becoming withdrawn. Boys

and girls in similar situation tend to become withdrawn,

often isolating themselves completely from everyone

around them. Fortunately, Phoebe kept the messages on

her phone, and her and her mum were able to go to school

with the evidence. The bullying was tackled quickly by the

school, and immediately stopped. Nevertheless, she was

only ten years old.

Page 21: Exclution When you have a phone you are often treated as you are in the group. But when you don’t you are often taunted but not in your face, online because.

Kylie’s Story

Kylie had two previous "run-ins" with online harassment,

ruining two years of her education and wrecking many of

her friendships. Two of her classmates allegedly put

together a website called "Kill Kylie Incorporated." On this

website, they made homophobic comments about her and

her family. The problem got worse when another classmate

started creating instant messaging screen names that were

very similar to Kylie's, and then began talking to Kylie's

friends pretending to be Kylie. Police ultimately investigated

the episodes and filed proceedings against the harassers. "I

had no escape", said Kylie, who was ultimately home-

schooled before moving to a new high school.

Page 22: Exclution When you have a phone you are often treated as you are in the group. But when you don’t you are often taunted but not in your face, online because.

V

ideos