Exclution When you have a phone you are often treated as you are in the group. But when you don’t...
-
Upload
camilla-benson -
Category
Documents
-
view
214 -
download
0
Transcript of Exclution When you have a phone you are often treated as you are in the group. But when you don’t...
Exclution
When you have a phone you are often
treated as you are in the group. But when you
don’t you are often taunted but not in your
face, online because it is so much easier to
gloat online than to there faces. Also because
you can’t see it, because they think that just
because you don’t have a phone you can’t
look at what you posted. You could just ask
for your friend’s phone but even if you don’t
there most likely be talk about you in the
hallway. So you will find out even if you don’t
have a phone at the moment.
Sad Story
Ghyslain became an internet sensation in May 2003 when
four classmates discovered a private video of him pretending
to be a Jedi Knight. Rather than laughing at the video in the
privacy of their homes, the classmates decided to upload the
video to the internet. Within weeks it had been seen by
millions. According to www.jedimaster.net, Ghyslain is now the
most downloaded male on the internet. While the world laughs,
and spin-offs are created at an average of one per day,
Ghyslain and his parents don't find the situation very funny.
The parents have filed a lawsuit against the classmates that
uploaded the video. The lawsuit is accompanied by instant
messaging transcripts, in which the classmates gloat over their
success. Ghyslain was forced to drop out of high school, and
finished the year at a faculty specializing in child psychiatry.
Harassment
Harassment is when you bully someone by repeating the same
thing over and over again until they actually think that what you say
is true. If somebody said that your ugly you would probably just
ignore it, but if it happened more than once and by multiple people
you would start to feel offended and even think that its true too.
Some people even make several accounts that they could harass you
with you thinking that its actually more people that think your ugly.
This is most likely where bullying starts. Either this or people start
bullying you at school and then take it to there computers.
Trying To Help
In the past few years, teen suicide attempts have been on the rise around the
nation, and many experts believe it may be tied in part to bullying on social media
sites. According to the Centers for Disease Control and Prevention (CDC), 1 in 6
American high school students has seriously considered suicide, and 1 in 12 has
attempted it. Figures suggest that 1 out of 3 children who have access to the
Internet or mobile phones are involved in "cyber bullying," bullying using the
Internet. Although a recent study by the American Academy of Pediatrics (AAP)
National Conference suggested that cyber bullying is rarely the sole reason that
teens commit suicide, the study did find that females, especially those with mood
disorders, were more likely to commit suicide after being harassed on and/or offline.
To address these alarming statistics, the New Kent Sheriff's Office and New Kent
High School PTSO and guidance department will host a free cyber bullying
information session on Wednesday, Dec. 4, from 6:30 - 7:30 p.m. in the New Kent
High School media center. There, parents can find out how New Kent County and
other local students may be affected by social media by learning the latest trends
in cyber bullying, warning signs, and ways in which they can help their children if
they are being bullied or are bullying other students. Although recently, some legal
reprimands have been handed down in court to cyber bullying teens, many get
away with it anonymously. This is one of the reasons that incidents of cyber bullying
have risen, the CDC reported.
Outing
Outing is practiced online and offline. When you tell
something secretive to someone and then they turn on you
and post it online. Like if I found a weird picture of my best
friend and I show someone it. Then they may go online and
show everyone who I’m friends with. Outing isn’t really
harassment because it only needs to happen once and that
is enough. Outing is mostly a way to embarrass you un front
of everyone and trying to get revenge.
Mobile Tips Only give your phone number out to people that you want to have it. You can hide your number by setting it to
'private' in the settings of your phone, but there's an even easier way - dial 1831 before you call. For example, if
you wanted to call 02 9870 2200, but didn't want the person on the other end to see your number, you should ring
1831 02 9870 2200 instead.(This works when you're ringing from and to a mobile or a landline phone! This has
been tested in Australia, there may be another prefix you should dial elsewhere in the world)
If you've got Bluetooth switched on, on your mobile phone, and your phone is not set to 'hidden', chances are
you're open to blue jacking, bluesnarfing or blue bugging. What does this mean? Read on below.
Blue jacking - the sending of unwanted messages from one Bluetooth device to another. While Blue jacking is
normally harmless, often people who receive these types of messages don't know what has happened, and may
think that someone has taken over their phone.Bluesnarfing - the unauthorized access of information from a wireless device (such as a mobile phone) through a
Bluetooth connection. By 'hacking' into the phone, someone can have access to the calendar, pictures, contacts,
text messages, and any other content stored on the phone.
Blue bugging - another form of Bluetooth attack, in which someone takes control of your phone, to call their phone.
This means that someone can simply listen to any conversation their victim is having in real life. Further
development of blue bugging tools has allowed users to totally take over their victim's phone, making calls and
sending text messages from the victim's phone.By turning off blue tooth when you're not using it, and/or by setting your phone's bluetooth settings to 'hidden', you
can remove the risk of these threats.
Cyber Stalking
Cyber Stalking is a way of harassing someone online.
Cyber Stalking is basically just a way to stalk someone
online, that for he other person o the computer is real. This
person who is or was bullied believes that whatever the
stalker said is true. These people tend to follow you around
and are usually people you know really well. Stalking, online
or offline, is just someone that follows you around and when
they catch personal info they immediately use it against
you.
Sadder Story
At 13 Alex hung with a popular crowd, had a quick wit and got good grades.
Unknown to his parents, a group of girls at his school had been taunting him for
about a month through instant messages, teasing him about his size and
challenging him to perform physical activities he couldn't accomplish, like
running around the school track in a certain time or jumping across a ditch. Alex
spent many hours chatting online in his bedroom. Other kids knew he was
thinking about taking his own life, his mother says. "They were trying to dare
him to commit suicide, thinking it was a big joke.” He was deadly serious. One
afternoon last June, while he was home alone, Alex pulled his grandfather's
antique shotgun out from under a bed, loaded it with shells and killed himself.
He had deleted every file from his computer but left a final message on it that
read, "The only way to get the respect you deserve is to die." Only later did his
parents learn about the online teasing, when his mother overheard some girls
talking about it. "If someone is picking on you in the school yard, you can go
home," says his mother, who is haunted by thoughts that she should have been
more vigilant monitoring Alex's Web use. "When it's on the computer at home,
you have nowhere to go. "No one knew what was going on," says a guidance
counsellor at his school. "Not his Sunday school teachers, not his school
teachers, not his parents. If this could happen to him, it could happen to
anyone."
M
asquerading Masquerading is an elaborate form of cyberbullying where the
bully pretends to be someone who they aren’t. Basically it’s the art
of being someone your not, like acting. They might create fake
email addresses, instant messaging names or they might use
someone else’s email or mobile phone to bully you. This would
make it appear as if the threats have been sent by someone else,
again keeping the bully’s identity hidden. This also means that
they can pretend to be your friend and be someone your not. Some
people will tell you that you would give them your password if you
were a ‘real’ friend. Do not give out your password to anyone. Lets
just say a 13-year-old girl gave her password to her best friend.
After they had a fight, the ex-friend used the girl's screen name to
enter an adult chat room and gave out the girl's phone number. A
man from the chat room called the girl's home – but was luckily
intercepted by the mother. That would have been a close call but
what if that girl answered that phone, what would have began?
A Less Sadder Story
"David Knight's life at school has been hell. He was teased, taunted and punched for
years. But the final blow was the humiliation he suffered every time he logged onto the
Internet. Someone had set up an abusive Web site about him that made life unbearable.
Rather than just some people, say 30 in a cafeteria, hearing them all yell insults at you, it's
up there for 6 billion people to see. Anyone with a computer can see it," says David.
Another boy at school sent David an email telling him to look at a website. David went to
the site and found "my photo on this Web site saying 'Welcome to the Web site that makes
fun of Dave Knight' and just pages of hateful comments directed at me and everyone in
my family.“ The person who created the website asked others to join in and post hateful
comments about David and his family. His mother said that David began "withdrawing
completely, isolating himself from everyone.“ David felt that he couldn't continue with all
of this happening at school, and decided to finish his last year of school at home. After
talking with the police, the Knight family contacted Yahoo! (a very popular site), where the
site had been hosted. After a number of weeks of unreturned phone calls, the Knights
threatened legal action, and Yahoo! took the site down off the internet. Yahoo! is just one
of thousands of internet companies offering free website hosting services. Most companies
have policies about what content can and can not be published on the internet, but these
policies are rarely enforced - most of the time, people can write what they like. David is
now trying to recover from the cyberbullying incident, and is training to become a pilot,
hoping to, one day, be a fighter pilot in the Canadian Armed Forces
Flaming Flaming is an intense argument, that normally takes
place in chat rooms, over instant messages or email. These
bullies use capital letters, images and symbols to add
emotion to their argument. This is a real life example from
People magazine: "I was instant messaging my best friend,
and we had an argument over a guy…The next day she
printed the conversation and handed it to a group of girls,
but she'd changed it. It read like I had said all these really
mean things [about them all] that I never said, and they
believed her.“ Look how the results of that flame worked
out. Never send a reply to a bully whilst you are angry. Wait
a period of time, to cool down, before you reply, if you even
have to reply at all. These flames often bring out stuff you
of you, that you don’t want others to see. This is sometimes
how bullies start to bully.
Picture Messages
Picture messages are small photos, taken with a camera
phone, that can be sent to other mobile phones, or to the
internet, instantaneously. In one case, students at a local
high school used a camera phone to take a photo of a
classmate in the shower after gym. The picture was sent
throughout the school in minutes. "Marcus Andrews, 11,
was the victim of a vicious attack in the school corridors...
Children pounced on him, broke his arm, and photographed
his agony with their mobile phones, before emailing the
pictures to friends.“ This was cruel and harassing to the
poor kid.
Pseudonym
A pseudonym is like a nickname. Bullies may call
themselves a different name when they are online, to when
they are offline. Like someone would call themself
KattieKupKake online and there real name is Katherine
James or something. Basicly it’s a pen name only online,
because you aren’t writing letters. They do this to keep
their real identity a secret from you. When you use instant
messaging services like MSN Messenger or Yahoo
Messenger, you are known to others online by a nickname
that you have chosen. This is an example of a pseudonym.
Bullies can use this same feature to change their name to
something that you wouldn’t expect. Similarly, bullies may
change their name to something offensive. Anyone can.
Emails
Email is the third most common form of cyberbullying. Email can be
used by a cyberbully in a number of ways: Sending harassing or
threatening messages, attaching viruses to emails, or even including
private information about a victim and sending it to hundreds of
people. There are many more ways email has and can been used as a
weapon. One email can be sent to hundreds of people, across the
globe, at the touch of a button. "It was a non-stop nightmare... I
dreaded going on my computer," says one girl of an incident where
she was constantly being bombarded by threatening emails. Email is
used by almost everyone because you use it for work, school
accounts, billing and other things too.
Anonymity
Anonymity is when someone makes threatening
comments to you, but is able to hide who they are. This
means that it can be hard for you to figure out who sent you
a threatening message or email. Anonymity can include the
use of aliases or pseudonyms. Have a look at the book on
pseudonyms on the bookcase. Anonymity is a big issue in
terms of cyberbullying. If someone is sending you
threatening text messages on your mobile phone, unless
you recognize the phone number it is sent from, you're
unlikely to know who sent you the message. Or they may
use someone else's phone to send you the message. These
are examples of anonymity, where the bully’s identity
remains hidden.
Greg Frawly’s Story
Greg Frawley left Hurlstone Agricultural High School after unidentified
students set up a website to accuse him and another teacher of being
child molesters who should be killed. Students anonymously set up a
website, called ThrowStones. This website recommended that two
teachers at the school be executed. It accused one teacher of being a
pedophile. It accused another of stealing. "Can you imagine how you
would feel, if a story posted on the internet, stated that you were a child
molester, and that this message was rapidly communicated to students
you taught?" Greg Frawley told The Daily Telegraph. To this day, the
students behind the website have not been caught. The police have lain
no charges. The incident has been dubbed "one of the states worst
cases of cyberbullying.“ "I haven't slept for six months," Frawley said.
"The department of Education offered me team teaching work one day
a week but I feel so threatened I can't go back."Frawley believes that he
has been stained with the "worst social stigma of all". He believes that a
student or teacher will commit suicide over one of these websites.
Sadly, he did not realize that many children already had done just that.
Very Sad Story
Cyberbullying not only causes suicide but also murder of little
kids. Listen to this. In June 2003, an eleven-year-old Japanese
girl killed her classmate. The girl told police that she killed her
classmate because she was angry about messages that had
been posted about her on the internet. Here were two, young,
Japanese school girls. They were best friends. One was twelve
years old, the other eleven. They often sent text messages to
each other - police were told that they had been arguing over
messages posted on the internet. Police were told that the girl
called her classmate over to her with the intent to kill her. The
classmate died of massive blood loss in a study room at a local
primary school after her neck was slashed with a paper cutter.
Silent Killer
Helen Adgar believes her teenage son died after being on
the receiving end of a silent but potent form of bullying -
text messaging. The nature of the internet and of mobile
phones, is that you can be reached 24 hours a day, 7 days a
week, no matter where you are. Sometime during the night
in this incident above, this boy received a text message.
Whatever was contained in that message caused him to
leave his house and go to the top of a cliff. He jumped off
the cliff. His mother believes those text messages that he
received were a significant factor in his death. "Bullying
claims the lives of around 20 teenagers a year."
Phoebe’s Story
Each night, Phoebe would receive abusive text messages
from other girls at her school. She also received up to 20
calls a day from the same girls, bullying her. Phoebe's
parents noticed that she was becoming withdrawn. Boys
and girls in similar situation tend to become withdrawn,
often isolating themselves completely from everyone
around them. Fortunately, Phoebe kept the messages on
her phone, and her and her mum were able to go to school
with the evidence. The bullying was tackled quickly by the
school, and immediately stopped. Nevertheless, she was
only ten years old.
Kylie’s Story
Kylie had two previous "run-ins" with online harassment,
ruining two years of her education and wrecking many of
her friendships. Two of her classmates allegedly put
together a website called "Kill Kylie Incorporated." On this
website, they made homophobic comments about her and
her family. The problem got worse when another classmate
started creating instant messaging screen names that were
very similar to Kylie's, and then began talking to Kylie's
friends pretending to be Kylie. Police ultimately investigated
the episodes and filed proceedings against the harassers. "I
had no escape", said Kylie, who was ultimately home-
schooled before moving to a new high school.
V
ideos