Keenright591 Interactive Presentation

35

description

This is a lesson for studnets to learn about cyberbullying.

Transcript of Keenright591 Interactive Presentation

Page 1: Keenright591 Interactive Presentation
Page 2: Keenright591 Interactive Presentation

What is cyberbullying?

Cyberbullying in any kind of negative virtual communication.

Page 3: Keenright591 Interactive Presentation

There are many ways to bully someone other than just sending them a

message.

Page 4: Keenright591 Interactive Presentation

Ways of CyberbullyingWays of CyberbullyingInstant Messaging Instant Messaging Stealing passwordsStealing passwordsBlogsBlogsWeb SitesWeb SitesSending pictures through phones and Sending pictures through phones and emailemailSending malicious codeSending malicious codeImpersonationsImpersonationsPreventionPrevention

Page 5: Keenright591 Interactive Presentation

Instant messagingSending threatening messages through IM’s or texting.

Sending warning messages not to tell on them.

Creating screen names that are 1 letter away from someone else’s screen name and sending offensive messages

Texting wars and death threats

Page 6: Keenright591 Interactive Presentation

Stealing passwordsStudent’s may steal passwords and access other’s accounts to send offensive messages to anger them.

Students may gain access to an account and then change the settings to lock them out.

Page 7: Keenright591 Interactive Presentation

BlogsBlogs are used as online journals to write damaging thing about someone’s reputation.

Page 8: Keenright591 Interactive Presentation

Web Sites

Web sites are created to insult another student or a group of students.

Students also post pictures and personal information about other students.

Page 9: Keenright591 Interactive Presentation

Sending pictures through cell phones and email

Sending degrading photos through e-mails; the emails can then be passed around to hundreds of emails within hours.

New cell phones are now able to send photos and can be spread to an entire address book at once.

Page 10: Keenright591 Interactive Presentation

Sending Malicious Code

Student send viruses, spyware and hacking programs to other computers as a form of harassment.

Some programs can even give the student access to a victims computer.

Page 11: Keenright591 Interactive Presentation

ImpersonationWhen a student impersonates another students they usually do this in a chat room. The students reveals personal information that could include name, address and phone number. This could lead to an attack on the victim.

Page 12: Keenright591 Interactive Presentation

PreventionUnderstand that teasing, threats and taking over someone’s identity are all forms of bullying.

If this happens to you report the behaviors to an adult.

Parents

Page 13: Keenright591 Interactive Presentation

ParentsTell you parents.

Parents need to inform you school counselor of the cyberbullying.

Parents need to tell your doctor.

It may be necessary to have counseling until the problems are resolved.

Netiquette

Page 14: Keenright591 Interactive Presentation

Netiquette

• Never send your name, address or phone number to someone on the internet

• Don’t send out an email when you are mad; wait and reread it when you are calm.

Go to Quiz

Page 15: Keenright591 Interactive Presentation

What is one way that someone could use their cell phone to cyberbully?

B.Call their mom

C.Send you a threatening message

D. Call information

Page 16: Keenright591 Interactive Presentation

Go read for the answer again.

Read here

Page 17: Keenright591 Interactive Presentation

Instant messagingSending threatening messages through IM’s or texting.

Sending warning messages not to tell on them.

Creating screen names that are 1 letter away from someone else’s screen name and sending offensive messages

Texting wars and death threatsGo back to question

Page 18: Keenright591 Interactive Presentation

NEXT QUESTION

Page 19: Keenright591 Interactive Presentation

Stealing passwords could not allow someone to:

B.Access my account

C.Be good at playing games

D.Send emails under my account without my knowledge

Page 20: Keenright591 Interactive Presentation

Go read for the answer again.

Read here

Page 21: Keenright591 Interactive Presentation

Stealing passwordsStudent’s may steal passwords and access other’s accounts to send offensive messages to anger them.

Students may gain access to an account and then change the settings to lock them out.

Go back to question

Page 22: Keenright591 Interactive Presentation

NEXT QUESTION

Page 23: Keenright591 Interactive Presentation

These can be created to post pictures on the internet:

B.Channels

C.Web sites

D.Stations

Page 24: Keenright591 Interactive Presentation

Go read for the answer again.

Read here

Page 25: Keenright591 Interactive Presentation

Web Sites

Web sites are created to insult another student or a group of students.

Students also post pictures and personal information about other students.

Go back to question

Page 26: Keenright591 Interactive Presentation

NEXT QUESTION

Page 27: Keenright591 Interactive Presentation

What can spread pictures and information the fastest?

B.Mail

C.Word of Mouth

D.Computers

E.Cell Phones

F. Both C & D

Page 28: Keenright591 Interactive Presentation

Go read for the answer again.

Read here

Page 29: Keenright591 Interactive Presentation

Sending pictures through cell phones and email

Sending degrading photos through e-mails; the emails can then be passed around to hundreds of emails within hours.

New cell phones are now able to send photos and can be spread to an entire address book at once.

Go back to question

Page 30: Keenright591 Interactive Presentation

NEXT QUESTION

Page 31: Keenright591 Interactive Presentation

What can happen if someone gets into your computer?

B.They can send your personal information to other recipients

C. A virus could be sent to infect your computer

D. Someone would be able to act like you in a chat room.

E. A & C

F. All of the above

Page 32: Keenright591 Interactive Presentation

Go read for the answer again.

Read here

Page 33: Keenright591 Interactive Presentation

Sending Malicious Code

Student send viruses, spyware and hacking programs to other computers as a form of harassment.

Some programs can even give the student access to a victims computer.

Go back to question

Impersonation

When a student impersonates another students they usually do this in a chat room. The students reveals personal information that could include name, address and phone number. This could lead to an attack on the victim.

Page 34: Keenright591 Interactive Presentation

NEXT PAGE

Page 35: Keenright591 Interactive Presentation