1 / 41

Cyberbullying

Cyberbullying . Presented by . Windsor Police Service . Community Services Branch . Presented by . PC Lisa Gallant . 519-255-6173 Ext 4 . What is Bullying . • Usually Repetitious and . continuous . • It can be a single .

ilario
Download Presentation

Cyberbullying

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyberbullying Presented by Windsor Police Service Community Services Branch Presented by PC Lisa Gallant 519-255-6173 Ext 4

  2. What is Bullying • Usually Repetitious and continuous • It can be a single incident which includes repetitious assaults, name calling, threats • Physical-pushing, hitting, throwing etc • Verbal-teasing, taunting, ridiculing • Psychological-gossip, rumors, excluding, rejection

  3. EFFECTS OF BULLYING § Become withdrawn § Fear of going to school § Low self esteem § School work problems § Physical pain § Emotional pain

  4. Traditionally bullying has taken place: 9 On the school bus 9 In the classroom 9 On the playground 9 In the lavatory (Myles Neuts-Myles was a young boy bullied in school and hanged on a coat hook in the washroom at school. Myles was strangled to death on the hook) 9 On the phone 9 On the way to and from school

  5. What is Cyberbullying? -the use of information and communication technologies to bully, embarrass, threaten or harass another

  6. Communication Technologies ¾ Instant Messaging-”IM’s” ¾ Blogging ¾ Discussion Boards ¾ Guest Books ¾ Cell Phones ¾ Interactive Games ¾ E-mail ¾ Provocative postings ¾ Websites ¾ Profiles ¾ Websites targeting the other with humiliation

  7. What are they? Instant Messaging-MSN, YAHOO, ICQ-Real time chat, web cam, photos Cell Phones-camera phone with text messaging Interactive Games-bullying can occur while playing on-line games-moderator can assist in terminating the bullying E-mail-not real time, forwarding hurtful e-mails Websites-”Dave Knight”

  8. Welcome to the Site that Makes Fun of Dave Knight Dave Knight lived in the Toronto area Was bullied at school A site was created on yahoo to make fun of him People added to it, insults, demeaning and embarrassing comments It took his parents 10 months before Yahoo finally took the site down Dave stopped going to school and began home schooling to avoid the bullying

  9. Cont’d Profiles-personal info, pretend to be someone else Blogging-on-line diary, myspace.com Discussion Boards/Newgroups/Guestbooks-often used to make fun of others, people can add to it rateteacher.com

  10. NOW THE BULLY HAS COME INTO MY HOME ¾THERE IS NO ESCAPING IT ¾HOME IS NO LONGER A REFUGE FROM THE HURTFUL WORDS AND ACTIONS

  11. WHY CYBERSPACE? Common Myths: IT IS A VIRTUAL PLACE TO HIDE NO WITNESSES NO SCENE OF THE CRIME

  12. Four Types of On-Line Bullies ‰ The Vengeful Angel ‰ The Power-Hungry ‰ The “Mean Girls” ‰ The Inadvertent Cyberbully or “Because I Can” ‰ www.netbullies.com

  13. The Vengeful Angel The victim of bullying retaliates Don’t see themselves as a bully Righting wrongs or protecting themselves or others from the “Bad Guy” Protecting a friend

  14. Power Hungry • Like the schoolyard bullies • Need an audience • Want to exert their power • Often brag about their actions

  15. Computer Savvy Often the victim of typical offline bullying May be physically smaller The ones picked on for not being popular enough Greater technical skills

  16. “Mean Girls” 9Done/planned in a group 9Entertainment 9Bullying other females 9Grows when fed by group admiration, cliques or by the silence of others

  17. Inadvertent Cyberbully 9“Because I can” 9Don’t believe they are cyberbullies 9Pretending to be tough online 9Don’t think before clicking “send”

  18. How it Happens ‰ Flaming ‰ Harassment ‰ Cyberstalking ‰ Denigration ‰ Impersonation ‰ Outing and Trickery ‰ Exclusion

  19. Definitions Flaming-online “fights” with angry words Harassment-repeatedly sending offensive, rude, and insulting messages Cyberstalking-repeatedly sending messages that include threats of harm or are highly intimidating.

  20. Cont’d Denigration-”Dissing” someone online. Impersonation-breaking into someone’s account, posing as that person.

  21. Cont’d Outing and Trickery-Sharing someone’s secrets. Tricking someone into revealing secrets Exclusion-Intentionally excluding someone from an online group, like a “buddy list”

  22. BYSTANDERS ¾ Forward hurtful e- mail ¾ Visit a cyberbully’s “vote for the fat girl” site ¾ Allow cyberbullies to take cell phone photos or video of personal moments of others

  23. TIPS FOR THE BULLIED § Block sender’s e-mail § Don’t reply to messages from cyberbullies § Don’t erase or delete messages § Change e-mail or cell phone number § Tell an adult § Inform your ISP § Call police if messages are threatening

  24. BULLY BEWARE “YOU CAN BE FOUND” 9 Your internet service provider - you can be held accountable and lose your privileges 9 A footprint is left on your hard drive with any messages sent

  25. ASK YOURSELF ‰ Am I being kind and showing respect to others and myself? ‰ How would I feel if someone did the same thing to me or to my best friend? ‰ How do I feel inside? ‰ What would a trusted adult, who is important in my life, think?

  26. Cont’d ‰ Is this action in violation of any agreements, rules, or laws? ‰ How would I feel if everyone could see me? ‰ Would it be okay if I did this in my home or at school? ‰ How does this action reflect on me?

  27. Cont’d ¾ 16% admitted to having sent hateful messages themselves ¾ 75% of victims don’t call police ¾ 25% of victims suffer in silence-never tell anyone

  28. MISCONCEPTIONS • Tell all-it’s okay to tell personal secrets on the internet • I have a free speech right • What happens online is just a game. It is not real. So no one can get hurt • What happens online should stay online

  29. The Truth YOU WILL BE HELD ACCOUNTABLE

  30. The Law, Cyberbullying and You ¾ Utter threats cc 264.1 ¾ Extortion by threats cc 346 (1) ¾ Assault cc 266 ¾ Criminal harassment cc 264 (1) ¾ Personation cc 403

  31. THOSE WHO CAN, DO

  32. THOSE WHO CAN’T,

  33. BULLY

  34. RESOURCES • www.cyberwise.ca • www.cyberbullying.ca • www.cybertip.ca • www.transl8it.com • www.safekids.com- on-line safety quiz • www.stopcyberbullying.com • www.wiredkids.org on-line quiz • www.bullying.org

  35. FOR THE PARENTS

  36. FILTERS • SECURITY SOFTWARE-Predator Guard-scans all messages and “notices” when that text could be threatening to user • E-MAIL TRACKER PRO-allows you to track Internet E-mail back to sender • PARENTAL CONTROLS-offers chat filtering protection for both instant messaging and chat rooms

  37. What You Can Do 9 Make it your business 9 Keep computer in a common place 9 Check their online activities periodically and tell them you will be doing this 9 Search for your child’s name online-check his/her profiles, postings, blogs, web pages, etc

  38. Cont’d 9 Tell your child that you may check their history on chat lines and e-mail if you believe you may find unsafe or irresponsible behavior 9 Watch out for secretive behavior online

  39. Signs of Victimization Emotional upset-depression, sadness, anxiety, anger or fear. Esp after using the phone or Internet Avoidance of friends, school, activities Decline in grades Subtle comments that reflect emotional distress or disturbed online or in-person relationships Centre for Safe and Responsible Internet Use

  40. Prevent Your Child From Being a Cyberbully § Good examples § Good values § Talk to them about the implications of severe cyberbullying § Retaliating is not smart

  41. Thank-you to TV Cogeco for their support in making this presentation possible

More Related