1 / 22

Exclution

Exclution.

tam
Download Presentation

Exclution

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Exclution When you have a phone you are often treated as you are in the group. But when you don’t you are often taunted but not in your face, online because it is so much easier to gloat online than to there faces. Also because you can’t see it, because they think that just because you don’t have a phone you can’t look at what you posted. You could just ask for your friend’s phone but even if you don’t there most likely be talk about you in the hallway. So you will find out even if you don’t have a phone at the moment.

  2. Sad Story Ghyslain became an internet sensation in May 2003 when four classmates discovered a private video of him pretending to be a Jedi Knight. Rather than laughing at the video in the privacy of their homes, the classmates decided to upload the video to the internet. Within weeks it had been seen by millions. According to www.jedimaster.net, Ghyslain is now the most downloaded male on the internet. While the world laughs, and spin-offs are created at an average of one per day, Ghyslain and his parents don't find the situation very funny. The parents have filed a lawsuit against the classmates that uploaded the video. The lawsuit is accompanied by instant messaging transcripts, in which the classmates gloat over their success. Ghyslain was forced to drop out of high school, and finished the year at a faculty specializing in child psychiatry.

  3. Harassment Harassment is when you bully someone by repeating the same thing over and over again until they actually think that what you say is true. If somebody said that your ugly you would probably just ignore it, but if it happened more than once and by multiple people you would start to feel offended and even think that its true too. Some people even make several accounts that they could harass you with you thinking that its actually more people that think your ugly. This is most likely where bullying starts. Either this or people start bullying you at school and then take it to there computers.

  4. Trying To Help In the past few years, teen suicide attempts have been on the rise around the nation, and many experts believe it may be tied in part to bullying on social media sites. According to the Centers for Disease Control and Prevention (CDC), 1 in 6 American high school students has seriously considered suicide, and 1 in 12 has attempted it. Figures suggest that 1 out of 3 children who have access to the Internet or mobile phones are involved in "cyber bullying," bullying using the Internet. Although a recent study by the American Academy of Pediatrics (AAP) National Conference suggested that cyber bullying is rarely the sole reason that teens commit suicide, the study did find that females, especially those with mood disorders, were more likely to commit suicide after being harassed on and/or offline. To address these alarming statistics, the New Kent Sheriff's Office and New Kent High School PTSO and guidance department will host a free cyber bullying information session on Wednesday, Dec. 4, from 6:30 - 7:30 p.m. in the New Kent High School media center. There, parents can find out how New Kent County and other local students may be affected by social media by learning the latest trends in cyber bullying, warning signs, and ways in which they can help their children if they are being bullied or are bullying other students. Although recently, some legal reprimands have been handed down in court to cyber bullying teens, many get away with it anonymously. This is one of the reasons that incidents of cyber bullying have risen, the CDC reported.

  5. Outing Outing is practiced online and offline. When you tell something secretive to someone and then they turn on you and post it online. Like if I found a weird picture of my best friend and I show someone it. Then they may go online and show everyone who I’m friends with. Outing isn’t really harassment because it only needs to happen once and that is enough. Outing is mostly a way to embarrass you un front of everyone and trying to get revenge.

  6. Mobile Tips Only give your phone number out to people that you want to have it. You can hide your number by setting it to 'private' in the settings of your phone, but there's an even easier way - dial 1831 before you call. For example, if you wanted to call 02 9870 2200, but didn't want the person on the other end to see your number, you should ring 1831 02 9870 2200 instead.(This works when you're ringing from and to a mobile or a landline phone! This has been tested in Australia, there may be another prefix you should dial elsewhere in the world) If you've got Bluetooth switched on, on your mobile phone, and your phone is not set to 'hidden', chances are you're open to blue jacking, bluesnarfing or blue bugging. What does this mean? Read on below. Blue jacking - the sending of unwanted messages from one Bluetooth device to another. While Blue jacking is normally harmless, often people who receive these types of messages don't know what has happened, and may think that someone has taken over their phone. Bluesnarfing - the unauthorized access of information from a wireless device (such as a mobile phone) through a Bluetooth connection. By 'hacking' into the phone, someone can have access to the calendar, pictures, contacts, text messages, and any other content stored on the phone. Blue bugging - another form of Bluetooth attack, in which someone takes control of your phone, to call their phone. This means that someone can simply listen to any conversation their victim is having in real life. Further development of blue bugging tools has allowed users to totally take over their victim's phone, making calls and sending text messages from the victim's phone. By turning off blue tooth when you're not using it, and/or by setting your phone's bluetooth settings to 'hidden', you can remove the risk of these threats.

  7. Cyber Stalking Cyber Stalking is a way of harassing someone online. Cyber Stalking is basically just a way to stalk someone online, that for he other person o the computer is real. This person who is or was bullied believes that whatever the stalker said is true. These people tend to follow you around and are usually people you know really well. Stalking, online or offline, is just someone that follows you around and when they catch personal info they immediately use it against you.

  8. Sadder Story At 13 Alex hung with a popular crowd, had a quick wit and got good grades. Unknown to his parents, a group of girls at his school had been taunting him for about a month through instant messages, teasing him about his size and challenging him to perform physical activities he couldn't accomplish, like running around the school track in a certain time or jumping across a ditch. Alex spent many hours chatting online in his bedroom. Other kids knew he was thinking about taking his own life, his mother says. "They were trying to dare him to commit suicide, thinking it was a big joke.” He was deadly serious. One afternoon last June, while he was home alone, Alex pulled his grandfather's antique shotgun out from under a bed, loaded it with shells and killed himself. He had deleted every file from his computer but left a final message on it that read, "The only way to get the respect you deserve is to die." Only later did his parents learn about the online teasing, when his mother overheard some girls talking about it. "If someone is picking on you in the school yard, you can go home," says his mother, who is haunted by thoughts that she should have been more vigilant monitoring Alex's Web use. "When it's on the computer at home, you have nowhere to go. "No one knew what was going on," says a guidance counsellor at his school. "Not his Sunday school teachers, not his school teachers, not his parents. If this could happen to him, it could happen to anyone."

  9. Masquerading Masquerading is an elaborate form of cyberbullying where the bully pretends to be someone who they aren’t. Basically it’s the art of being someone your not, like acting. They might create fake email addresses, instant messaging names or they might use someone else’s email or mobile phone to bully you. This would make it appear as if the threats have been sent by someone else, again keeping the bully’s identity hidden. This also means that they can pretend to be your friend and be someone your not. Some people will tell you that you would give them your password if you were a ‘real’ friend. Do not give out your password to anyone. Lets just say a 13-year-old girl gave her password to her best friend. After they had a fight, the ex-friend used the girl's screen name to enter an adult chat room and gave out the girl's phone number. A man from the chat room called the girl's home – but was luckily intercepted by the mother. That would have been a close call but what if that girl answered that phone, what would have began?

  10. A Less Sadder Story "David Knight's life at school has been hell. He was teased, taunted and punched for years. But the final blow was the humiliation he suffered every time he logged onto the Internet. Someone had set up an abusive Web site about him that made life unbearable. Rather than just some people, say 30 in a cafeteria, hearing them all yell insults at you, it's up there for 6 billion people to see. Anyone with a computer can see it," says David. Another boy at school sent David an email telling him to look at a website. David went to the site and found "my photo on this Web site saying 'Welcome to the Web site that makes fun of Dave Knight' and just pages of hateful comments directed at me and everyone in my family.“ The person who created the website asked others to join in and post hateful comments about David and his family. His mother said that David began "withdrawing completely, isolating himself from everyone.“ David felt that he couldn't continue with all of this happening at school, and decided to finish his last year of school at home. After talking with the police, the Knight family contacted Yahoo! (a very popular site), where the site had been hosted. After a number of weeks of unreturned phone calls, the Knights threatened legal action, and Yahoo! took the site down off the internet. Yahoo! is just one of thousands of internet companies offering free website hosting services. Most companies have policies about what content can and can not be published on the internet, but these policies are rarely enforced - most of the time, people can write what they like. David is now trying to recover from the cyberbullying incident, and is training to become a pilot, hoping to, one day, be a fighter pilot in the Canadian Armed Forces

  11. Flaming Flaming is an intense argument, that normally takes place in chat rooms, over instant messages or email. These bullies use capital letters, images and symbols to add emotion to their argument. This is a real life example from People magazine: "I was instant messaging my best friend, and we had an argument over a guy…The next day she printed the conversation and handed it to a group of girls, but she'd changed it. It read like I had said all these really mean things [about them all] that I never said, and they believed her.“ Look how the results of that flame worked out. Never send a reply to a bully whilst you are angry. Wait a period of time, to cool down, before you reply, if you even have to reply at all. These flames often bring out stuff you of you, that you don’t want others to see. This is sometimes how bullies start to bully.

  12. Picture Messages Picture messages are small photos, taken with a camera phone, that can be sent to other mobile phones, or to the internet, instantaneously. In one case, students at a local high school used a camera phone to take a photo of a classmate in the shower after gym. The picture was sent throughout the school in minutes. "Marcus Andrews, 11, was the victim of a vicious attack in the school corridors... Children pounced on him, broke his arm, and photographed his agony with their mobile phones, before emailing the pictures to friends.“ This was cruel and harassing to the poor kid.

  13. Pseudonym A pseudonym is like a nickname. Bullies may call themselves a different name when they are online, to when they are offline. Like someone would call themself KattieKupKake online and there real name is Katherine James or something. Basicly it’s a pen name only online, because you aren’t writing letters.They do this to keep their real identity a secret from you. When you use instant messaging services like MSN Messenger or Yahoo Messenger, you are known to others online by a nickname that you have chosen. This is an example of a pseudonym. Bullies can use this same feature to change their name to something that you wouldn’t expect. Similarly, bullies may change their name to something offensive. Anyone can.

  14. Emails Email is the third most common form of cyberbullying. Email can be used by a cyberbully in a number of ways: Sending harassing or threatening messages, attaching viruses to emails, or even including private information about a victim and sending it to hundreds of people. There are many more ways email has and can been used as a weapon. One email can be sent to hundreds of people, across the globe, at the touch of a button. "It was a non-stop nightmare... I dreaded going on my computer," says one girl of an incident where she was constantly being bombarded by threatening emails. Email is used by almost everyone because you use it for work, school accounts, billing and other things too.

  15. Anonymity Anonymity is when someone makes threatening comments to you, but is able to hide who they are. This means that it can be hard for you to figure out who sent you a threatening message or email. Anonymity can include the use of aliases or pseudonyms. Have a look at the book on pseudonyms on the bookcase. Anonymity is a big issue in terms of cyberbullying. If someone is sending you threatening text messages on your mobile phone, unless you recognize the phone number it is sent from, you're unlikely to know who sent you the message. Or they may use someone else's phone to send you the message. These are examples of anonymity, where the bully’s identity remains hidden.

  16. Greg Frawly’s Story Greg Frawley left Hurlstone Agricultural High School after unidentified students set up a website to accuse him and another teacher of being child molesters who should be killed. Students anonymously set up a website, called ThrowStones. This website recommended that two teachers at the school be executed. It accused one teacher of being a pedophile. It accused another of stealing. "Can you imagine how you would feel, if a story posted on the internet, stated that you were a child molester, and that this message was rapidly communicated to students you taught?" Greg Frawley told The Daily Telegraph. To this day, the students behind the website have not been caught. The police have lain no charges. The incident has been dubbed "one of the states worst cases of cyberbullying.“ "I haven't slept for six months," Frawley said. "The department of Education offered me team teaching work one day a week but I feel so threatened I can't go back."Frawleybelieves that he has been stained with the "worst social stigma of all". He believes that a student or teacher will commit suicide over one of these websites. Sadly, he did not realize that many children already had done just that.

  17. Very Sad Story Cyberbullying not only causes suicide but also murder of little kids. Listen to this. In June 2003, an eleven-year-old Japanese girl killed her classmate. The girl told police that she killed her classmate because she was angry about messages that had been posted about her on the internet. Here were two, young, Japanese school girls. They were best friends. One was twelve years old, the other eleven. They often sent text messages to each other - police were told that they had been arguing over messages posted on the internet. Police were told that the girl called her classmate over to her with the intent to kill her. The classmate died of massive blood loss in a study room at a local primary school after her neck was slashed with a paper cutter.

  18. Silent Killer Helen Adgar believes her teenage son died after being on the receiving end of a silent but potent form of bullying - text messaging. The nature of the internet and of mobile phones, is that you can be reached 24 hours a day, 7 days a week, no matter where you are. Sometime during the night in this incident above, this boy received a text message. Whatever was contained in that message caused him to leave his house and go to the top of a cliff. He jumped off the cliff. His mother believes those text messages that he received were a significant factor in his death. "Bullying claims the lives of around 20 teenagers a year."

  19. Phoebe’s Story Each night, Phoebe would receive abusive text messages from other girls at her school. She also received up to 20 calls a day from the same girls, bullying her. Phoebe's parents noticed that she was becoming withdrawn. Boys and girls in similar situation tend to become withdrawn, often isolating themselves completely from everyone around them. Fortunately, Phoebe kept the messages on her phone, and her and her mum were able to go to school with the evidence. The bullying was tackled quickly by the school, and immediately stopped. Nevertheless, she was only ten years old.

  20. Kylie’s Story Kylie had two previous "run-ins" with online harassment, ruining two years of her education and wrecking many of her friendships. Two of her classmates allegedly put together a website called "Kill Kylie Incorporated." On this website, they made homophobic comments about her and her family. The problem got worse when another classmate started creating instant messaging screen names that were very similar to Kylie's, and then began talking to Kylie's friends pretending to be Kylie. Police ultimately investigated the episodes and filed proceedings against the harassers. "I had no escape", said Kylie, who was ultimately home-schooled before moving to a new high school.

  21. Videos

More Related