100 likes | 200 Views
Terror by Technology. Catholic Educators’ Convention October 12, 2012 Aïda Michlowski, PhD, JD. Inappropriate content. Inappropriate contact. Inappropriate conduct. What is cyberbullying ?. How does cyberbullying differ from physical (F2F) bullying?. Malicious code. Impersonating.
E N D
Terror by Technology Catholic Educators’ Convention October 12, 2012 Aïda Michlowski, PhD, JD
Inappropriate content Inappropriate contact Inappropriate conduct What is cyberbullying?
Malicious code Impersonating Interactive gaming Stealing passwords Sending porn Internet polling Mass emails Text attack Blogging Textual harassment What are the methods of cyberbullying?
Where does occur?
Megan Meier Ryan Halligan 160, 000 CyberBullycide Jessica Logan Who are the victims or targets of cyberbullying?
Anthony Stand Lori Drew Why do they do it? Who are the perpetrators?
Keep safe, Keep away, Keep telling! Stop, Block, Tell! What are the warning signs?
Keep current, Keep checking, Keep communicating Take 5 How do we deal with cyberbullying? ID the Creep