1 / 19

6.2.1 Computer Applications

6.2.1 Computer Applications. How the use of technology affects humans CYBER BULLYING. Slide Show created by Mae Thomas Sep 2009. I LOVE Facebook. I LOVE IMing. I LOVE Chatting with my Friends. I LOVE Blogging. Internet Technology Affecting Humans. CyberBullying.

ryancollins
Télécharger la présentation

6.2.1 Computer Applications

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 6.2.1Computer Applications How the use of technology affects humans CYBER BULLYING Slide Show created by Mae Thomas Sep 2009

  2. I LOVE Facebook I LOVE IMing I LOVE Chatting with my Friends I LOVE Blogging Internet Technology Affecting Humans

  3. CyberBullying What is Bullying? Bullying is a continued abuse of power by a person (or group) over another person. What is Cyber Bullying? Cyber Bullying is bullying through an electronic medium such as a computer or cell phone.

  4. RolesThose involved in cyber bullying are Perpetrators Targets Bystanders

  5. Perpetrators The Internet has created a new type of bully: someone who uses online anonymity to engage in bullying behavior. Believing themselves to be anonymous, some young people feel free to commit acts online that they would never carry out in person. (F2F – Face to Face)

  6. In addition to anonymity, the fact that the cyberbully can’t be seen or heard online can add to hurtful behavior. Perpetrators People may write things online that they would never say in person because they don’t “see” the other person.

  7. Perpetrators One student commented: [With] the Internet, you can really get away with a lot morebecause I don't think a lot of people would have enoughconfidence to walk up to someone and be like, “I hate you,you're ugly.” But over the Internet you don't really see theirface or they don't see yours and you don't have to look in their eyes and see they're hurt.

  8. Targets A target is the person(s) who are the ones who are being bullied by someone else.  

  9. Targets Although there is no physical violence, cyber bullying may be more frightening to targets because the bully is unknown. It could be someone the target sees everyday at school, but doesn’t know it. This can lead to feelings of helplessness. With no “real” person to point to, targets can’t file a complaint.

  10. Targets The target’s situation is worsened by the reality that the home, which is usually safe from a “real” bully, is no longer safe because cyber bullying can continue on the computer at home.

  11. Bystanders This important group is made up of those who know that someone is being bullied online. In a March 2008 a study of 2095 students in grades 6, 7, 10 and 11 conducted by the University of Toronto, 28% reported having witnessed cyber bullying.

  12. Bystanders Of this percentage: 9% became involved in the bullying behavior 32% watched but didn’t participate 14% voiced their objection to the person doing the bullying 21% tried to stop the bully 11% logged off the computer 7% tried to befriend the bully, and 7% reported the bully to someone who could help.

  13. Online Methods of Cyber Bullying 1. They may send e-mails or instant messages containing insults or threats directly to a person. There are several ways that young people bully others online. 2. They may also spread hateful comments about a person to others through e-mail, instant messaging or postings on Web sites and online diaries (blogs). 3. They may steal passwords to e-mail or IM (instant messaging) accounts belonging to other kids and send out threatening e-mails or instant messages under a false identity.

  14. Online Methods of Cyber Bullying Increasing numbers of kids are being bullied through text messaging with cell phones. The use of cell phones is challenging the ability of adults to monitor and guide children because, unlike a computer placed in a public area of a home, school or library, cell phones are personal, private, connected—and usually accessible.

  15. Online Methods of Cyber Bullying Kids tend to keep their phones turned on at all times, meaning that bullies can harass victims at school or even in their own bedrooms. Built-in digital cameras in cell phones add a new dimension to the problem. In one case students used a camera cell phone to take a photo of an overweight classmate in the shower after gym. The picture was distributed throughout the school e-mail list within minutes.

  16. Online Methods of Cyber Bullying Adults find that online bullying is difficult to detect in schools and impossible to monitor off school property.

  17. Cyber Bullying and the Law Teens should be aware that some forms of online bullying are considered criminal acts. It is a crime to communicate repeatedly with someone if it causes them to fear for their own safety or the safety of others.

  18. Cyber Bullying and the Law It's also a crime to publish a “defamatory libel”—writing something that is designed to insult a person or is likely to injure a person's reputation by exposing him or her to hatred, contempt or ridicule.

  19. Cyber Bullying and the Law Remember, you do have control over a bullying situation. If you are the bully – stop it. If you are being bullied – tell an adult.

More Related