This site uses cookies to deliver our services and to show you relevant ads and presentations. By clicking on "Accept", you acknowledge that you have read and understand our Cookie Policy , Privacy Policy , and our Terms of Use.

Download our cyber bullying PowerPoint Presentation

Login   OR  Register

Iframe embed code :

Presentation url :


Description :

Available our cyber bullying powerpoint presentation for free download which is uploaded by steve an active user in belonging ppt presentation Computers & Web category.

Tags :

our cyber bullying

Home / Computers & Web / Computers & Web Presentations / our cyber bullying PowerPoint Presentation

Our cyber bullying PowerPoint Presentation

Ppt Presentation Embed Code   Zoom Ppt Presentation

About This Presentation

Description : Available our cyber bullying powerpoint presentation for free download which is uploaded by steve an... Read More

Tags : our cyber bullying

Published on : Aug 07, 2014
Views : 726 | Downloads : 0

Download Now

Share on Social Media


PowerPoint is the world's most popular presentation software which can let you create professional Our cyber bullying powerpoint presentation easily and in no time. This helps you give your presentation on Our cyber bullying in a conference, a school lecture, a business proposal, in a webinar and business and professional representations.

The uploader spent his/her valuable time to create this Our cyber bullying powerpoint presentation slides, to share his/her useful content with the world. This ppt presentation uploaded by worldwideweb in Computers & Web ppt presentation category is available for free download,and can be used according to your industries like finance, marketing, education, health and many more. provides a platform to marketers, presenters and educationists along with being the preferred search engine for professional PowerPoint presentations on the Internet to upload their Our cyber bullying ppt presentation slides to help them BUILD THEIR CROWD!!

Slide 1 - Cyber Security NSHA Kickoff 2013 NSHA Cyber Seecurity 1 8/7/2014
Slide 2 - Cyber Security Program Cyberbullying Internet Security NSHA Cyber Seecurity 2 8/7/2014
Slide 3 - Cyberbullying The repeated use of information technology, including e-mail, instant message, blogs, chat rooms, pagers, cell phones, and gaming systems, to deliberately harass, threaten or intimidate others.” Cyberbullying, unlike physical bullying, does not provide an option for its victims to walk away NSHA Cyber Seecurity 3 8/7/2014 Anonymity
Slide 4 - Cyberbullying Data Over 80 percent of teens use a cell phone regularly, making it the most popular form of technology and a common medium for cyber bullying About half of young people have experienced some form of cyber bullying, and 10 to 20 percent experience it regularly Mean, hurtful comments and spreading rumors are the most common type of cyber bullying Girls are at least as likely as boys to be cyber bullies or their victims Boys are more likely to be threatened by cyber bullies than girls Cyber bullying affects all races Cyber bullying victims are more likely to have low self esteem and to consider suicide (18 cases in 2012) NSHA Cyber Seecurity 4 Cyberbullying Research Center 8/7/2014
Slide 5 - Cyberbullying Tactics The National Crime Prevention Association lists tactics often used by teen cyberbullies. Pretend they are other people online to trick others Spread lies and rumors about victims Trick people into revealing personal information Send or forward mean text messages Post pictures of victims without their consent NSHA Cyber Seecurity 5 1 1 8/7/2014
Slide 6 - Cyberbullying Methods Flaming is a type of online fight. It is an act of sending or posting electronic messages that are deliberately hostile, insulting, mean, angry, vulgar or insulting, to one person or several, either privately or publicly to an online group. Denigration also known as "dissing,” occurs when a person sends or publishes cruel rumors, gossip or untrue statements about a person to intentionally damage the victim's reputation or friendships. Bash boards are online bulletin boards where people post anything they choose. Generally, the postings are mean, hateful and malicious. Impersonation can be particularly harmful and occurs when someone pretends to be or poses as another person. This is usually accomplished by breaking into someone’s account, by stealing a password and perhaps changing it, or by maliciously using that information provided by a friend (one reason to never give a password to anyone but a trusted adult). Once the impersonator has access to the victim's information, considerable damage can occur. By sending out emails supposedly from the victim or by posting material online, the victim’s reputation or friendships can be irreparably harmed. Outing occurs when someone sends or publishes confidential, private, or embarrassing information, online. Private email messages or images meant for private viewing, is then forwarded to others. NSHA Cyber Seecurity 6 8/7/2014
Slide 7 - Cyberbullying Methods cont. Trickery is when a person purposely tricks another person into divulging secrets, private information or embarrassing information, and publishes that information online. Exclusion is an indirect method of online bullying, intentionally excluding someone from an online group or community. Harassment is when the electronic bully repeatedly sends insulting, hurtful, rude, insulting messages. Images and videos are a rapidly growing concern. Due to the prevalence and accessibility of camera cell phones, photographs and videos of unsuspecting victims, taken in bathrooms, locker rooms or other compromising situations, are being distributed electronically. Some images are emailed to other people, while others are published on video sites such as YouTube. Griefing involves chronically causing grief to other members of an online community, or rather, intentionally disrupting the immersion of another player in their game play. NSHA Cyber Seecurity 7 8/7/2014
Slide 8 - Bullying NYS Legislation "Harassment" AND "BULLYING" shall mean: the creation of a hostile environment by conduct or by [verbal] threats, intimidation or abuse interfering with a student's educational performance, opportunities or benefits, or mental, emotional or physical well-being; or conduct, verbal threats, intimidation or abuse that] Reasonably causes or would reasonably be expected to cause a student to fear for his or her physical safety Reasonably causes or would reason ably be expected to cause physical injury or emotional harm to a student; or )occurs off school property and creates or would foresee ably create a risk of substantial disruption within the school environment, where it is foreseeable that the conduct, threats, intimidation or abuse might reach school property NSHA Cyber Seecurity 8 8/7/2014
Slide 9 - Next Steps Create parent committee Adopt Cyber security program Cyber security policy's and procedures Cyberbulling policy Code of conduct Whistle blower policy 8/7/2014 NSHA Cyber Seecurity 9
Slide 10 - Teacher information Review the school’s Computer and Internet AUP with students and don’t let students get away with violations. Supervise students as closely as possible when they are online, especially if your school allows instant messaging, blogs and chats. Help children understand the consequences of cyber bullying; harassment and threats can be become the basis for civil litigation and criminal action. This can include parents being sued if their children violate civil statutes relating to invasion of privacy, defamation and so on.. Instruct children on what to do it they encounter cyber bullying. Emphasize that those who are being cyber bullied are not responsible for what is happening, they are victims. Encourage students to stand up for others who are being bullied. Look for signs that students are being bullied. Continually promote positive use of technology.  NSHA Cyber Seecurity 10 8/7/2014
Slide 11 - NSHA Cyber Seecurity 11 8/7/2014
Slide 12 - NSHA Cyber Seecurity 12 8/7/2014
Slide 13 - Internet Security Threats 8/7/2014 NSHA Cyber Seecurity 13 Criminals Child predators Cyberbullies Inappropriate content Fanatical religious groups
Slide 14 - Types Social networking Facebook Twitter Instagram Google + Chat rooms Message boards Emails Texts 8/7/2014 NSHA Cyber Seecurity 14
Slide 15 - 8/7/2014 NSHA Cyber Seecurity 15 Would you leave your child alone in a playground ???
Slide 16 - Risks Privacy leakage Age-inappropriate content Online grooming Child predators Identity theft Home theft Physical assault Emotional implications Financial loss 8/7/2014 NSHA Cyber Seecurity 16
Slide 17 - 8/7/2014 NSHA Cyber Seecurity 17 Law enforcement officials estimate that more than 50,000 sexual predators are online at any given moment. According to the FBI, Chat rooms offer the advantage of immediate communication around the world and provide the pedophile/predator with an anonymous means of recruiting children into sexually illicit relationships. Only 1/3 of households with Internet access are protecting their children with filtering or blocking software. 70% of children 7 to 18 years old have accidentally encountered online pornography, often through a web search while doing homework. There is a fifty percent chance that if your child is in a chat room designated for under aged children, the stranger he or she is talking to is a sexual predator logged in under a false identity. 86% of girls claimed to be able to conduct online chats without their parents knowing, 57% could read their parents’ e-mail, and 54% could conduct a cyber relationship. Cyber Statistics
Slide 18 - Next Steps Acceptable usage policy Content filtering Educate parents and students 8/7/2014 NSHA Cyber Seecurity 18