X

Download our cyber bullying PowerPoint Presentation


Login   OR  Register
X

Share page



  Preview

               
Home / Computers & Web / Computers & Web Presentations / our cyber bullying PowerPoint Presentation

our cyber bullying PowerPoint Presentation

worldwideweb By : worldwideweb

On : Aug 07, 2014

In : Computers & Web

Embed :
641
views

0
downloads
Login / Signup - with account for


  • → Make favorite
  • → Flag as inappropriate
  • → Download Presentation
  • → Share Presentation
  • Slide 1 - Cyber Security NSHA Kickoff 2013 NSHA Cyber Seecurity 1 8/7/2014
  • Slide 2 - Cyber Security Program Cyberbullying Internet Security NSHA Cyber Seecurity 2 8/7/2014
  • Slide 3 - Cyberbullying The repeated use of information technology, including e-mail, instant message, blogs, chat rooms, pagers, cell phones, and gaming systems, to deliberately harass, threaten or intimidate others.” Cyberbullying, unlike physical bullying, does not provide an option for its victims to walk away NSHA Cyber Seecurity 3 8/7/2014 Anonymity
  • Slide 4 - Cyberbullying Data Over 80 percent of teens use a cell phone regularly, making it the most popular form of technology and a common medium for cyber bullying About half of young people have experienced some form of cyber bullying, and 10 to 20 percent experience it regularly Mean, hurtful comments and spreading rumors are the most common type of cyber bullying Girls are at least as likely as boys to be cyber bullies or their victims Boys are more likely to be threatened by cyber bullies than girls Cyber bullying affects all races Cyber bullying victims are more likely to have low self esteem and to consider suicide (18 cases in 2012) NSHA Cyber Seecurity 4 Cyberbullying Research Center 8/7/2014
  • Slide 5 - Cyberbullying Tactics The National Crime Prevention Association lists tactics often used by teen cyberbullies. Pretend they are other people online to trick others Spread lies and rumors about victims Trick people into revealing personal information Send or forward mean text messages Post pictures of victims without their consent NSHA Cyber Seecurity 5 http://www.ncpc.org/cyberbullying 1 1 8/7/2014
  • Slide 6 - Cyberbullying Methods Flaming is a type of online fight. It is an act of sending or posting electronic messages that are deliberately hostile, insulting, mean, angry, vulgar or insulting, to one person or several, either privately or publicly to an online group. Denigration also known as "dissing,” occurs when a person sends or publishes cruel rumors, gossip or untrue statements about a person to intentionally damage the victim's reputation or friendships. Bash boards are online bulletin boards where people post anything they choose. Generally, the postings are mean, hateful and malicious. Impersonation can be particularly harmful and occurs when someone pretends to be or poses as another person. This is usually accomplished by breaking into someone’s account, by stealing a password and perhaps changing it, or by maliciously using that information provided by a friend (one reason to never give a password to anyone but a trusted adult). Once the impersonator has access to the victim's information, considerable damage can occur. By sending out emails supposedly from the victim or by posting material online, the victim’s reputation or friendships can be irreparably harmed. Outing occurs when someone sends or publishes confidential, private, or embarrassing information, online. Private email messages or images meant for private viewing, is then forwarded to others. NSHA Cyber Seecurity 6 8/7/2014
  • Slide 7 - Cyberbullying Methods cont. Trickery is when a person purposely tricks another person into divulging secrets, private information or embarrassing information, and publishes that information online. Exclusion is an indirect method of online bullying, intentionally excluding someone from an online group or community. Harassment is when the electronic bully repeatedly sends insulting, hurtful, rude, insulting messages. Images and videos are a rapidly growing concern. Due to the prevalence and accessibility of camera cell phones, photographs and videos of unsuspecting victims, taken in bathrooms, locker rooms or other compromising situations, are being distributed electronically. Some images are emailed to other people, while others are published on video sites such as YouTube. Griefing involves chronically causing grief to other members of an online community, or rather, intentionally disrupting the immersion of another player in their game play. NSHA Cyber Seecurity 7 http://criminaljustice.state.ny.us/missing/i_safety/cyberbullying.htm 8/7/2014
  • Slide 8 - Bullying NYS Legislation "Harassment" AND "BULLYING" shall mean: the creation of a hostile environment by conduct or by [verbal] threats, intimidation or abuse interfering with a student's educational performance, opportunities or benefits, or mental, emotional or physical well-being; or conduct, verbal threats, intimidation or abuse that] Reasonably causes or would reasonably be expected to cause a student to fear for his or her physical safety Reasonably causes or would reason ably be expected to cause physical injury or emotional harm to a student; or )occurs off school property and creates or would foresee ably create a risk of substantial disruption within the school environment, where it is foreseeable that the conduct, threats, intimidation or abuse might reach school property NSHA Cyber Seecurity 8 8/7/2014
  • Slide 9 - Next Steps Create parent committee Adopt Cyber security program Cyber security policy's and procedures Cyberbulling policy Code of conduct Whistle blower policy 8/7/2014 NSHA Cyber Seecurity 9
  • Slide 10 - Teacher information Review the school’s Computer and Internet AUP with students and don’t let students get away with violations. Supervise students as closely as possible when they are online, especially if your school allows instant messaging, blogs and chats. Help children understand the consequences of cyber bullying; harassment and threats can be become the basis for civil litigation and criminal action. This can include parents being sued if their children violate civil statutes relating to invasion of privacy, defamation and so on.. Instruct children on what to do it they encounter cyber bullying. Emphasize that those who are being cyber bullied are not responsible for what is happening, they are victims. Encourage students to stand up for others who are being bullied. Look for signs that students are being bullied. Continually promote positive use of technology.  NSHA Cyber Seecurity 10 http://criminaljustice.state.ny.us/missing/i_safety/cyberbullying.htm 8/7/2014
  • Slide 11 - NSHA Cyber Seecurity 11 8/7/2014
  • Slide 12 - NSHA Cyber Seecurity 12 8/7/2014
  • Slide 13 - Internet Security Threats 8/7/2014 NSHA Cyber Seecurity 13 Criminals Child predators Cyberbullies Inappropriate content Fanatical religious groups
  • Slide 14 - Types Social networking Facebook Twitter Instagram Google + Chat rooms Message boards Emails Texts 8/7/2014 NSHA Cyber Seecurity 14
  • Slide 15 - 8/7/2014 NSHA Cyber Seecurity 15 Would you leave your child alone in a playground ???
  • Slide 16 - Risks Privacy leakage Age-inappropriate content Online grooming Child predators Identity theft Home theft Physical assault Emotional implications Financial loss 8/7/2014 NSHA Cyber Seecurity 16
  • Slide 17 - 8/7/2014 NSHA Cyber Seecurity 17 Law enforcement officials estimate that more than 50,000 sexual predators are online at any given moment. According to the FBI, Chat rooms offer the advantage of immediate communication around the world and provide the pedophile/predator with an anonymous means of recruiting children into sexually illicit relationships. Only 1/3 of households with Internet access are protecting their children with filtering or blocking software. 70% of children 7 to 18 years old have accidentally encountered online pornography, often through a web search while doing homework. There is a fifty percent chance that if your child is in a chat room designated for under aged children, the stranger he or she is talking to is a sexual predator logged in under a false identity. 86% of girls claimed to be able to conduct online chats without their parents knowing, 57% could read their parents’ e-mail, and 54% could conduct a cyber relationship. Cyber Statistics
  • Slide 18 - Next Steps Acceptable usage policy Content filtering Educate parents and students 8/7/2014 NSHA Cyber Seecurity 18
Parents Free PowerPoint Template

Parents

Views : 409

Herbal Pills Free PowerPoint Template

Herbal Pills

Views : 573

Light Abstract Free PowerPoint Template

Light Abstract

Views : 835

Injecting Free PowerPoint Template

Injecting

Views : 428

Blue Abstract Free PowerPoint Template

Blue Abstract

Views : 743

Agriculture Free PowerPoint Template

Agriculture

Views : 889

Rose Free PowerPoint Template

Rose

Views : 646

Room Interior Free PowerPoint Template

Room Interior

Views : 452

Interior Free PowerPoint Template

Interior

Views : 519

Ice Hockey Free PowerPoint Template

Ice Hockey

Views : 1189

Bales Free PowerPoint Template

Bales

Views : 480

Doctor Free PowerPoint Template

Doctor

Views : 423

Koli Bacteria Free PowerPoint Template

Koli Bacteria

Views : 1324

Maple Leaf Free PowerPoint Template

Maple Leaf

Views : 472

Happy Birthday Free PowerPoint Template

Happy Birthday

Views : 581

Male Female Free PowerPoint Template

Male Female

Views : 557

Gerbera Free PowerPoint Template

Gerbera

Views : 322

Barbell Free PowerPoint Template

Barbell

Views : 542

Domino Free PowerPoint Template

Domino

Views : 564

Law Rules Free PowerPoint Template

Law Rules

Views : 1824

Description : Available our cyber bullying powerpoint presentation for free download which is uploaded by steve an active user in belonging ppt presentation Computers & Web category.

Tags : our cyber bullying

Shortcode : Get Shareable link