Cyber Bullying

Cyber Bullying - Cyber Bullying Click to edit Master...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Click to edit Master subtitle style 11/9/09 Cyber Bullying
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
11/9/09
Background image of page 2
11/9/09 Definition of Cyber Bullying l According to the US Department of Health and Human Resources: l Bullying is aggressive behavior that is intentional and involves an imbalance of power or strength. Usually, it is repeated over time. Traditionally, bullying has involved actions such as: hitting or punching (physical bullying), teasing or name-calling (verbal bullying), or intimidation through gestures or social exclusion. In recent years, technology has given children and youth a new means of bullying each other.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
11/9/09 Typical Cyber Bullying Attacks l Sending mean, vulgar, or threatening messages or images l Posting sensitive, private information about another person l Pretending to be someone else in order to make that person look bad l Intentionally excluding someone from an online group
Background image of page 4
11/9/09 Mediums for Cyber Bullying l E-mails, l Instant messaging, l Text or digital imaging messages sent on cell phones, l Web pages, l Web logs (blogs), l Chat rooms or discussion groups
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
11/9/09 Cyber Bullying Prevention l Keep computers in locations, such as a living room or kitchen l Parents should be encouraged to regularly speak with children about their online activities and social life l Children should be encouraged to not respond to the bully l Block the cell phone number or online user l Save photographs or text of harassing messages l Contact the parents of perpetrators l Contact the police, school, ISP, or cell phone provider if the Cyber Bullying involves: Threats of violence Extortion Obscene or harassing phone calls or text messages Harassment, stalking, or hate crimes Child pornography
Background image of page 6
11/9/09 Differences from Bullying l Invades the victim’s home l More anonymous and therefore more potentially hurtful l Provides a more public audience l Invades educational tools l Less physical l Less chance of monitoring by a guardian l Can occur anytime, twenty four hours a day, seven days a week
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
11/9/09 Similarities to Traditional Bullying l Plays off of some kind of perceived flaw on the part of the victim l Emotionally damaging to the victim
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 11/08/2009 for the course CJUS 4000 taught by Professor Dr.holt during the Spring '09 term at UNC Charlotte.

Page1 / 27

Cyber Bullying - Cyber Bullying Click to edit Master...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online