c yberbullying expanding your horizons asu - stem conference february 23, 2013 mark crouch, ed. d
DESCRIPTION
T RADITIONALLY - A bully is primarily a person responsible for bullyingbullying Bullying is a form of abuse. It involves repeated acts over time attempting to create or enforce one person's (or group's) power over another person (or group).abuseTRANSCRIPT
![Page 1: C YBERBULLYING Expanding Your Horizons ASU - STEM Conference February 23, 2013 Mark Crouch, Ed. D](https://reader036.vdocument.in/reader036/viewer/2022062600/5a4d1b1e7f8b9ab059994865/html5/thumbnails/1.jpg)
CYBERBULLYING
Expanding Your HorizonsASU - STEM ConferenceFebruary 23, 2013Mark Crouch, Ed. D.
![Page 3: C YBERBULLYING Expanding Your Horizons ASU - STEM Conference February 23, 2013 Mark Crouch, Ed. D](https://reader036.vdocument.in/reader036/viewer/2022062600/5a4d1b1e7f8b9ab059994865/html5/thumbnails/3.jpg)
TRADITIONALLY -A bully is primarily a person responsible
for bullying
Bullying is a form of abuse. It involves repeated acts over time attempting to create or enforce one person's (or group's) power over another person (or group).
![Page 4: C YBERBULLYING Expanding Your Horizons ASU - STEM Conference February 23, 2013 Mark Crouch, Ed. D](https://reader036.vdocument.in/reader036/viewer/2022062600/5a4d1b1e7f8b9ab059994865/html5/thumbnails/4.jpg)
TODAY -Cyber-bullying is "the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm others". - Wikipedia
![Page 5: C YBERBULLYING Expanding Your Horizons ASU - STEM Conference February 23, 2013 Mark Crouch, Ed. D](https://reader036.vdocument.in/reader036/viewer/2022062600/5a4d1b1e7f8b9ab059994865/html5/thumbnails/5.jpg)
WHAT THAT MEANS IS:Bullies in the schoolyard now
have a new place to wield their punches – cyberspace.
![Page 6: C YBERBULLYING Expanding Your Horizons ASU - STEM Conference February 23, 2013 Mark Crouch, Ed. D](https://reader036.vdocument.in/reader036/viewer/2022062600/5a4d1b1e7f8b9ab059994865/html5/thumbnails/6.jpg)
WHAT THAT MEANS IS:
“Cyberbullying,” as it’s now called, is like regular bullying except it’s done online through sites like Facebook and MySpace and the use of cell phones
![Page 7: C YBERBULLYING Expanding Your Horizons ASU - STEM Conference February 23, 2013 Mark Crouch, Ed. D](https://reader036.vdocument.in/reader036/viewer/2022062600/5a4d1b1e7f8b9ab059994865/html5/thumbnails/7.jpg)
![Page 8: C YBERBULLYING Expanding Your Horizons ASU - STEM Conference February 23, 2013 Mark Crouch, Ed. D](https://reader036.vdocument.in/reader036/viewer/2022062600/5a4d1b1e7f8b9ab059994865/html5/thumbnails/8.jpg)
BROKEN FRIENDSHIPWhat are some of the things that we use
passwords for?
1. E-mail2. Instant Messenger3. Web sites4. Bank accounts5. ????
![Page 9: C YBERBULLYING Expanding Your Horizons ASU - STEM Conference February 23, 2013 Mark Crouch, Ed. D](https://reader036.vdocument.in/reader036/viewer/2022062600/5a4d1b1e7f8b9ab059994865/html5/thumbnails/9.jpg)
BROKEN FRIENDSHIPWhy do you think the girl in the story
gave her password to her best friend?
Was it a good reason?
![Page 10: C YBERBULLYING Expanding Your Horizons ASU - STEM Conference February 23, 2013 Mark Crouch, Ed. D](https://reader036.vdocument.in/reader036/viewer/2022062600/5a4d1b1e7f8b9ab059994865/html5/thumbnails/10.jpg)
BROKEN FRIENDSHIPWhat types of things can happen to her
now that her password is out?
What should the girl do right away?
![Page 11: C YBERBULLYING Expanding Your Horizons ASU - STEM Conference February 23, 2013 Mark Crouch, Ed. D](https://reader036.vdocument.in/reader036/viewer/2022062600/5a4d1b1e7f8b9ab059994865/html5/thumbnails/11.jpg)
PASSWORDSDo not use common words or names
Do not use your birthday
Do not use your pet’s name
Do not use your SSN
![Page 12: C YBERBULLYING Expanding Your Horizons ASU - STEM Conference February 23, 2013 Mark Crouch, Ed. D](https://reader036.vdocument.in/reader036/viewer/2022062600/5a4d1b1e7f8b9ab059994865/html5/thumbnails/12.jpg)
PASSWORDSDo use random passwords
Do use letters AND numbers
Do mix lower case and upper case
Do use symbols such as $ @ #
![Page 13: C YBERBULLYING Expanding Your Horizons ASU - STEM Conference February 23, 2013 Mark Crouch, Ed. D](https://reader036.vdocument.in/reader036/viewer/2022062600/5a4d1b1e7f8b9ab059994865/html5/thumbnails/13.jpg)
PASSWORD EXAMPLE
m h a l l i f w w a smary had a little lamb its fleece was white as snow
![Page 14: C YBERBULLYING Expanding Your Horizons ASU - STEM Conference February 23, 2013 Mark Crouch, Ed. D](https://reader036.vdocument.in/reader036/viewer/2022062600/5a4d1b1e7f8b9ab059994865/html5/thumbnails/14.jpg)
BETTER PASSWORD EXAMPLE
M h a L l i f w W a s
EVEN BETTER -
M h a L 1 i f w W a $
![Page 15: C YBERBULLYING Expanding Your Horizons ASU - STEM Conference February 23, 2013 Mark Crouch, Ed. D](https://reader036.vdocument.in/reader036/viewer/2022062600/5a4d1b1e7f8b9ab059994865/html5/thumbnails/15.jpg)
TEENAGE GIRLS ARE WORSE THAN BOYS ABOUT CYBER-
BULLYING
![Page 16: C YBERBULLYING Expanding Your Horizons ASU - STEM Conference February 23, 2013 Mark Crouch, Ed. D](https://reader036.vdocument.in/reader036/viewer/2022062600/5a4d1b1e7f8b9ab059994865/html5/thumbnails/16.jpg)
YOU CAN’T TAKE IT BACK
![Page 17: C YBERBULLYING Expanding Your Horizons ASU - STEM Conference February 23, 2013 Mark Crouch, Ed. D](https://reader036.vdocument.in/reader036/viewer/2022062600/5a4d1b1e7f8b9ab059994865/html5/thumbnails/17.jpg)
YOU CAN’T TAKE IT BACKHow do you think the victims felt?
Have you ever been ridiculed before? How did it feel?
![Page 18: C YBERBULLYING Expanding Your Horizons ASU - STEM Conference February 23, 2013 Mark Crouch, Ed. D](https://reader036.vdocument.in/reader036/viewer/2022062600/5a4d1b1e7f8b9ab059994865/html5/thumbnails/18.jpg)
YOU CAN’T TAKE IT BACKWhy did the boy rate the girls?
Do you think that girls ever rate boys like this?
![Page 19: C YBERBULLYING Expanding Your Horizons ASU - STEM Conference February 23, 2013 Mark Crouch, Ed. D](https://reader036.vdocument.in/reader036/viewer/2022062600/5a4d1b1e7f8b9ab059994865/html5/thumbnails/19.jpg)
YOU CAN’T TAKE IT BACKWhat would you do if you heard
that a friend was going to rate some other students on the Internet?
![Page 20: C YBERBULLYING Expanding Your Horizons ASU - STEM Conference February 23, 2013 Mark Crouch, Ed. D](https://reader036.vdocument.in/reader036/viewer/2022062600/5a4d1b1e7f8b9ab059994865/html5/thumbnails/20.jpg)
WHAT CAN YOU DO?Never post or share your (or your
friends’) personal information online.
Examples: full name address telephone number school name parents’ names credit card number Social Security number
![Page 21: C YBERBULLYING Expanding Your Horizons ASU - STEM Conference February 23, 2013 Mark Crouch, Ed. D](https://reader036.vdocument.in/reader036/viewer/2022062600/5a4d1b1e7f8b9ab059994865/html5/thumbnails/21.jpg)
WHAT CAN YOU DO?Never share your Internet passwords with anyone (except your parents).
![Page 22: C YBERBULLYING Expanding Your Horizons ASU - STEM Conference February 23, 2013 Mark Crouch, Ed. D](https://reader036.vdocument.in/reader036/viewer/2022062600/5a4d1b1e7f8b9ab059994865/html5/thumbnails/22.jpg)
WHAT CAN YOU DO?Never meet anyone face-to-face whom you only know online.
![Page 23: C YBERBULLYING Expanding Your Horizons ASU - STEM Conference February 23, 2013 Mark Crouch, Ed. D](https://reader036.vdocument.in/reader036/viewer/2022062600/5a4d1b1e7f8b9ab059994865/html5/thumbnails/23.jpg)
WHAT CAN YOU DO?Talk to your parents about what you do online.
![Page 25: C YBERBULLYING Expanding Your Horizons ASU - STEM Conference February 23, 2013 Mark Crouch, Ed. D](https://reader036.vdocument.in/reader036/viewer/2022062600/5a4d1b1e7f8b9ab059994865/html5/thumbnails/25.jpg)
THANK YOU