cyber-bullying & cyber security unm anderson school of management for jefferson middle...
TRANSCRIPT
Cyber-bullying &
Cyber Security
UNM Anderson School of Management
For Jefferson Middle School’s
8th Grade InfoTech Class
What is Cyber-Bullying?
• Bullying that takes place using electronic technology (Internet, cell phones, social media, etc.)
• Posting negative pictures or messages about others on blogs, websites, social media
• Pretending to be someone else, using fake profiles/pictures• Spreading rumors on social media• Harassing texts, emails, messages• Stealing someone else’s account info
Cyber-bullying statistics
• 42% of children have been bullied while online
• Instant messaging is the most common tool used
• Cyber-bullies are twice as likely to be girls
• 1 in 3 young people have been threatened online
• 1 in 10 report being bullied on Facebook
– This is 800,000 kids! Almost as much as the entire population of the Albuquerque Metro area.
More stats..
• 3 million students miss school each month because of bullying• Bullied kids are twice as likely to commit suicide…
– 1 in 5 bullied teens think about suicide– 1 in 10 attempt it
Each year, about 4,500 teens commit suicide because they are being bullied.
Consequences of cyber-bullying
• Civic actions like defamation, intentional infliction of emotional stress, negligence, premises liability, vicarious liability, and damages ($$)
• Civil actions for free speech, equal protection, and privacy violations
• Student and employee discipline for harassment and violation of codes of conduct (In California, students can now be SUSPENDED or EXPELLED for cyber-bullying)
• Criminal charges and prosecution for hate crimes, impersonation, harassment, cyber-bullying, and violations of the Computer Fraud and Abuse Act (CFAA)
How your class stacks up:
• 58% of your classmates have fought with someone over the internet or phone
• 26% of your classmates have been bullied• 11% of your classmates have been the bully• 58% have witnessed a friend being bullied• 26% have pretended to be someone else online• 74% have sent pictures to someone online or over the
phone• 37% have forwarded photos of someone else online or
over the phone
What can you do?
• Statistically, only 2 in 5 victims will tell their parents (74% of your classmates said they would tell their parents)
• Tell your parents, a friend, a classmate, or a teacher.
• Don’t encourage bullies!
• Remember that just because you are online, you are not invisible! Everything you do can be traced back to you.
• Keep your information safe online. Don’t add people on social media that you don’t know!
• “The Internet is Forever” – Don’t put things online that you wouldn’t want your family, teachers, or future employers to see.
Don’t be a victim!
• One way to protect yourself is to safeguard your info.• Don’t give out your personal info online!• Check your privacy settings…..
Password management
• Consider using a program such as
– Protects you against stolen passwords, scams, and malware
– Encrypted so it is secure– Available on Mac, Windows, iPhone, Android– Accessible from any computer
Cyber Security
“It can’t happen to me”
Malicious Code
VirusesWormsTrojan horses
Malicious Code = Predator
Internet-related activities
TwitterDownloading
files
Take Action
Passwords
Disconnect
Identity Theft
Albert Einstein
“I fear the day that Technology will surpass our human interaction. The world will have a generation of idiots.”
Question 1:
• Which of these would NOT be considered cyber-bullying?
– A. Stealing someone’s phone to see their messages or pictures
– B. Writing a note to your friend in class to gossip about someone
– C. Tweeting something mean about a person in your class
– D. Texting someone and pretending to be someone else
Question 2:
• How many students miss class each month because of bullying?
– A. 500,000– B. 1,000,000– C. 3,000,000– D. 4,000,000
Question 3:
• Name one of these bullying victims:
Question 4:
• Which of the following is NOT a consequence of cyber-bullying?
– A. Jail time or fines– B. Getting sued– C. Getting suspended/expelled from school– D. Paying money to the victim– E. All of the above are consequences
Question 5:
• You check your online email account and see an email with an attachment from someone you don’t know. – Do you open this? Why or why not?
Question 6:
• Give some examples of private information you should never give out.
Question 7:
• What kinds of protection are on your home computer right now?
Question 8:
• Give the name of one of the malicious codes that we went over today.
Question 9:
• My cousin Sally is staying over for the weekend and asks to use my computer. I already have plans to go to the movies. Sally says, “Just give me your password.” – What should I do?
Thank you!!
Thank you guys for letting
us talk with you today.