SlideShare a Scribd company logo
 
Integrate Technology Define Problem Types of Bullying Increase in Cyber-bullying What can be done? Conclusion
There is a new, stronger emphasis on Technology in the classroom in the U.S. Technology in the classroom provide students with an endless variety of learning tools Increased use of technology in the classroom is vital to the future success of our students
Increased technology in the classroom had lead to new opportunities for bullying. Half of public school principals (49%) report that bullying, name-calling, or harassment of students is a serious problem at their school.  ( www.parentfurther.com ) 64% of student’s bullied, do not report it.  ( www.nces.ed.gov ) Hampers educator’s ability to recognize and react
"A person is bullied when he or she is exposed, repeatedly and over time, to negative actions on the part of one or more other persons, and he or she has difficulty defending himself or herself.”  (www.olweus.org) This definition includes three important components:  1.   Bullying is aggressive behavior that involves unwanted, negative actions. 2. Bullying involves a pattern of behavior repeated over time. 3. Bullying involves an imbalance of power or strength.
Physical Verbal  Indirect Social Alienation Intimidation Cyber
is done by sending messages, pictures, or information using electronic media, computers (email & instant messages), or cell phones (text messaging & voicemail).  (www.thinkquest.org) As the use of social networking sites and cell phones grow; so do attacks
Nearly  35%  of kids have been threatened online and almost one in five have had it happen more than once. Being  ignored  and  disrespectful  were the most common forms of cyber bullying.   About  75%  have visited a Web site bashing another student  About  21%   of kids have received mean or threatening e-mails.
The primary cyber bullying location where victimizing occurs, at  56%,   is in chat Rooms.   About  58%  of kids admit someone has said mean or hurtful things to them online. More than four out of ten say it has happened more than once. 
Although little research has been conducted on Cyber Bullying; studies have found: 19%  of regular Internet users between the ages of 10 and 17 reported being involved in online aggression. 15%  had been aggressors 7%  had been targets  3%  were both aggressors and targets  Source:  www.cyberbullyingprotection.net
In society the need teens to be accepted is greater then in any other time.  Social Networking site like Facebook, MySpace and Twitter allow bullying to take place around the clock.  NOT JUST DURING SCHOOL HOURS Teens no longer have a sanctuary from bullying and discrimination. The most common result: Depression, Violence, Criminal Intent, and  Suicide .
In 2010 alone, four cases regarding teen suicide as a result of cyber bullying have been brought to national attention. Phoebe Prince (15 on left) of Massachusetts and Asher Brown (13 on right) of Texas both committed suicide as a result of bullying in 2010
Educate students on local cyber-bullying laws Implore student to report it. Written proof will help incriminate the aggressor Only  30%  of all cyber bullying victims report it.  Discuss with parents the different sites that will allow them to monitor their child’s online habits.  i.e.  www.parental spy.com, www.parental-software.com
SOURCE: U.S. Department of Justice, Bureau of Justice Statistics, School Crime Supplement (SCS) to the National Crime Victimization Survey, 2007.
With technology becoming more and more present in our school, so does the ability to bully.  No longer are bullies stopping at 3 pm until the next day. Instead, children are bullied year round on social networking sites like Facbook, MySpace, and Twitter.  More research has to be done.

More Related Content

PPT
Integrating technology1
PPTX
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
PPTX
Cyberbullying in the Middle Years
PPTX
Cyber Bullying
PPT
Teens, Online Stranger Contact & Cyberbullying
PPTX
Tie digital citizenship project cyberbullying
PPTX
Advanced Law presentation
PPTX
Integrating technology1
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
Cyberbullying in the Middle Years
Cyber Bullying
Teens, Online Stranger Contact & Cyberbullying
Tie digital citizenship project cyberbullying
Advanced Law presentation

What's hot (19)

PPTX
lis 3201 Final presentation
PPTX
The new landscape of facts and trust
PPT
Ethical and safe internet use
PPTX
Cyberbullying and the Law
PDF
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
PPTX
Networked Privacy in the Age of Surveillance, Sousveillance, Coveillance
PPT
Cyberbullying
DOCX
Inormation Literacy Paper
PPTX
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
DOCX
Abney & Associates Technology Updates: Sheriff’s forum to open eyes of parent...
PPTX
Nico santi y tomy
PPT
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
PPTX
Cyberbullying
PPT
Transportation and privacy in the mobile age
PPT
Digital Politics: Pew Research findings on technology and campaign 2012
PPTX
Marsali Hancock - iKeepSafe Presentation
PPTX
Mass media and communication
PDF
8th Milestones meeting: Cyber violence roundtable
PPT
Internet harassment and bullying behaviors: Implications for youth development
lis 3201 Final presentation
The new landscape of facts and trust
Ethical and safe internet use
Cyberbullying and the Law
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Networked Privacy in the Age of Surveillance, Sousveillance, Coveillance
Cyberbullying
Inormation Literacy Paper
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Abney & Associates Technology Updates: Sheriff’s forum to open eyes of parent...
Nico santi y tomy
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
Cyberbullying
Transportation and privacy in the mobile age
Digital Politics: Pew Research findings on technology and campaign 2012
Marsali Hancock - iKeepSafe Presentation
Mass media and communication
8th Milestones meeting: Cyber violence roundtable
Internet harassment and bullying behaviors: Implications for youth development
Ad

Viewers also liked (9)

PDF
Leather Dog Collar
PDF
Rope toys
XLS
Pet toys on stock
PDF
Nylon pet collar
PPT
Group 1 Client Presentation
PDF
Nylon leash
PDF
Pu dog leash
PDF
Resumen final compet
PPT
2040ppt
Leather Dog Collar
Rope toys
Pet toys on stock
Nylon pet collar
Group 1 Client Presentation
Nylon leash
Pu dog leash
Resumen final compet
2040ppt
Ad

Similar to Integrating technology1 (20)

PPTX
Digital health and safety
DOCX
Glass RM Spring 2016 Final
PDF
Essays On Cyber Bullying
DOCX
Running head FINAL PAPER .docx
PPT
Cyberbullying
DOCX
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
PPT
Cyberbullying 2010: What the Research Tells Us
PPTX
Cyberbullying presentation
PPT
Internetsafety
PPT
Internetsafety
PPTX
Thurston
PPT
Cyberbullying: What the research is telling us…
PPT
Week 5
DOCX
BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16
DOCX
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
PPTX
Final-Defense-PPT-HUMSS-SECTION B-Grade12.pptx
PPTX
Powerpoint SB
PPTX
Module 7 Assignment 2 Pp On Review Paper
PPTX
Presentation on the cyber bullying in digital threat
PPT
Identifying and dealing with online bullying
Digital health and safety
Glass RM Spring 2016 Final
Essays On Cyber Bullying
Running head FINAL PAPER .docx
Cyberbullying
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying 2010: What the Research Tells Us
Cyberbullying presentation
Internetsafety
Internetsafety
Thurston
Cyberbullying: What the research is telling us…
Week 5
BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Final-Defense-PPT-HUMSS-SECTION B-Grade12.pptx
Powerpoint SB
Module 7 Assignment 2 Pp On Review Paper
Presentation on the cyber bullying in digital threat
Identifying and dealing with online bullying

Recently uploaded (20)

PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
Computing-Curriculum for Schools in Ghana
PDF
advance database management system book.pdf
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
HVAC Specification 2024 according to central public works department
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PPTX
Virtual and Augmented Reality in Current Scenario
PPTX
Computer Architecture Input Output Memory.pptx
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
IGGE1 Understanding the Self1234567891011
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
Hazard Identification & Risk Assessment .pdf
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Practical Manual AGRO-233 Principles and Practices of Natural Farming
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Unit 4 Computer Architecture Multicore Processor.pptx
Computing-Curriculum for Schools in Ghana
advance database management system book.pdf
Introduction to pro and eukaryotes and differences.pptx
HVAC Specification 2024 according to central public works department
Paper A Mock Exam 9_ Attempt review.pdf.
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
Virtual and Augmented Reality in Current Scenario
Computer Architecture Input Output Memory.pptx
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
TNA_Presentation-1-Final(SAVE)) (1).pptx
LDMMIA Reiki Yoga Finals Review Spring Summer
IGGE1 Understanding the Self1234567891011
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Hazard Identification & Risk Assessment .pdf
AI-driven educational solutions for real-life interventions in the Philippine...
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc

Integrating technology1

  • 1.  
  • 2. Integrate Technology Define Problem Types of Bullying Increase in Cyber-bullying What can be done? Conclusion
  • 3. There is a new, stronger emphasis on Technology in the classroom in the U.S. Technology in the classroom provide students with an endless variety of learning tools Increased use of technology in the classroom is vital to the future success of our students
  • 4. Increased technology in the classroom had lead to new opportunities for bullying. Half of public school principals (49%) report that bullying, name-calling, or harassment of students is a serious problem at their school. ( www.parentfurther.com ) 64% of student’s bullied, do not report it. ( www.nces.ed.gov ) Hampers educator’s ability to recognize and react
  • 5. "A person is bullied when he or she is exposed, repeatedly and over time, to negative actions on the part of one or more other persons, and he or she has difficulty defending himself or herself.” (www.olweus.org) This definition includes three important components: 1. Bullying is aggressive behavior that involves unwanted, negative actions. 2. Bullying involves a pattern of behavior repeated over time. 3. Bullying involves an imbalance of power or strength.
  • 6. Physical Verbal Indirect Social Alienation Intimidation Cyber
  • 7. is done by sending messages, pictures, or information using electronic media, computers (email & instant messages), or cell phones (text messaging & voicemail). (www.thinkquest.org) As the use of social networking sites and cell phones grow; so do attacks
  • 8. Nearly 35% of kids have been threatened online and almost one in five have had it happen more than once. Being ignored and disrespectful were the most common forms of cyber bullying.  About 75% have visited a Web site bashing another student About 21% of kids have received mean or threatening e-mails.
  • 9. The primary cyber bullying location where victimizing occurs, at 56%, is in chat Rooms.  About 58% of kids admit someone has said mean or hurtful things to them online. More than four out of ten say it has happened more than once. 
  • 10. Although little research has been conducted on Cyber Bullying; studies have found: 19% of regular Internet users between the ages of 10 and 17 reported being involved in online aggression. 15% had been aggressors 7% had been targets 3% were both aggressors and targets Source: www.cyberbullyingprotection.net
  • 11. In society the need teens to be accepted is greater then in any other time. Social Networking site like Facebook, MySpace and Twitter allow bullying to take place around the clock. NOT JUST DURING SCHOOL HOURS Teens no longer have a sanctuary from bullying and discrimination. The most common result: Depression, Violence, Criminal Intent, and Suicide .
  • 12. In 2010 alone, four cases regarding teen suicide as a result of cyber bullying have been brought to national attention. Phoebe Prince (15 on left) of Massachusetts and Asher Brown (13 on right) of Texas both committed suicide as a result of bullying in 2010
  • 13. Educate students on local cyber-bullying laws Implore student to report it. Written proof will help incriminate the aggressor Only 30% of all cyber bullying victims report it. Discuss with parents the different sites that will allow them to monitor their child’s online habits. i.e. www.parental spy.com, www.parental-software.com
  • 14. SOURCE: U.S. Department of Justice, Bureau of Justice Statistics, School Crime Supplement (SCS) to the National Crime Victimization Survey, 2007.
  • 15. With technology becoming more and more present in our school, so does the ability to bully. No longer are bullies stopping at 3 pm until the next day. Instead, children are bullied year round on social networking sites like Facbook, MySpace, and Twitter. More research has to be done.