Aïda Michlowski, PhD, JD Terror by Technology. Inappropriate content Inappropriate contact...

9
Aïda Michlowski, PhD, JD Terror by Technology

Transcript of Aïda Michlowski, PhD, JD Terror by Technology. Inappropriate content Inappropriate contact...

Page 1: Aïda Michlowski, PhD, JD Terror by Technology. Inappropriate content Inappropriate contact Inappropriate conduct What is cyberbullying?

Aïda Michlowski, PhD, JD

Terror by Technology

Page 2: Aïda Michlowski, PhD, JD Terror by Technology. Inappropriate content Inappropriate contact Inappropriate conduct What is cyberbullying?

Inappropriate

contentInappropriate contact

Inappropriate

conduct

What is cyberbullying?

Page 3: Aïda Michlowski, PhD, JD Terror by Technology. Inappropriate content Inappropriate contact Inappropriate conduct What is cyberbullying?

How does cyberbullying differ from physical (F2F) bullying?

Page 4: Aïda Michlowski, PhD, JD Terror by Technology. Inappropriate content Inappropriate contact Inappropriate conduct What is cyberbullying?

What are the methods of cyberbullying?

Stealing passwords

Malicious code

Internet polling

Interactive gaming

Sending porn

Mass emails

Impersonating

Text attack Blogging

Textual harassment

Page 6: Aïda Michlowski, PhD, JD Terror by Technology. Inappropriate content Inappropriate contact Inappropriate conduct What is cyberbullying?

Who are the perpetrators & the victims?

Megan Meier

Bullycide

160, 000

Anthony Stand

Top 6 Ways to Kill Piper

Page 7: Aïda Michlowski, PhD, JD Terror by Technology. Inappropriate content Inappropriate contact Inappropriate conduct What is cyberbullying?

What are the warning signs?

Stop,Block,Tell!

Keep safe,Keep away,Keep

telling!

Page 8: Aïda Michlowski, PhD, JD Terror by Technology. Inappropriate content Inappropriate contact Inappropriate conduct What is cyberbullying?

How do we deal with cyberbullying?ID the Creep

Take 5Keep current,

Keep checking,Keep communicating