Вы находитесь на странице: 1из 2

Atherton J S (2011) Learning and Teaching; Piaget's developmental theory [On-line: UK] retrieved 1 March 2011 from http://www.learningandteaching.info/learning/piaget.

ht m BullyBeware (2009, December 15). The mushroom cloud of cyber bullying: A prediction about what the future holds. Retrieved from http://www.bullybeware.com/blog/43-blog/145-themushroom-cloud-of-cyber-bullying-a- prediction-aboutwhat-the-future-holds.html Campfield, D. C. (2008). Cyber bullying and victimization: Psychosocial characteristics of bullies, victims, and bully/ victims. (Unpublished doctoral dissertation). The University of Montana, Missoula, Montana. Cyberbullying Research Center. (2010). [Bar graph illustrating those that have been cyberbullied based on gender and how February 2010]. Summary of our cyberbullying research from 2004-2010. Retrieved from http:// www.cyberbullying.us/research.php Hitchcock, J. A. (2007). Cyberbullies, online predators, and what to do about them. MultiMedia & Internet@Schools, 14(3). James, S. D. (2010, January 26). Immigrant teen taunted by cyberbullies hangs herself. ABC News. Retrieved from http://abcnews.go.com/Health/cyber-bullyingfactor-suicide-massachusetts-teen-irish-immigrant/story? id=9660938 Rousseau, T. (2007, February 22). Cyberbullying and libraries. [Blog]. Retrieved from http:// librarygarden.blogspot.com/2007/02/cyberbullying -

Reference Section

Delete suspicious email Use technology to block communication with cyberbullies. Tell a parent or adult about any cyberbullying that is occurring. At home, supervise your childs time online. Addressing cyberbullying school-wide is key -- make sure students fully understand the consequences. Be a smart and savvy Web user; never reveal passwords or real last names.

and-libraries.html. (2011, February 15).

Made By: Jennifer Wilson McGarrah Elementary School 2201 Lake Harbin Rd. Morrow, GA 30260

What is cyber bullying? Who is doing it? How is it occurring? Ways to avoid cyber


What is Cyber Bullying?

"Cyberbullying" (also known as Electronic Bullying or Online Social Cruelty) can be defined as a set of interactions between two minors where one or a group of minors is/are tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another individual or group of individuals, such as a child, preteen or teen, using the Internet, interactive and digital technologies, or mobile phones (WiredKids, n.d.). The cyberbully would use those electronic technologies in order to facilitate, deliberate, and repeatedly harass and threaten an individual or group (Trolley, Hansel, & Shields, n.d.). Cyber bullying does not involve adults, instead, when an adult is involved, cyber bullying becomes cyber-harassment or cyber stalking (Anderson & Greenbaum, 2010). Cyber bullying typically starts at about 9 years of age and usually ends after 14 years of age; after 14, it becomes cyber or sexual harassment due to nature of acts and age of those involved (Trolley et al., n.d.).

Common Methods of Cyber Bullying

Text inappropriate or threatening text messages Nuisance/prank calls calling another, persistently, on their phone and saying inappropriate things Publishing and sharing images without your childs permission photos, videos, and/orwebcam footage of an individual or group of individuals that could be circulated via email or text, posted online, or tagged with their name on a public website Happy slapping or Internet Polling cyberbullies use their mobiles to take photos or videos of your child while they verbally or physically abuse them Email and Instant Message (IM) your child might receive nasty or threatening emails or IMs from someone they know or a stranger Chat room and/or social networks saying mean things about others, posting inappropriate messages about a child on sites like Bebo, Facebook or MySpace, or even making up fake profiles Interactive gaming users may block or ignore them