Bullying Assignment

Cyber Bullying

FAQ's:

1.  How can people have their personal information obtained?
 When people put information about them on a website and the information has not had any security settings applied, that information about that person is public and everyone can obtain the information that is displayed for example: age, location etc.
2.   What are different forms of cyber abuse?
 There are roughly 8 forms of cyber bullying that are known the first one being "harassment" this means that people are repeatedly sending malicious messages to someone online, the second one being "cyber stalking" which is continuingly harassing or even just messaging someone abusive content with threats of physical harm or for them to meet up to appear innocent when they are not, third being "impersonation" when the messenger pretends to be someone there aren’t tricking the person who revives the messages, the fourth one being "trickery" when someone gets information out of someone and then shares it with others without that person knowing, the fifth being "outing" when someone spreads false or private information about someone online, the sixth "exclusion" when someone intestinally leaves someone out of a messaging group, the seventh being "denigration" when someone puts some mean messages online to make fun of someone, the eighth being "flaming" online fights or arguments when angry/threatening comments are sent through messages.
3.   What are the risks when responding to emails?
 When responding to emails especially scam or spam emails that can give the email reciever a lot of information about you, when they send an email all they know is your email address but when you send an email they can access more information to you as now they have an email from you they can get your email server which can identify your location this can then lead on to them being able to get information such as age, gender, postcode etc.
4.   What are the risks when online gaming?
 Online gaming can hold many risks as not only can you receive abusive messages but you can receive abusive voice messages, you can be invited to join voice calls which you can be targeted in, some games even work with webcams so people will be able to see what you look like.
5.   What are the risks when sharing files?
 problems with file sharing can include that a person can now possibly access your computer who could potentially copy private files or even damage important files this can happen if firewall is disabled, also viruses and malware could be downloaded to your computer by someone without you knowing potentially damaging your computer, you could even be exposing yourself to legal issues if someone was to scam you by downloading them onto your computer to get you into trouble.
6.   What are the risks when using smart phones?
 A huge problem of using a smartphone is that if it is stolen or lost it is very easily to crack open and access the information in it as the passwords can easily be wiped off using a computer, this opens you up to dangers such as identity theft as credit card and bank account details are often stored on mobile devices also social networks can be interfered with. A less serious problem is that with a smartphone it can higher your chances or possibly getting cyber bullied more as people can message your phone.
7.   What are the potential consequences that may result if an individual is persuaded to send explicit images to others via text message?
 Major problems with sending explicit photos is that once you've sent it you can’t take it back, that person now has that photo saved on their phone the problem with this is that this person can send/share this photo with people that were not intended to see it this can cause the person who sent it to get ridiculed for it, also sending sexual pictures under the age of 18 is illegal meaning to do it is an offense as it is seen as child pornography.
8.   What is the impact on an individual if someone obtains and streams on social media websites inappropriate videos or images of the individual?
 This can really upset that person as this video/image will be private and that person would not like people to know about it, this can seriously embarrass or humiliate someone.
9.   How can hackers use personal information that has been posted onto social media websites?
 The hacker can gather this personal information and then try to impersonate themselves as that person online to trick people, also they can gain information that might allow them to gain access to their account.
10.  How might users be tricked into disclosing personal information when using social media websites?
 Hackers or frauds can trick the person by asking them questions to gain information about that person they can do this very abruptly or quite hidden by making it more casual.
11.  What are the different grooming techniques used by online predators?
 A main thing that the predator will do is try to gain the trust of the child this can be due by using secrecy and telling false information about themselves to try and get the child to think that they know who they are talking to, another technique a predator might use it to compliment the child they are messaging to try and get a positive response from the child, they also tend to make promises to the child so that they are manipulating them. 
12. What are the different types of exploitation techniques that can be used by online predators?
Once the predator has gained the child’s trust they can then try and get the child to give them information about them or send them inappropriate photos they can then use this to exploit the child.

Information for Parents and Schools

Staying safe online is highly important as people can get tricked into things they would never want to do, things like viruses, abusive messages, identity theirs, online predators are out there and these things can happen to anyone, when online precautions have to be taken.

As a teacher you must give the students information on how to stay say and go through all the ways that they could get in danger online, you also need to tell them how they can fix any problems online if they are already suffering from them, they also need to know that they shouldn't ever be persuaded or told to do something online that they don’t want to do, and if they are receiving messages to seek help right away.

As a parent you want to make sure that they are sending safe messages to people that they know, also that they aren't receiving any abusive or dangerous content.

How to identify if someone is being cyber bullied

When someone is being a victim from some form of cyber bullying there mood or attitude can drastically change examples of this are: lack of excitement or happiness in general, sleep deprivation, increased anger and mood swings, the feeling or wanting to be alone, lack of communication from the victim.

Cyber self-harm is when someone basically bullies them self-online instead of someone in person saying abusive stuff to them they write abusive stuff about themselves online, this normally happens when someone is being bullied or cyber bullied as they can go through some psychological trauma making them upset and cyber self-harming.

If there is any sign of malevolent content or signs of abuse in messages it should immediately be reported and actions should be taken.
Do not get mistaken with friendly jokes as sometimes jokes can be seen as quite abusive at first but the person receiving the jokes understands that it is a joke and that there is no harm by it also if there is only a single mid abusive message and then that person apologises or leaves it, it can be left with.

Reporting Cyber Bullying

Reporting a cyber bully should normally be done by telling the persons parents or carers that is being bullied so that they can help them sometimes thought that person would prefer if it was someone else so teachers or councillors can be notified as well, for parents if the content are threatening or example death threats the police can be contacted to help with this situation, as this is by definition putting your child’s life in danger.

Safety Tips

When posting images online, they should be images that are not inappropriate this means the photos should not include any sexual themes, images should be used to show who you are and to show who you are.
When posting messages make sure it is to people you know and people who you are friends with, do not threaten or send abusive messages to anyone that could potentially hurt someone.
When personally information is obtained do not use it for your own will or spread it or false information about it.
Chat rooms should include friends only and no abusive messages should be sent to anyone.
Uploading media should not include any content that you do not want people to see, this is going public remember so make sure that the content is okay for everyone to see as people can now use this and see this.











Comments

Popular posts from this blog

Animation Assignment 1

Production File Week 8

Music Video Directions