Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards
share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Health

Cyber Bullying

QuestionAnswer
What does research suggest? That cyberbullying is the most significant danger young people face online.
What does cyberbullying involve? The use of technology to hurt intimidate others, their reputation or their relationships.
What are some uses of technology that cyberbullying can involve? Social networking websites and applications, text messaging, instant messaging, smart phones, webcams, YouTube, chat rooms and email.
What are some examples of cyberbullying that are not limited to? Sending hurtful messages, creating mean and hurtful web pages or blog sites, posting rude, embarrassing, private and intimate, or demeaning digitally manipulated photographs or videos about someone to a public space.
What does cyberbullying differ from? Traditional bullying in that does not happen in face-to-face interactions.
Where does cyberbullying occur? In a 'public domain', which means that negative text or images can be seen and shared extensively and repeatedly and can be difficult for the victim to dispose of completely or permanently.
When can cyberbullying take place? Both school and at home, at any time of day or night, so for a victimized child there is often no escape.
Oftenly for a victimized child, how come there is "no escape"? Because cyberbullying can take place at school or home, at any time of day or night (24/7).
In cyberbullying, the person bullying does not necessarily have to be_____? The older, stronger, bigger, more popular student (although sometimes these dynamics are still in place), but rather any student could adopt the power of a 'bully' persona.
Rather any student could adopt the power of, what? Of a 'bully 'persona.
When the individual may have fewer inhibitions, what's the result ? Of not having to face the other person or the bully that may even remain anonymous.
Some forms of cyberbullying are considered as...? As criminal acts.
What is harassing communication? To repeatedly communicate with the intent to harass them.
What are uttering threats? Threatening someone with death, bodily harm, destruction of their property, or a harm to a pet is also a crime.
What is indecent communication? To send an indecent communication with intent to alarm or annoy a person.
Under the Criminal Code of Canada, what is it a crime to do? To communicate repeatedly to someone if your communication causes them to fear for their own safety or someone known to them.
What is defamatory libel? A crime to publish writing something about someone that is designed to insult the person or is likely to hurt that person's reputation by exposing him/her to hatred, contempt or ridicule.
To the defamatory libel rule, if the content of the publication is fake, the penalty is_______? Higher.
Created by: cog