ShmoopTube
Where Monty Python meets your 10th grade teacher.
Search Thousands of Shmoop Videos
Playlist Cyberbullying 7 videos
In our first video on cyberbullying get a general overlook of what this series of videos will offer.
In this video from our cyberbullying course, learn all about the evolution of cyberbullies from the caveman era to now.
In this video on cyberbullying, learn all about what cyberbullying is and isn't.
Cyberbullying: Vocabulary Terms 1112 Views
Share It!
Description:
In this video, learn a list of vocabulary terms used when discussing cyberbullying.
Transcript
- 00:00
Thank you We sneak in cyberbullying vocab allah shmoop all
- 00:08
right Well if someone's insulting you online and sure would
- 00:10
be nice to know what they're saying it's probably a
- 00:13
good idea to be familiar with the language of the
- 00:16
internet Not just your only angie's your ella wells but
Full Transcript
- 00:19
a handful of important terms that will help you understand
- 00:23
how a cyber bully might track you down and what
- 00:26
you can do to hopefully keep him her or it
- 00:29
out of your life All right so let's get started
- 00:33
I p address a computer's individualized address its coordinates in
- 00:39
cyberspace Yeah like this oblique in stock you to your
- 00:43
home i p address just like they'd stock you to
- 00:45
your geographic address About the only thing they can't do
- 00:49
is tp your computer monitor All right who is our
- 00:52
well there's A website that can be used to track
- 00:54
an individual via domain name personal websites or i p
- 00:59
addresses like these And now you know what is who
- 01:03
is Yeah That's what It looks like all right Exclusion
- 01:07
It's a method used by cyber bullies Toe blatantly cut
- 01:10
someone out of a group and make them feel unliked
- 01:13
Or discarded by their friends Don't get rudolph started on
- 01:17
that subject outing posting personal private information communication or images
- 01:24
to be seen by a wide audience Causing shame on
- 01:27
the part of the victim is a real bummer It's
- 01:30
called personal private information people for a reason All right
- 01:34
next fishing tricking someone into giving out private information by
- 01:39
pretending to be someone else like a doctor claiming to
- 01:43
need your medical history or a company asking for your
- 01:46
social security number or a program requesting your personal passwords
- 01:51
Hint if you get an email that's riddled with typos
- 01:54
it probably comes from someone who's fishing denigration look bad
- 01:59
five dollar word the posting of any material intended to
- 02:03
damage someone's reputation which is why we recommend having an
- 02:07
awful reputation and then that way no one can ruin
- 02:09
it Okay cyber stalking a form of cyber bullying that
- 02:13
involves taking action online with the intent of seriously injuring
- 02:18
a person financially emotionally or socially We're talking some real
- 02:23
sickos here people same people who friday ants with a
- 02:26
magnifying glass and kicked puppies when they were little there's
- 02:29
A whole lot of crazy in the world You gotta
- 02:31
avoid it alright creeping following someone online from room to
- 02:36
room or site to site basically exhibiting the kind of
- 02:39
behavior that would inspire someone to get a restraining order
- 02:42
against you in the real world Doctors stuff next flaming
- 02:47
using vulgar or offensive suggestions itjust a rile someone up
- 02:52
and online these comments don't come with a complimentary censored
- 02:55
bar unfortunately bash board who any place you can go
- 03:00
online to chat doesn't actually have to mean that anyone
- 03:03
is bashing anyone else but the possibility always exists that
- 03:06
a bashing sesh could break out We sincerely hope you
- 03:09
never have a clash with a bash trash basher if
- 03:12
for no other reason then it's really hard to say
- 03:15
virtual world the world online that bears some resemblance to
- 03:19
the real world in that there are other people conversing
- 03:21
with you but in which you can easily be deceived
- 03:24
by people hiding behind fake personas Welcome to the matrix
- 03:28
yeah like that alright am sms enhanced messaging service and
- 03:34
multimedia messaging service text messages with the options for pics
- 03:39
or sounds m s or animation video and then mess
- 03:43
Yeah believe it or not text messaging didn't always include
- 03:45
the option for images we actually had to spell it
- 03:48
out instead of just well using the poop emoji it's
- 03:51
kind of gross all right a vup acceptable internet use
- 03:56
policies Well these air policies set in place to help
- 03:58
weed out cyber bullies or to discourage them from torturing
- 04:01
others because whenever cyber bullies have to read a usage
- 04:05
policy well they usually wind up falling asleep and then
- 04:07
they can't bother anyone Copa children's online privacy protection act
- 04:13
it's a federal law that helps protect any child under
- 04:16
the age of thirteen whose information might be out there
- 04:18
somewhere in cyberspace So our advice is to try to
- 04:22
avoid turning thirteen for as long as possible And so
- 04:24
we're doing around here committing these terms to memory won't
- 04:28
keep the cyber bullies away but you'll be more informed
- 04:30
about whatever nonsense they're trying to pull When you do
- 04:32
encounter one it might actually give the two of you
- 04:36
something to talk about not just your only angie's yer 00:04:42.24 --> [endTime] ella wells
Related Videos
What's the difference between a real estate agent and a real estate broker? Is the latter just, uh... out of cash? Quite the opposite, in fact. Jum...
So... what's a TSA worker, and what do they do? Oh, we thought maybe you knew. Okay, okay... so TSA (or Transportation Security Administration) wor...