SlideShare a Scribd company logo
1 of 10
Cyberbullying is the use of technology to harass, threaten, embarrass, or target
another person. By definition, it occurs among young people. When an adult is
involved, it may meet the definition of cyber-harassment or cyber-stalking, a
crime that can have legal consequences and involve jail time.
Sometimes cyberbullying can be easy to spot — for example, if your child shows
you a text message, tweet, or response to a status update on Facebook that is
harsh, mean, or cruel. Other acts are less obvious, like impersonating a victim
online or posting personal information, photos, or videos designed to hurt or
embarrass another person. Some kids report that a fake account, web page, or
online persona has been created with the sole intention to harass and bully.
Cyberbullying also can happen accidentally. The impersonal nature of text
messages, IMs, and emails make it very hard to detect the sender's tone — one
person's joke could be another's hurtful insult. Nevertheless, a repeated pattern
of emails, text messages, and online posts is rarely accidental.
Efects of cyberbullying


No longer limited to schoolyards or street corners, modern-day bullying can
happen at home as well as at school — essentially 24 hours a day. As long as
kids have access to a phone, computer, or other device (such as an I
Touch), they are at risk.
Severe or chronic cyberbullying can leave victims at greater risk for
anxiety, depression, and other stress-related disorders. In some rare but
highly publicized cases, some kids have turned to suicide.
The punishment for cyberbullies can include being suspended from school or
kicked off of sports teams. Certain types of cyberbullying also may violate
school codes or even anti-discrimination or sexual harassment laws.
How Parents Can Help
If you discover that your child is being cyberbullied, talk to him or her about any experiences you have
had in your childhood. This can help your child feel less alone. Let your child know that it's not his or
her fault, and that bullying says more about the bully than the victim. Talking to teachers or school
administrators also may help, but take cues from your child.
Many schools, school districts, and after-school clubs have established protocols for responding to
cyberbullying; these vary by district and state. But before reporting the problem, let your child know
that you plan to do so, as he or she could have concerns about "tattling" and might prefer that the
problem be handled privately.
Other measures to try:
Block the bully. Most devices have settings that allow you to electronically block emails, IMs, or text
messages from specific people.
Limit access to technology. Although it's hurtful, many kids who are bullied can't resist the temptation
to check websites or phones to see if there are new messages. Keep the computer in a public place in
the house (no laptops in children's bedrooms, for example) and limit the use of cell phones and games.
Some companies allow you to turn off text messaging services during certain hours. And, most
websites and phones provide the option for parental controls, which provide parents with access to
their children’s messages and online life.
Know your kids' online world. Check their postings and the sites kids visit, and be aware of how they
spend their time online. Talk to them about the importance of privacy and why it's a bad idea to share
personal information online, even with friends. Encourage them to safeguard passwords. Write up cell
phone and social media contracts that you are willing to enforce.
Look to the web for resource and support information about cyberbullying.
If your son or daughter agrees, you may also arrange for mediation with a therapist or counselor at
school who can work with your child and/or the bully.
When Your Child Is the Bully
Finding out that your kid is the one who is behaving inappropriately can be upsetting and
heartbreaking. It's important to address the problem head on and not wait for it to go away.
Talk to your child firmly about his or her actions and explain the negative impact it has on others.
Joking and teasing might seem OK, but it can hurt people's feelings and lead to getting in trouble.
Bullying — in any form — is unacceptable; there can be serious (and sometimes irrevocable)
consequences at home, school, and in the community if it continues.
Remind your child that the use of cell phones and computers is a privilege. Sometimes it helps to
restrict the use of these devices until behavior improves. If you feel your child should have a cell
phone for safety reasons, make sure it is a phone that can only be used for emergency purposes.
Insist on strict parental controls on all devices if there is any history of your child making impulsive
decisions when they are online.
To get to the heart of the matter, sometimes talking to teachers, guidance counselors, and other
school officials can help identify situations that lead a kid to bully others. If your child has trouble
managing anger, talk to a therapist about helping your son or daughter learn to cope with anger,
hurt, frustration, and other strong emotions in a healthy way.
Professional counseling often helps kids learn to deal with their feelings and improve their
confidence and social skills, which in turn can reduce the risk of bullying. If you're tech-savvy
yourself, model good online habits to help your kids understand the benefits and the dangers of life
in the digital world.
How Are Teens Cyberbullied?
Being a victim of cyberbullying can be a common and painful experience. Some
youth who cyberbully
Pretend they are other people online to trick others
Spread lies and rumors about victims
Trick people into revealing personal information
Send or forward mean text messages
Post pictures of victims without their consent
When teens were asked why they think others cyberbully, 81 percent said
that cyberbullies think it’s funny. Other teens believe that youth who cyberbully
Don’t think it’s a big deal
Don’t think about the consequences
Are encouraged by friends
Think everybody cyberbullies
Think they won’t get caught
How Do Victims React?
Contrary to what cyberbullies may believe, cyberbullying is a big deal, and can cause a
variety of reactions in teens. Some teens have reacted in positive ways to try to
prevent cyberbullying by
Blocking communication with the cyberbully
Deleting messages without reading them
Talking to a friend about the bullying
Reporting the problem to an Internet service provider or website moderator
Many youth experience a variety of emotions when they are cyberbullied. Youth who
are cyberbullied report feeling angry, hurt, embarrassed, or scared. These emotions
can cause victims to react in ways such as
Seeking revenge on the bully
Avoiding friends and activities
Cyberbullying back
Some teens feel threatened because they may not know who is cyberbullying them.
Although cyberbullies may think they are anonymous, they can be found. If you
are cyberbullied or harassed and need help, save all communication with
the cyberbully and talk to a parent, teacher, law enforcement officer, or other adult
you trust.
How Can I Prevent Cyber bullying?
Teens have figured out ways to prevent cyber bullying. Follow in the footsteps of other
quick-thinking teens and
Refuse to pass along cyber bullying messages
Tell friends to stop cyber bullying
Block communication with cyber bullies
Report cyber bullying to a trusted adult
You can also help prevent cyber bullying by
Speaking with other students, as well as teachers and school administrators, to develop
rules against cyber bullying
Raising awareness of the cyber bullying problem in your community by holding an
assembly and creating fliers to give to younger kids or parents
Sharing NCPC’s anti-cyber bullying message with friends
Don’t forget that even though you can’t see a cyber bully or the bully’s victim, cyber
bullying causes real problems. If you wouldn’t say it in person, don’t say it online.
Delete cyber bullying. Don’t write it. Don’t forward it.
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa

More Related Content

What's hot

Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying griehl
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingpscl
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying PresentationMegan Townes
 
Cyber Bullying Questionnaire Results
Cyber Bullying Questionnaire ResultsCyber Bullying Questionnaire Results
Cyber Bullying Questionnaire Resultsa2columnd12
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingwrhawkins
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointshannonmf
 
savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)Chris Jagger
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
PPT Year 9 Parent Presentation Evening Feb 2011
PPT Year 9 Parent Presentation Evening Feb 2011PPT Year 9 Parent Presentation Evening Feb 2011
PPT Year 9 Parent Presentation Evening Feb 2011Loreto Normanurst
 

What's hot (17)

Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Parents must know about cyber bullying 2
Parents must know about cyber bullying  2Parents must know about cyber bullying  2
Parents must know about cyber bullying 2
 
Cyberbullying assignment
Cyberbullying assignmentCyberbullying assignment
Cyberbullying assignment
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying Presentation
 
Cyber Bullying Questionnaire Results
Cyber Bullying Questionnaire ResultsCyber Bullying Questionnaire Results
Cyber Bullying Questionnaire Results
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
NetSmart [English]
NetSmart [English]NetSmart [English]
NetSmart [English]
 
savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
PPT Year 9 Parent Presentation Evening Feb 2011
PPT Year 9 Parent Presentation Evening Feb 2011PPT Year 9 Parent Presentation Evening Feb 2011
PPT Year 9 Parent Presentation Evening Feb 2011
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 

Viewers also liked

Navi Site Managed Cloud Services Case Study Connect Edu
Navi Site Managed Cloud Services Case Study Connect EduNavi Site Managed Cloud Services Case Study Connect Edu
Navi Site Managed Cloud Services Case Study Connect EduRickBlaisdell
 
200903 웹인간론 요약본
200903 웹인간론 요약본200903 웹인간론 요약본
200903 웹인간론 요약본karisina
 
Mobile optimization 5.3.2011
Mobile optimization 5.3.2011Mobile optimization 5.3.2011
Mobile optimization 5.3.2011Juan Pittau
 
Gold mine myanmar 0830-0845 mitchell
Gold mine myanmar 0830-0845 mitchellGold mine myanmar 0830-0845 mitchell
Gold mine myanmar 0830-0845 mitchellMYO AUNG Myanmar
 

Viewers also liked (6)

Navi Site Managed Cloud Services Case Study Connect Edu
Navi Site Managed Cloud Services Case Study Connect EduNavi Site Managed Cloud Services Case Study Connect Edu
Navi Site Managed Cloud Services Case Study Connect Edu
 
200903 웹인간론 요약본
200903 웹인간론 요약본200903 웹인간론 요약본
200903 웹인간론 요약본
 
Accounting
AccountingAccounting
Accounting
 
Mobile optimization 5.3.2011
Mobile optimization 5.3.2011Mobile optimization 5.3.2011
Mobile optimization 5.3.2011
 
Resume Kubota
Resume KubotaResume Kubota
Resume Kubota
 
Gold mine myanmar 0830-0845 mitchell
Gold mine myanmar 0830-0845 mitchellGold mine myanmar 0830-0845 mitchell
Gold mine myanmar 0830-0845 mitchell
 

Similar to Mili giuly cyberbullying este a a a a a a a aaaa

Similar to Mili giuly cyberbullying este a a a a a a a aaaa (20)

C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Bullying
BullyingBullying
Bullying
 
Bullying vs cyber bullying italy
Bullying vs cyber bullying italyBullying vs cyber bullying italy
Bullying vs cyber bullying italy
 
Cyber bullying-and-internet-addiction
Cyber bullying-and-internet-addictionCyber bullying-and-internet-addiction
Cyber bullying-and-internet-addiction
 
Cyber bullying-and-internet-addiction
Cyber bullying-and-internet-addictionCyber bullying-and-internet-addiction
Cyber bullying-and-internet-addiction
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Digital abuse
Digital abuseDigital abuse
Digital abuse
 
Preventing Cyberbullying
Preventing CyberbullyingPreventing Cyberbullying
Preventing Cyberbullying
 
Cyberbullying and internent addiction
Cyberbullying  and internent addictionCyberbullying  and internent addiction
Cyberbullying and internent addiction
 
Cyberbullying and Internet Addiction
Cyberbullying and Internet AddictionCyberbullying and Internet Addiction
Cyberbullying and Internet Addiction
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican Guard
 
Bullying In School Essay
Bullying In School EssayBullying In School Essay
Bullying In School Essay
 

More from miliarguelles

Info mili giuly tp10 esteeeeeeeeeeeeeeeeeeeeeeeee uykuyj
Info mili giuly tp10 esteeeeeeeeeeeeeeeeeeeeeeeee uykuyjInfo mili giuly tp10 esteeeeeeeeeeeeeeeeeeeeeeeee uykuyj
Info mili giuly tp10 esteeeeeeeeeeeeeeeeeeeeeeeee uykuyjmiliarguelles
 
Pedofilia sofi , giuly , mili
Pedofilia sofi , giuly , mili Pedofilia sofi , giuly , mili
Pedofilia sofi , giuly , mili miliarguelles
 
Mili smartphone, trabajo practico numero 4
Mili smartphone, trabajo practico numero 4Mili smartphone, trabajo practico numero 4
Mili smartphone, trabajo practico numero 4miliarguelles
 
Trabajopractico 9 mili giulyyyyyyyyyyyyyyy
Trabajopractico 9 mili giulyyyyyyyyyyyyyyyTrabajopractico 9 mili giulyyyyyyyyyyyyyyy
Trabajopractico 9 mili giulyyyyyyyyyyyyyyymiliarguelles
 
Mili, muerte a las lenguas
Mili, muerte a las lenguasMili, muerte a las lenguas
Mili, muerte a las lenguasmiliarguelles
 
Mili giuly. trabajo numero 3
Mili giuly. trabajo numero 3Mili giuly. trabajo numero 3
Mili giuly. trabajo numero 3miliarguelles
 
Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!miliarguelles
 
Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!miliarguelles
 
Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!miliarguelles
 
Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!miliarguelles
 
Trabajo practico 7 mili y giuly..
Trabajo practico 7 mili y giuly..Trabajo practico 7 mili y giuly..
Trabajo practico 7 mili y giuly..miliarguelles
 
Trabajo practico 7 mili y giuly..
Trabajo practico 7 mili y giuly..Trabajo practico 7 mili y giuly..
Trabajo practico 7 mili y giuly..miliarguelles
 
Trabajo practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeee11
Trabajo  practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeee11Trabajo  practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeee11
Trabajo practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeee11miliarguelles
 
Trabajo practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeee
Trabajo  practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeeeTrabajo  practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeee
Trabajo practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeeemiliarguelles
 
Trabajo practico 6_ giuli y mili esteeeeeeeee.
Trabajo practico 6_ giuli y mili esteeeeeeeee.Trabajo practico 6_ giuli y mili esteeeeeeeee.
Trabajo practico 6_ giuli y mili esteeeeeeeee.miliarguelles
 
Trabajo practico n°4 mili arguelles...........
Trabajo practico n°4 mili arguelles...........Trabajo practico n°4 mili arguelles...........
Trabajo practico n°4 mili arguelles...........miliarguelles
 
Trabajo practico n°4 mili arguelles
Trabajo practico n°4 mili arguellesTrabajo practico n°4 mili arguelles
Trabajo practico n°4 mili arguellesmiliarguelles
 
Trabajo practico n°4 mili arguelles
Trabajo practico n°4 mili arguellesTrabajo practico n°4 mili arguelles
Trabajo practico n°4 mili arguellesmiliarguelles
 

More from miliarguelles (20)

Info mili giuly tp10 esteeeeeeeeeeeeeeeeeeeeeeeee uykuyj
Info mili giuly tp10 esteeeeeeeeeeeeeeeeeeeeeeeee uykuyjInfo mili giuly tp10 esteeeeeeeeeeeeeeeeeeeeeeeee uykuyj
Info mili giuly tp10 esteeeeeeeeeeeeeeeeeeeeeeeee uykuyj
 
Pedofilia sofi , giuly , mili
Pedofilia sofi , giuly , mili Pedofilia sofi , giuly , mili
Pedofilia sofi , giuly , mili
 
Mili smartphone, trabajo practico numero 4
Mili smartphone, trabajo practico numero 4Mili smartphone, trabajo practico numero 4
Mili smartphone, trabajo practico numero 4
 
Mili tpn5
Mili tpn5Mili tpn5
Mili tpn5
 
Trabajopractico 9 mili giulyyyyyyyyyyyyyyy
Trabajopractico 9 mili giulyyyyyyyyyyyyyyyTrabajopractico 9 mili giulyyyyyyyyyyyyyyy
Trabajopractico 9 mili giulyyyyyyyyyyyyyyy
 
Mili, muerte a las lenguas
Mili, muerte a las lenguasMili, muerte a las lenguas
Mili, muerte a las lenguas
 
Mili giuly. trabajo numero 3
Mili giuly. trabajo numero 3Mili giuly. trabajo numero 3
Mili giuly. trabajo numero 3
 
Ptlfs status
Ptlfs statusPtlfs status
Ptlfs status
 
Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!
 
Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!
 
Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!
 
Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!
 
Trabajo practico 7 mili y giuly..
Trabajo practico 7 mili y giuly..Trabajo practico 7 mili y giuly..
Trabajo practico 7 mili y giuly..
 
Trabajo practico 7 mili y giuly..
Trabajo practico 7 mili y giuly..Trabajo practico 7 mili y giuly..
Trabajo practico 7 mili y giuly..
 
Trabajo practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeee11
Trabajo  practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeee11Trabajo  practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeee11
Trabajo practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeee11
 
Trabajo practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeee
Trabajo  practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeeeTrabajo  practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeee
Trabajo practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeee
 
Trabajo practico 6_ giuli y mili esteeeeeeeee.
Trabajo practico 6_ giuli y mili esteeeeeeeee.Trabajo practico 6_ giuli y mili esteeeeeeeee.
Trabajo practico 6_ giuli y mili esteeeeeeeee.
 
Trabajo practico n°4 mili arguelles...........
Trabajo practico n°4 mili arguelles...........Trabajo practico n°4 mili arguelles...........
Trabajo practico n°4 mili arguelles...........
 
Trabajo practico n°4 mili arguelles
Trabajo practico n°4 mili arguellesTrabajo practico n°4 mili arguelles
Trabajo practico n°4 mili arguelles
 
Trabajo practico n°4 mili arguelles
Trabajo practico n°4 mili arguellesTrabajo practico n°4 mili arguelles
Trabajo practico n°4 mili arguelles
 

Recently uploaded

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Mili giuly cyberbullying este a a a a a a a aaaa

  • 1.
  • 2. Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. By definition, it occurs among young people. When an adult is involved, it may meet the definition of cyber-harassment or cyber-stalking, a crime that can have legal consequences and involve jail time. Sometimes cyberbullying can be easy to spot — for example, if your child shows you a text message, tweet, or response to a status update on Facebook that is harsh, mean, or cruel. Other acts are less obvious, like impersonating a victim online or posting personal information, photos, or videos designed to hurt or embarrass another person. Some kids report that a fake account, web page, or online persona has been created with the sole intention to harass and bully. Cyberbullying also can happen accidentally. The impersonal nature of text messages, IMs, and emails make it very hard to detect the sender's tone — one person's joke could be another's hurtful insult. Nevertheless, a repeated pattern of emails, text messages, and online posts is rarely accidental.
  • 3. Efects of cyberbullying No longer limited to schoolyards or street corners, modern-day bullying can happen at home as well as at school — essentially 24 hours a day. As long as kids have access to a phone, computer, or other device (such as an I Touch), they are at risk. Severe or chronic cyberbullying can leave victims at greater risk for anxiety, depression, and other stress-related disorders. In some rare but highly publicized cases, some kids have turned to suicide. The punishment for cyberbullies can include being suspended from school or kicked off of sports teams. Certain types of cyberbullying also may violate school codes or even anti-discrimination or sexual harassment laws.
  • 4. How Parents Can Help If you discover that your child is being cyberbullied, talk to him or her about any experiences you have had in your childhood. This can help your child feel less alone. Let your child know that it's not his or her fault, and that bullying says more about the bully than the victim. Talking to teachers or school administrators also may help, but take cues from your child. Many schools, school districts, and after-school clubs have established protocols for responding to cyberbullying; these vary by district and state. But before reporting the problem, let your child know that you plan to do so, as he or she could have concerns about "tattling" and might prefer that the problem be handled privately. Other measures to try: Block the bully. Most devices have settings that allow you to electronically block emails, IMs, or text messages from specific people. Limit access to technology. Although it's hurtful, many kids who are bullied can't resist the temptation to check websites or phones to see if there are new messages. Keep the computer in a public place in the house (no laptops in children's bedrooms, for example) and limit the use of cell phones and games. Some companies allow you to turn off text messaging services during certain hours. And, most websites and phones provide the option for parental controls, which provide parents with access to their children’s messages and online life. Know your kids' online world. Check their postings and the sites kids visit, and be aware of how they spend their time online. Talk to them about the importance of privacy and why it's a bad idea to share personal information online, even with friends. Encourage them to safeguard passwords. Write up cell phone and social media contracts that you are willing to enforce. Look to the web for resource and support information about cyberbullying. If your son or daughter agrees, you may also arrange for mediation with a therapist or counselor at school who can work with your child and/or the bully.
  • 5. When Your Child Is the Bully Finding out that your kid is the one who is behaving inappropriately can be upsetting and heartbreaking. It's important to address the problem head on and not wait for it to go away. Talk to your child firmly about his or her actions and explain the negative impact it has on others. Joking and teasing might seem OK, but it can hurt people's feelings and lead to getting in trouble. Bullying — in any form — is unacceptable; there can be serious (and sometimes irrevocable) consequences at home, school, and in the community if it continues. Remind your child that the use of cell phones and computers is a privilege. Sometimes it helps to restrict the use of these devices until behavior improves. If you feel your child should have a cell phone for safety reasons, make sure it is a phone that can only be used for emergency purposes. Insist on strict parental controls on all devices if there is any history of your child making impulsive decisions when they are online. To get to the heart of the matter, sometimes talking to teachers, guidance counselors, and other school officials can help identify situations that lead a kid to bully others. If your child has trouble managing anger, talk to a therapist about helping your son or daughter learn to cope with anger, hurt, frustration, and other strong emotions in a healthy way. Professional counseling often helps kids learn to deal with their feelings and improve their confidence and social skills, which in turn can reduce the risk of bullying. If you're tech-savvy yourself, model good online habits to help your kids understand the benefits and the dangers of life in the digital world.
  • 6. How Are Teens Cyberbullied? Being a victim of cyberbullying can be a common and painful experience. Some youth who cyberbully Pretend they are other people online to trick others Spread lies and rumors about victims Trick people into revealing personal information Send or forward mean text messages Post pictures of victims without their consent When teens were asked why they think others cyberbully, 81 percent said that cyberbullies think it’s funny. Other teens believe that youth who cyberbully Don’t think it’s a big deal Don’t think about the consequences Are encouraged by friends Think everybody cyberbullies Think they won’t get caught
  • 7. How Do Victims React? Contrary to what cyberbullies may believe, cyberbullying is a big deal, and can cause a variety of reactions in teens. Some teens have reacted in positive ways to try to prevent cyberbullying by Blocking communication with the cyberbully Deleting messages without reading them Talking to a friend about the bullying Reporting the problem to an Internet service provider or website moderator Many youth experience a variety of emotions when they are cyberbullied. Youth who are cyberbullied report feeling angry, hurt, embarrassed, or scared. These emotions can cause victims to react in ways such as Seeking revenge on the bully Avoiding friends and activities Cyberbullying back Some teens feel threatened because they may not know who is cyberbullying them. Although cyberbullies may think they are anonymous, they can be found. If you are cyberbullied or harassed and need help, save all communication with the cyberbully and talk to a parent, teacher, law enforcement officer, or other adult you trust.
  • 8. How Can I Prevent Cyber bullying? Teens have figured out ways to prevent cyber bullying. Follow in the footsteps of other quick-thinking teens and Refuse to pass along cyber bullying messages Tell friends to stop cyber bullying Block communication with cyber bullies Report cyber bullying to a trusted adult You can also help prevent cyber bullying by Speaking with other students, as well as teachers and school administrators, to develop rules against cyber bullying Raising awareness of the cyber bullying problem in your community by holding an assembly and creating fliers to give to younger kids or parents Sharing NCPC’s anti-cyber bullying message with friends Don’t forget that even though you can’t see a cyber bully or the bully’s victim, cyber bullying causes real problems. If you wouldn’t say it in person, don’t say it online. Delete cyber bullying. Don’t write it. Don’t forward it.