SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Cyberbullying is any harassment that occurs via the
Internet. Vicious forum posts, name calling in chat rooms, posting
fake profiles on web sites, and mean or cruel email messages are all
ways of cyberbullying.
Because their motives differ, the solutions and responses to each type of
cyberbullying incident has to differ too. Unfortunately, there is no "one size fits
all" when cyberbullying is concerned. Only two of the types of cyberbullies have
something in common with the traditional schoolyard bully. Experts who
understand schoolyard bullying often misunderstand cyberbullying, thinking it is
just another method of bullying. But the motives and the nature of
cybercommunications, as well as the demographic and profile of a cyberbully
differ from their offline counterpart.
There are two kinds of cyberbullying, direct attacks (messages sent to your
kids directly) and cyberbullying by proxy (using others to help cyberbully the
victim, either with or without the accomplice's knowledge). Because
cyberbullying by proxy often gets adults involved in the harassment, it is much
more dangerous.
Education can help considerably in preventing and dealing with the
consequences of cyberbullying. The first place to begin an education campaign
is with the kids and teens themselves. We need to address ways they can
become inadvertent cyberbullies, how to be accountable for their actions and
not to stand by and allow bullying (in any form) to be acceptable. We need to
teach them not to ignore the pain of others.
Teaching kids to “Take 5!” before responding to something they encounter
online is a good place to start. Jokingly, we tell them to “Drop the Mouse! And
step away from the computer and no one will get hurt!” We then encourage
them to find ways to help them calm down. This may include doing yoga, or
deep-breathing. It may include running, playing catch or shooting hoops. It
may involve taking a bath, hugging a stuffed animal or talking on the phone
with friends.
Cyberbullying
Cyberbullying
Cyberbullying
Cyberbullying
Cyberbullying
Cyberbullying

Weitere ähnliche Inhalte

Was ist angesagt?

What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentation
Sally Garza
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
shannonmf
 
Cyber bullying project
Cyber bullying projectCyber bullying project
Cyber bullying project
volpila
 
Cyber Wellness Power point slides
Cyber Wellness Power point slidesCyber Wellness Power point slides
Cyber Wellness Power point slides
guest7e2cdf
 
The Impact Of Cyberbullying On Its Victims And
The Impact Of Cyberbullying On Its Victims AndThe Impact Of Cyberbullying On Its Victims And
The Impact Of Cyberbullying On Its Victims And
so_f1y
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
kntrainer
 

Was ist angesagt? (20)

Edp 279 unit 2.4
Edp 279 unit 2.4Edp 279 unit 2.4
Edp 279 unit 2.4
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Bullying and Cyber bullying explained
Bullying and Cyber bullying explained  Bullying and Cyber bullying explained
Bullying and Cyber bullying explained
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentation
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 
Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyber bullying project
Cyber bullying projectCyber bullying project
Cyber bullying project
 
Cyber Wellness Power point slides
Cyber Wellness Power point slidesCyber Wellness Power point slides
Cyber Wellness Power point slides
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
The Impact Of Cyberbullying On Its Victims And
The Impact Of Cyberbullying On Its Victims AndThe Impact Of Cyberbullying On Its Victims And
The Impact Of Cyberbullying On Its Victims And
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Ethics and cyber bullying
Ethics and cyber bullyingEthics and cyber bullying
Ethics and cyber bullying
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
 
Cyberbullying project
Cyberbullying projectCyberbullying project
Cyberbullying project
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 

Andere mochten auch (8)

Introductie selectiedag knrm lifeguards
Introductie selectiedag knrm lifeguardsIntroductie selectiedag knrm lifeguards
Introductie selectiedag knrm lifeguards
 
What's the Deal with Phing?
What's the Deal with Phing?What's the Deal with Phing?
What's the Deal with Phing?
 
ENTREPRENEURSHIP, COLLABORATION, NETWORKING
ENTREPRENEURSHIP, COLLABORATION, NETWORKINGENTREPRENEURSHIP, COLLABORATION, NETWORKING
ENTREPRENEURSHIP, COLLABORATION, NETWORKING
 
Computer class
Computer classComputer class
Computer class
 
Evlilik-Manifestosu1
Evlilik-Manifestosu1Evlilik-Manifestosu1
Evlilik-Manifestosu1
 
Introduction to Zend Framework
Introduction to Zend FrameworkIntroduction to Zend Framework
Introduction to Zend Framework
 
Maruti
Maruti Maruti
Maruti
 
Presentation2
Presentation2Presentation2
Presentation2
 

Ähnlich wie Cyberbullying

Adrian y santiago cyberbulying
Adrian y santiago cyberbulying Adrian y santiago cyberbulying
Adrian y santiago cyberbulying
dk_10
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
sofisalazar00
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying este
giulimazziotti96
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
miliarguelles1
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
miliarguelles
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
miliarguelles1
 
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxIs Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
christiandean12115
 
Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02
Joyce Hirsh
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
TeamBanana
 

Ähnlich wie Cyberbullying (20)

Cyberbullyng: Causes, Effects, and Possible Solutions
Cyberbullyng: Causes, Effects, and Possible SolutionsCyberbullyng: Causes, Effects, and Possible Solutions
Cyberbullyng: Causes, Effects, and Possible Solutions
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
 
Cyberbullying- Lacson, Espinosa.pdf
Cyberbullying- Lacson, Espinosa.pdfCyberbullying- Lacson, Espinosa.pdf
Cyberbullying- Lacson, Espinosa.pdf
 
Adrian y santiago cyberbulying
Adrian y santiago cyberbulying Adrian y santiago cyberbulying
Adrian y santiago cyberbulying
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying este
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxIs Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
 
Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican Guard
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
SOCIAL MEDIA AWARENESS MONTH
SOCIAL MEDIA AWARENESS MONTHSOCIAL MEDIA AWARENESS MONTH
SOCIAL MEDIA AWARENESS MONTH
 
Essays On Cyber Bullying
Essays On Cyber BullyingEssays On Cyber Bullying
Essays On Cyber Bullying
 
Bullying
BullyingBullying
Bullying
 

Mehr von Tomi Mirra

Trabajo Practico 2
Trabajo Practico 2Trabajo Practico 2
Trabajo Practico 2
Tomi Mirra
 
Trabajo Practico 9
Trabajo Practico 9Trabajo Practico 9
Trabajo Practico 9
Tomi Mirra
 
Trabajo practico 5
Trabajo practico 5Trabajo practico 5
Trabajo practico 5
Tomi Mirra
 
Trabajo practico n°5
Trabajo practico n°5Trabajo practico n°5
Trabajo practico n°5
Tomi Mirra
 
Trabajo practico 3
Trabajo practico 3Trabajo practico 3
Trabajo practico 3
Tomi Mirra
 
Trabajo practico 2
Trabajo practico 2Trabajo practico 2
Trabajo practico 2
Tomi Mirra
 
Trabajo practico 1
Trabajo practico 1Trabajo practico 1
Trabajo practico 1
Tomi Mirra
 
Trabajo practico1
Trabajo practico1 Trabajo practico1
Trabajo practico1
Tomi Mirra
 
Trabajo practio4
Trabajo practio4 Trabajo practio4
Trabajo practio4
Tomi Mirra
 
Trabaj practico 2
Trabaj practico 2Trabaj practico 2
Trabaj practico 2
Tomi Mirra
 

Mehr von Tomi Mirra (10)

Trabajo Practico 2
Trabajo Practico 2Trabajo Practico 2
Trabajo Practico 2
 
Trabajo Practico 9
Trabajo Practico 9Trabajo Practico 9
Trabajo Practico 9
 
Trabajo practico 5
Trabajo practico 5Trabajo practico 5
Trabajo practico 5
 
Trabajo practico n°5
Trabajo practico n°5Trabajo practico n°5
Trabajo practico n°5
 
Trabajo practico 3
Trabajo practico 3Trabajo practico 3
Trabajo practico 3
 
Trabajo practico 2
Trabajo practico 2Trabajo practico 2
Trabajo practico 2
 
Trabajo practico 1
Trabajo practico 1Trabajo practico 1
Trabajo practico 1
 
Trabajo practico1
Trabajo practico1 Trabajo practico1
Trabajo practico1
 
Trabajo practio4
Trabajo practio4 Trabajo practio4
Trabajo practio4
 
Trabaj practico 2
Trabaj practico 2Trabaj practico 2
Trabaj practico 2
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Cyberbullying

  • 1.
  • 2. Cyberbullying is any harassment that occurs via the Internet. Vicious forum posts, name calling in chat rooms, posting fake profiles on web sites, and mean or cruel email messages are all ways of cyberbullying.
  • 3. Because their motives differ, the solutions and responses to each type of cyberbullying incident has to differ too. Unfortunately, there is no "one size fits all" when cyberbullying is concerned. Only two of the types of cyberbullies have something in common with the traditional schoolyard bully. Experts who understand schoolyard bullying often misunderstand cyberbullying, thinking it is just another method of bullying. But the motives and the nature of cybercommunications, as well as the demographic and profile of a cyberbully differ from their offline counterpart.
  • 4. There are two kinds of cyberbullying, direct attacks (messages sent to your kids directly) and cyberbullying by proxy (using others to help cyberbully the victim, either with or without the accomplice's knowledge). Because cyberbullying by proxy often gets adults involved in the harassment, it is much more dangerous.
  • 5. Education can help considerably in preventing and dealing with the consequences of cyberbullying. The first place to begin an education campaign is with the kids and teens themselves. We need to address ways they can become inadvertent cyberbullies, how to be accountable for their actions and not to stand by and allow bullying (in any form) to be acceptable. We need to teach them not to ignore the pain of others. Teaching kids to “Take 5!” before responding to something they encounter online is a good place to start. Jokingly, we tell them to “Drop the Mouse! And step away from the computer and no one will get hurt!” We then encourage them to find ways to help them calm down. This may include doing yoga, or deep-breathing. It may include running, playing catch or shooting hoops. It may involve taking a bath, hugging a stuffed animal or talking on the phone with friends.