SlideShare ist ein Scribd-Unternehmen logo
1 von 21
PROTECTING ONESELF
FROM CYBER BULLYING
ON SOCIAL MEDIA SITES
By
Swapnil Shahade
CONTENT
 INTRODUCTION
 STRUCTURE OF THE STUDY
 METHOD
 Participants
 Procedure
 Data analysis
 RESULTS
 LIMITATIONS AND FUTURE WORK
INTRODUCTION
Social Media
Social media is computer-mediated tool that allow people to
create, share or exchange information, career interests, ideas, and
pictures/videos in virtual communities and networks.
INTRODUCTION
Cyber Bullying
Cyberbullying is an action of harming or harassing via
information technology networks.
Use of communication technologies for the intention of harming
another person or group of people who have difficulty defending
themselves.
The intention is to embarrass, hurt, humiliate, offend, get
revenge, have fun, and exert power over others.
 Through Texting, Email, using offensive symbols, sexual
harassment.
STRUCTURE
Research question
 Protecting oneself from cyber bullying on social networking
sites.
 Staying safe online by limiting exposure.
 Identifying cyber safety protection on social media sites.
METHOD
• Participants
• Procedure
• Data analysis
PARTICIPANTS
• Participants were 259 undergraduate students
• Of the 259 participants who registered for the internet-based self
report measure, 254 had a sufficient completion rate to be
retained for further analysis.
PARTICIPANTS
51.60%
48.40%
SEX OF PARTICIPANTS
Male Female
PARTICIPANTS
72.90%
24.90%
2.20%
ETHNICITY
Chinese Indian Malaysian
PROCEDURE
Participants were recruited to the study via the university’s Face
Book page, student email accounts, and advertisements placed
on campus.
This measure remained live for four weeks and tool
approximately 30 minutes to complete.
 The measure was pilot tested for format, clarity, length, and ease
of administration.
Incentives for completing the self report measure included an
iPad and 10 x $10 Starbuck vouchers.
DATAANALYSIS
 The data was analysed theoretically according to a constructivist
grounded theory methodology.
 Participants recorded their perceptions of protecting themselves
from cyber bulling on social media sites.
 Comparative analysis, participants responses were compared,
connected and incorporated as themes.
RESULTS
Findings encompassed three groups
Bullies
Victims
Third party observers
 This infiltration encompassed four themes:
 Internet service providers
 Public education and media awareness
 Formal and informal supports
 Reporting.
BULLIES
Participants reported that bullies could protect themselves online
by ceasing to dialogue disrespectfully and being polite and
assertive in their interactions with the victim.
Rehabilitation in the form of giving public talks on anti-bullying.
 Thinking on a more positive note of the person.
Reduce the number of saying negative comments about people.
 Stop bullying and make some other activities that are not related
to negative effects.
VICTIM
 Victim cyber safety behaviours concentrated on individuals not
placing themselves in a vulnerable position, possessing a strong
identity, believing in and honouring themselves.
 Strategies included upgrading online security monitoring and
limiting access to networking sites
 Ignoring the bait of the bully and investing oneself in life
energizing activities
 Upgrading security system, use weird password, changing
password regularly
THIRD PARTY OBSERVERS
 Being a third party observer was viewed more in the role of
defender of internet safety rather than encourager and supporter
of bullying.
 Empowering and educating third party observers to take a stand
and be proactive in providing assistance to victims was proposed
as a needs satisfying behaviour
 Third party observers should be able to flag bullies secretly.
 Recognizing and addressing the solution early by approaching
either bully or victim and approaching external sources.
INTERNET SERVICE PROVIDERS
 Plan or invent stricter online privacy settings and routinely
changing username and e-mail address.
 Installing reporting device applications on all sites to raise
awareness of internet safety and reporting cyber bullying events.
 Internet Service Provider (ISP) account closure and/or
banishment.
 Lock his IP address so that he will not be able to access the
social media sites any more.
PUBLIC EDUCATION AND MEDIA
AWARENESS
 Using the media to promote and educate the public about self-
protection online.
 Educate public on cyber bullying and its consequences on the
victims and the social community.
 Increasing public awareness about actions which are considered
as cyber bullying.
 Make bullies understand that a comment online may leave a
scare that never heals just like real life bullying can.
FORMALAND INFORMAL SUPPORT
 Online and offline support was recommended
 Counselling represent formal support, and peer and family input
represent informal support.
 Informal support encompassed online forums and chat rooms,
with advice.
 Online chat groups to disclose problems if talking to someone is
hard.
REPORTING
 The system and process for reporting cyber bullying was raised
repeatedly by participants.
 Contact hotline for reporting cyber bullying.
Many aligned reporting bullying with protecting oneself online,
and maintained responsibility resided in the jurisdiction of the
Internet Service Provider, the victims themselves and third party
observers.
LIMITATIONS AND FUTURE WORK
 One limitation of this study is the participant size and adult
undergraduate cohort.
 Including youths and elders perspectives of self-protection
online would build upon this study.
 As cyber bullying is a relatively new phenomenon, future
studies need to explore how individuals learn help seeking
behaviours on social media sites – self-taught, observations,
advise or train.
 The jurisdiction of internet service providers in promoting
online safety and privacy needs to be evaluated in the research.
THANK YOU…

Weitere ähnliche Inhalte

Was ist angesagt?

Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentationclifforddyyy
 
Email phising and spoofing hurting your business
Email phising and spoofing hurting your businessEmail phising and spoofing hurting your business
Email phising and spoofing hurting your businessMithi SkyConnect
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide sharebr03wood
 
Online Privacy
Online PrivacyOnline Privacy
Online PrivacyIWMW
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention TipsTayyab Farooq
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingCoachElrod
 
7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]Sorav Jain
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt newOnkar1431
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networkingBryan Tran
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpointMsCCostello
 

Was ist angesagt? (20)

Cyber bullying vs traditional bullying
Cyber bullying vs traditional bullyingCyber bullying vs traditional bullying
Cyber bullying vs traditional bullying
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Email phising and spoofing hurting your business
Email phising and spoofing hurting your businessEmail phising and spoofing hurting your business
Email phising and spoofing hurting your business
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Addiction To Social Media
Addiction To Social MediaAddiction To Social Media
Addiction To Social Media
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networking
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 

Andere mochten auch

"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?""Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"DefinetheLine
 
Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetinganniebee3509
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parentsdamarissepulveda
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation introkscheidy
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointshannonmf
 
What Happens Online in 60 Seconds?
What Happens Online in 60 Seconds?What Happens Online in 60 Seconds?
What Happens Online in 60 Seconds?Alex Noudelman
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyinganugent_13
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointtburdzy1
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingwirsi
 
Cyberbullying Presentation 2008
Cyberbullying Presentation 2008Cyberbullying Presentation 2008
Cyberbullying Presentation 2008Josie Fraser
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullyingMelissa
 
Aet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingAet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingcschoeneman
 
Cyber Bullying Presentation
Cyber Bullying PresentationCyber Bullying Presentation
Cyber Bullying Presentationamate1cl
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?AJ Tivol
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingbuech1cj
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullyingZiar Khan
 

Andere mochten auch (20)

"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?""Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
 
Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meeting
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parents
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
What Happens Online in 60 Seconds?
What Happens Online in 60 Seconds?What Happens Online in 60 Seconds?
What Happens Online in 60 Seconds?
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Nos blessures intérieures
Nos blessures intérieuresNos blessures intérieures
Nos blessures intérieures
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying Presentation 2008
Cyberbullying Presentation 2008Cyberbullying Presentation 2008
Cyberbullying Presentation 2008
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullying
 
Aet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingAet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullying
 
Cyber Bullying Presentation
Cyber Bullying PresentationCyber Bullying Presentation
Cyber Bullying Presentation
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
491 nasilje na internetu
491 nasilje na internetu491 nasilje na internetu
491 nasilje na internetu
 

Ähnlich wie Cyber Bullying on Social Media Sites

Cyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdfCyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdfRahil Foundation
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGJaveriaZain1
 
Report presentation electivelyjsksksk_073645.pptx
Report presentation electivelyjsksksk_073645.pptxReport presentation electivelyjsksksk_073645.pptx
Report presentation electivelyjsksksk_073645.pptxSolSandag
 
Internet Safety and Cyberbullying Awareness for Middle Schoolers.
Internet Safety and Cyberbullying Awareness for Middle Schoolers.Internet Safety and Cyberbullying Awareness for Middle Schoolers.
Internet Safety and Cyberbullying Awareness for Middle Schoolers.moeenali5423
 
Social media, Technology, and Youth
Social media, Technology, and YouthSocial media, Technology, and Youth
Social media, Technology, and YouthKhadija Parween
 
SEG AT2 final update
SEG AT2 final updateSEG AT2 final update
SEG AT2 final updateBradyTrotman
 
Dwe m4 cyber bullying and conflict resolution
Dwe m4   cyber bullying and conflict resolutionDwe m4   cyber bullying and conflict resolution
Dwe m4 cyber bullying and conflict resolutionData-Set
 
Research Methodology.pdf
Research Methodology.pdfResearch Methodology.pdf
Research Methodology.pdfJioAhuja
 
Social Media Policy for our School District
Social Media Policy for our School DistrictSocial Media Policy for our School District
Social Media Policy for our School DistrictSallyLynnMcLean
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityITIIIndustries
 
2 social media awareness for schools tec leadership institute
2 social media awareness for schools tec leadership institute2 social media awareness for schools tec leadership institute
2 social media awareness for schools tec leadership institutetecleadership
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a baneAbhishek Sharma
 
Identifying and dealing with online bullying
Identifying and dealing with online bullyingIdentifying and dealing with online bullying
Identifying and dealing with online bullyingJisc RSC East Midlands
 
Enhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital WorldEnhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital Worldcyberprosocial
 

Ähnlich wie Cyber Bullying on Social Media Sites (20)

Cyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdfCyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdf
 
SEG AT2.pptx
SEG AT2.pptxSEG AT2.pptx
SEG AT2.pptx
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYING
 
Report presentation electivelyjsksksk_073645.pptx
Report presentation electivelyjsksksk_073645.pptxReport presentation electivelyjsksksk_073645.pptx
Report presentation electivelyjsksksk_073645.pptx
 
Internet Safety and Cyberbullying Awareness for Middle Schoolers.
Internet Safety and Cyberbullying Awareness for Middle Schoolers.Internet Safety and Cyberbullying Awareness for Middle Schoolers.
Internet Safety and Cyberbullying Awareness for Middle Schoolers.
 
Chandan kumar
Chandan kumarChandan kumar
Chandan kumar
 
Social media, Technology, and Youth
Social media, Technology, and YouthSocial media, Technology, and Youth
Social media, Technology, and Youth
 
SEG AT2 final update
SEG AT2 final updateSEG AT2 final update
SEG AT2 final update
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Dwe m4 cyber bullying and conflict resolution
Dwe m4   cyber bullying and conflict resolutionDwe m4   cyber bullying and conflict resolution
Dwe m4 cyber bullying and conflict resolution
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
Research Methodology.pdf
Research Methodology.pdfResearch Methodology.pdf
Research Methodology.pdf
 
Social Media Policy for our School District
Social Media Policy for our School DistrictSocial Media Policy for our School District
Social Media Policy for our School District
 
final campaign
final campaignfinal campaign
final campaign
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
 
2 social media awareness for schools tec leadership institute
2 social media awareness for schools tec leadership institute2 social media awareness for schools tec leadership institute
2 social media awareness for schools tec leadership institute
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
 
Identifying and dealing with online bullying
Identifying and dealing with online bullyingIdentifying and dealing with online bullying
Identifying and dealing with online bullying
 
Enhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital WorldEnhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital World
 

Mehr von Swapnil Shahade

Power Generating Shock Absorber
Power Generating Shock AbsorberPower Generating Shock Absorber
Power Generating Shock AbsorberSwapnil Shahade
 
Experimental Heat Transfer Analysis of Different PCM Material used in Concret...
Experimental Heat Transfer Analysis of Different PCM Material used in Concret...Experimental Heat Transfer Analysis of Different PCM Material used in Concret...
Experimental Heat Transfer Analysis of Different PCM Material used in Concret...Swapnil Shahade
 
APPLICATION OF PCM IN CONSTRUCTION OF BUILDINGS
APPLICATION OF PCM IN CONSTRUCTION OF BUILDINGSAPPLICATION OF PCM IN CONSTRUCTION OF BUILDINGS
APPLICATION OF PCM IN CONSTRUCTION OF BUILDINGSSwapnil Shahade
 
APPLICATION OF MECHATRONICS IN DEFENCE
APPLICATION OF MECHATRONICS IN DEFENCE APPLICATION OF MECHATRONICS IN DEFENCE
APPLICATION OF MECHATRONICS IN DEFENCE Swapnil Shahade
 
Genetic Algorithm for task scheduling in Cloud Computing Environment
Genetic Algorithm for task scheduling in Cloud Computing EnvironmentGenetic Algorithm for task scheduling in Cloud Computing Environment
Genetic Algorithm for task scheduling in Cloud Computing EnvironmentSwapnil Shahade
 
Industrial Capacity Planning & Queue Management
Industrial Capacity Planning & Queue ManagementIndustrial Capacity Planning & Queue Management
Industrial Capacity Planning & Queue ManagementSwapnil Shahade
 

Mehr von Swapnil Shahade (8)

CAD CAE CAM Lecture
CAD CAE CAM LectureCAD CAE CAM Lecture
CAD CAE CAM Lecture
 
Power Generating Shock Absorber
Power Generating Shock AbsorberPower Generating Shock Absorber
Power Generating Shock Absorber
 
Experimental Heat Transfer Analysis of Different PCM Material used in Concret...
Experimental Heat Transfer Analysis of Different PCM Material used in Concret...Experimental Heat Transfer Analysis of Different PCM Material used in Concret...
Experimental Heat Transfer Analysis of Different PCM Material used in Concret...
 
APPLICATION OF PCM IN CONSTRUCTION OF BUILDINGS
APPLICATION OF PCM IN CONSTRUCTION OF BUILDINGSAPPLICATION OF PCM IN CONSTRUCTION OF BUILDINGS
APPLICATION OF PCM IN CONSTRUCTION OF BUILDINGS
 
Swapnil Shahade
Swapnil  ShahadeSwapnil  Shahade
Swapnil Shahade
 
APPLICATION OF MECHATRONICS IN DEFENCE
APPLICATION OF MECHATRONICS IN DEFENCE APPLICATION OF MECHATRONICS IN DEFENCE
APPLICATION OF MECHATRONICS IN DEFENCE
 
Genetic Algorithm for task scheduling in Cloud Computing Environment
Genetic Algorithm for task scheduling in Cloud Computing EnvironmentGenetic Algorithm for task scheduling in Cloud Computing Environment
Genetic Algorithm for task scheduling in Cloud Computing Environment
 
Industrial Capacity Planning & Queue Management
Industrial Capacity Planning & Queue ManagementIndustrial Capacity Planning & Queue Management
Industrial Capacity Planning & Queue Management
 

Kürzlich hochgeladen

Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersMairaAshraf6
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadhamedmustafa094
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 

Kürzlich hochgeladen (20)

Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 

Cyber Bullying on Social Media Sites

  • 1. PROTECTING ONESELF FROM CYBER BULLYING ON SOCIAL MEDIA SITES By Swapnil Shahade
  • 2. CONTENT  INTRODUCTION  STRUCTURE OF THE STUDY  METHOD  Participants  Procedure  Data analysis  RESULTS  LIMITATIONS AND FUTURE WORK
  • 3. INTRODUCTION Social Media Social media is computer-mediated tool that allow people to create, share or exchange information, career interests, ideas, and pictures/videos in virtual communities and networks.
  • 4. INTRODUCTION Cyber Bullying Cyberbullying is an action of harming or harassing via information technology networks. Use of communication technologies for the intention of harming another person or group of people who have difficulty defending themselves. The intention is to embarrass, hurt, humiliate, offend, get revenge, have fun, and exert power over others.  Through Texting, Email, using offensive symbols, sexual harassment.
  • 5. STRUCTURE Research question  Protecting oneself from cyber bullying on social networking sites.  Staying safe online by limiting exposure.  Identifying cyber safety protection on social media sites.
  • 7. PARTICIPANTS • Participants were 259 undergraduate students • Of the 259 participants who registered for the internet-based self report measure, 254 had a sufficient completion rate to be retained for further analysis.
  • 10. PROCEDURE Participants were recruited to the study via the university’s Face Book page, student email accounts, and advertisements placed on campus. This measure remained live for four weeks and tool approximately 30 minutes to complete.  The measure was pilot tested for format, clarity, length, and ease of administration. Incentives for completing the self report measure included an iPad and 10 x $10 Starbuck vouchers.
  • 11. DATAANALYSIS  The data was analysed theoretically according to a constructivist grounded theory methodology.  Participants recorded their perceptions of protecting themselves from cyber bulling on social media sites.  Comparative analysis, participants responses were compared, connected and incorporated as themes.
  • 12. RESULTS Findings encompassed three groups Bullies Victims Third party observers  This infiltration encompassed four themes:  Internet service providers  Public education and media awareness  Formal and informal supports  Reporting.
  • 13. BULLIES Participants reported that bullies could protect themselves online by ceasing to dialogue disrespectfully and being polite and assertive in their interactions with the victim. Rehabilitation in the form of giving public talks on anti-bullying.  Thinking on a more positive note of the person. Reduce the number of saying negative comments about people.  Stop bullying and make some other activities that are not related to negative effects.
  • 14. VICTIM  Victim cyber safety behaviours concentrated on individuals not placing themselves in a vulnerable position, possessing a strong identity, believing in and honouring themselves.  Strategies included upgrading online security monitoring and limiting access to networking sites  Ignoring the bait of the bully and investing oneself in life energizing activities  Upgrading security system, use weird password, changing password regularly
  • 15. THIRD PARTY OBSERVERS  Being a third party observer was viewed more in the role of defender of internet safety rather than encourager and supporter of bullying.  Empowering and educating third party observers to take a stand and be proactive in providing assistance to victims was proposed as a needs satisfying behaviour  Third party observers should be able to flag bullies secretly.  Recognizing and addressing the solution early by approaching either bully or victim and approaching external sources.
  • 16. INTERNET SERVICE PROVIDERS  Plan or invent stricter online privacy settings and routinely changing username and e-mail address.  Installing reporting device applications on all sites to raise awareness of internet safety and reporting cyber bullying events.  Internet Service Provider (ISP) account closure and/or banishment.  Lock his IP address so that he will not be able to access the social media sites any more.
  • 17. PUBLIC EDUCATION AND MEDIA AWARENESS  Using the media to promote and educate the public about self- protection online.  Educate public on cyber bullying and its consequences on the victims and the social community.  Increasing public awareness about actions which are considered as cyber bullying.  Make bullies understand that a comment online may leave a scare that never heals just like real life bullying can.
  • 18. FORMALAND INFORMAL SUPPORT  Online and offline support was recommended  Counselling represent formal support, and peer and family input represent informal support.  Informal support encompassed online forums and chat rooms, with advice.  Online chat groups to disclose problems if talking to someone is hard.
  • 19. REPORTING  The system and process for reporting cyber bullying was raised repeatedly by participants.  Contact hotline for reporting cyber bullying. Many aligned reporting bullying with protecting oneself online, and maintained responsibility resided in the jurisdiction of the Internet Service Provider, the victims themselves and third party observers.
  • 20. LIMITATIONS AND FUTURE WORK  One limitation of this study is the participant size and adult undergraduate cohort.  Including youths and elders perspectives of self-protection online would build upon this study.  As cyber bullying is a relatively new phenomenon, future studies need to explore how individuals learn help seeking behaviours on social media sites – self-taught, observations, advise or train.  The jurisdiction of internet service providers in promoting online safety and privacy needs to be evaluated in the research.