SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Cyber Bullying
BY: ZT SITHOLE
What is cyber bullying?
 Bullying- Is generally understood as an aggressive and intentional act or
behaviour carried out by a group or an individual repeatedly and over time
against a victim who cannot defend him or herself
 Cyber bullying is used to describe bullying that takes lace on the internet
mostly through mobile phones and social media.
Means Used
 Cyber bullying can be carried out through
different means, such as mobile devices, internet,
messaging (e.g. chat programs, text/audio/video
programs, multimedia messages, gaming devices
and social networks)
 The initial research in this area showed that the
most common channels to perpetrate cyber
bullying were phone calls and text messages.
 However, the rapid pace of ICT innovation
determined changes in patterns. Nowadays
cyberbullying is performed through social
networks (mostly Facebook, followed by Twitter,
Instagram, Tumblr and YouTube)
Why should we keep an eye on cyber
bullying?
 We should be aware of cyber bullying because:
 1/3 children are victims of cyber bullying
 Nearly half of suicides among 10 to 14 year olds
are due to cyber bullying.
 1 in 7 teachers is a victim of cyber bullying.
 50% of children admit to being scared of their
online bullies.
 Cyber bullying also takes place in other places
of work.
 Only 2 in 10 victims will inform their parents and
teachers of online attacks
The two types of cyber bullying
 Direct attacks
 Messages sent directly to the victim
 Cyber bullying by proxy
 Using someone else to cyber bully a victim, this proxy may know they are cyber
bullying and they may not.
Ways to prevent cyber bullying
1. Establish a climate of communication with your child
 One of the best ways to help your child/learner be able to open-up to you is having
communication which builds trust.
 It is not enough to be “willing” to talk to your child/learner or only “hope” they come to
you when they experience any kind of bullying(any kind) but trying your best like
opening up to them can help the communication pattern grow.
2.Define it
 Give them a formal definition of cyber-bullying. Give them examples they might
experience using the online activities they are most likely to use.
3.Give them strategies to respond
 Since bullying is often done in front of their friends and peers, make sure the strategy to
prevent cyber bullying has credibility with their peers.( that is, that allows them to ‘save
face’ and direct the attention back to the bully.) Ironically, the wrong response could
encourage more bullying.
Ways to prevent cyber bullying
continued
4. Use celebrity cards
 Modern children choose role models and are influenced by them. These
role models can be YouTubers, actors, musicians, e.t.c and they discuss
bullying, advocate for victims, and encourage each one of us to create new
social norms where bullying is not just tolerated but shamed as a
behaviour.
5. Monitor online activity
Luckily, cyber bullying has one advantage or ‘traditional’ bullying: you can
notice it and save the evidence. This helps adults know what children are
doing and when they are doing it with whom.
Cyber bullying images
Way to prevent cyber bullying
continued
6.Know the apps and platforms
 It is most difficult to prevent cyber bullying if you do not understand how the apps work. You should
familiarise yourself with the apps to help prevent cyber bullying.
7.Engage parents and youth
 Create a community for adults and pupils to send a unified message against cyberbullying. teachers and
administrators can create policies and rules, including a cyberbullying reporting system, just as there are
now laws against cyber bullying.
8.Emphasize positivity
 School staff can do a big deal to prevent cyberbullying. As a teacher, you can use staff and parent
meetings and even send newsletters. Use your school website to create a page and forum, where parents
can discuss the problem. You can also engage bullies and victims by giving them mutual tasks, so they can
try to see each other from a different perspective
9. Remember the big idea
 Remember that the ultimate goal is to protect and restore the victim’s self-respect and empower them
with a mindset, tools and strategies to protect themselves online and offline in the future!
Cyber bullying
 All in all, working together as one(the
young and the old) cyber bullying can
be stopped and prevented if the
measures to it are discussed at an early
stage in life.
Image references
 Relevance
 Depositphotos
 Secure.avaaz.org
 MentalUp.co
 Economictimes.Indiatimes.com
 123RF

Weitere ähnliche Inhalte

Was ist angesagt?

Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentationclifforddyyy
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullyingZiar Khan
 
Cyber Bullying on Social Media Sites
Cyber Bullying on Social Media SitesCyber Bullying on Social Media Sites
Cyber Bullying on Social Media SitesSwapnil Shahade
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingringw1sl
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying CarlosE15
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointHannahMorrell
 
Effect of social media on youth
Effect of social media on youthEffect of social media on youth
Effect of social media on youthDeepti Kulkarni
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation introkscheidy
 
Negative side of Social meadia
Negative side of Social meadia Negative side of Social meadia
Negative side of Social meadia Sarath Mathew
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineIan Krieger
 

Was ist angesagt? (20)

Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentation
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
Cyber Bullying on Social Media Sites
Cyber Bullying on Social Media SitesCyber Bullying on Social Media Sites
Cyber Bullying on Social Media Sites
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Effect of social media on youth
Effect of social media on youthEffect of social media on youth
Effect of social media on youth
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
 
cyber crime
cyber crimecyber crime
cyber crime
 
Negative side of Social meadia
Negative side of Social meadia Negative side of Social meadia
Negative side of Social meadia
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe online
 

Ähnlich wie Cyber Bullying

Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenHomeGuides
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversationlippertnicole
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingStemGrade
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullyingseswear9388
 
Parents guide to cyberbullying
Parents guide to cyberbullyingParents guide to cyberbullying
Parents guide to cyberbullyingSaraMitchell40
 
Digital Citizenship.pptx
Digital Citizenship.pptxDigital Citizenship.pptx
Digital Citizenship.pptxSaraMitchell40
 
Digital Citizenship.pptx
Digital Citizenship.pptxDigital Citizenship.pptx
Digital Citizenship.pptxSaraMitchell40
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying griehl
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingpscl
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying21rahul1999
 
Unit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docxUnit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docxmarilucorr
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointhmorrell1
 

Ähnlich wie Cyber Bullying (20)

Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
 
Parents guide to cyberbullying
Parents guide to cyberbullyingParents guide to cyberbullying
Parents guide to cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Digital Citizenship.pptx
Digital Citizenship.pptxDigital Citizenship.pptx
Digital Citizenship.pptx
 
Digital Citizenship.pptx
Digital Citizenship.pptxDigital Citizenship.pptx
Digital Citizenship.pptx
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyberbullying: Advice for Schools
Cyberbullying: Advice for SchoolsCyberbullying: Advice for Schools
Cyberbullying: Advice for Schools
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
 
Unit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docxUnit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docx
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Edp 279 unit 2.4
Edp 279 unit 2.4Edp 279 unit 2.4
Edp 279 unit 2.4
 
SEG AT2.pptx
SEG AT2.pptxSEG AT2.pptx
SEG AT2.pptx
 

Kürzlich hochgeladen

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Kürzlich hochgeladen (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Cyber Bullying

  • 2. What is cyber bullying?  Bullying- Is generally understood as an aggressive and intentional act or behaviour carried out by a group or an individual repeatedly and over time against a victim who cannot defend him or herself  Cyber bullying is used to describe bullying that takes lace on the internet mostly through mobile phones and social media.
  • 3. Means Used  Cyber bullying can be carried out through different means, such as mobile devices, internet, messaging (e.g. chat programs, text/audio/video programs, multimedia messages, gaming devices and social networks)  The initial research in this area showed that the most common channels to perpetrate cyber bullying were phone calls and text messages.  However, the rapid pace of ICT innovation determined changes in patterns. Nowadays cyberbullying is performed through social networks (mostly Facebook, followed by Twitter, Instagram, Tumblr and YouTube)
  • 4. Why should we keep an eye on cyber bullying?  We should be aware of cyber bullying because:  1/3 children are victims of cyber bullying  Nearly half of suicides among 10 to 14 year olds are due to cyber bullying.  1 in 7 teachers is a victim of cyber bullying.  50% of children admit to being scared of their online bullies.  Cyber bullying also takes place in other places of work.  Only 2 in 10 victims will inform their parents and teachers of online attacks
  • 5. The two types of cyber bullying  Direct attacks  Messages sent directly to the victim  Cyber bullying by proxy  Using someone else to cyber bully a victim, this proxy may know they are cyber bullying and they may not.
  • 6. Ways to prevent cyber bullying 1. Establish a climate of communication with your child  One of the best ways to help your child/learner be able to open-up to you is having communication which builds trust.  It is not enough to be “willing” to talk to your child/learner or only “hope” they come to you when they experience any kind of bullying(any kind) but trying your best like opening up to them can help the communication pattern grow. 2.Define it  Give them a formal definition of cyber-bullying. Give them examples they might experience using the online activities they are most likely to use. 3.Give them strategies to respond  Since bullying is often done in front of their friends and peers, make sure the strategy to prevent cyber bullying has credibility with their peers.( that is, that allows them to ‘save face’ and direct the attention back to the bully.) Ironically, the wrong response could encourage more bullying.
  • 7. Ways to prevent cyber bullying continued 4. Use celebrity cards  Modern children choose role models and are influenced by them. These role models can be YouTubers, actors, musicians, e.t.c and they discuss bullying, advocate for victims, and encourage each one of us to create new social norms where bullying is not just tolerated but shamed as a behaviour. 5. Monitor online activity Luckily, cyber bullying has one advantage or ‘traditional’ bullying: you can notice it and save the evidence. This helps adults know what children are doing and when they are doing it with whom.
  • 9. Way to prevent cyber bullying continued 6.Know the apps and platforms  It is most difficult to prevent cyber bullying if you do not understand how the apps work. You should familiarise yourself with the apps to help prevent cyber bullying. 7.Engage parents and youth  Create a community for adults and pupils to send a unified message against cyberbullying. teachers and administrators can create policies and rules, including a cyberbullying reporting system, just as there are now laws against cyber bullying. 8.Emphasize positivity  School staff can do a big deal to prevent cyberbullying. As a teacher, you can use staff and parent meetings and even send newsletters. Use your school website to create a page and forum, where parents can discuss the problem. You can also engage bullies and victims by giving them mutual tasks, so they can try to see each other from a different perspective 9. Remember the big idea  Remember that the ultimate goal is to protect and restore the victim’s self-respect and empower them with a mindset, tools and strategies to protect themselves online and offline in the future!
  • 10. Cyber bullying  All in all, working together as one(the young and the old) cyber bullying can be stopped and prevented if the measures to it are discussed at an early stage in life.
  • 11. Image references  Relevance  Depositphotos  Secure.avaaz.org  MentalUp.co  Economictimes.Indiatimes.com  123RF