SlideShare ist ein Scribd-Unternehmen logo
1 von 20
CIBERBULLYING BY: Clara  Miguel Naroa
definition ,[object Object]
 
What’s cyberbullying? ,[object Object]
 
Profile of a cyberbully ,[object Object]
 
 
Factors 1 ,[object Object],[object Object]
 
Factors 2 ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
Behaviors 1 ,[object Object],[object Object]
 
Behaviors 2 ,[object Object],[object Object],[object Object],[object Object]
 
Cyberbullying is becoming an important issue
DON’T
DO
CYBER-BULLYING

Weitere ähnliche Inhalte

Was ist angesagt?

Bullying in social media presentation
Bullying in social media presentationBullying in social media presentation
Bullying in social media presentation
mitchell_shannon
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
Sally Garza
 
Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meeting
anniebee3509
 
The Dangers of Social Networks
The Dangers of Social NetworksThe Dangers of Social Networks
The Dangers of Social Networks
cmpayton30
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
TeamBanana
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
shannonmf
 
21st Century Bullying Crueler Than Ever
21st Century Bullying   Crueler Than Ever21st Century Bullying   Crueler Than Ever
21st Century Bullying Crueler Than Ever
mbernstein
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
br03wood
 

Was ist angesagt? (20)

Bullying in social media presentation
Bullying in social media presentationBullying in social media presentation
Bullying in social media presentation
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meeting
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentation
 
Social Media as Evidence in Court
Social Media as Evidence in CourtSocial Media as Evidence in Court
Social Media as Evidence in Court
 
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigable
 
The Dangers of Social Networks
The Dangers of Social NetworksThe Dangers of Social Networks
The Dangers of Social Networks
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
21st Century Bullying Crueler Than Ever
21st Century Bullying   Crueler Than Ever21st Century Bullying   Crueler Than Ever
21st Century Bullying Crueler Than Ever
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberstalking
Cyberstalking Cyberstalking
Cyberstalking
 

Andere mochten auch

Wiki Presentation Cyber Safety
Wiki Presentation Cyber SafetyWiki Presentation Cyber Safety
Wiki Presentation Cyber Safety
Julie
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
rayarren06
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 

Andere mochten auch (16)

Sept 19 bullying awareness slide show
Sept 19 bullying awareness slide showSept 19 bullying awareness slide show
Sept 19 bullying awareness slide show
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Wiki Presentation Cyber Safety
Wiki Presentation Cyber SafetyWiki Presentation Cyber Safety
Wiki Presentation Cyber Safety
 
Cyberstalking and safety tips for social networks
Cyberstalking and safety tips for social networksCyberstalking and safety tips for social networks
Cyberstalking and safety tips for social networks
 
Josh Moulin: Cyberstalking Presentation
Josh Moulin:  Cyberstalking PresentationJosh Moulin:  Cyberstalking Presentation
Josh Moulin: Cyberstalking Presentation
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime's
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Prevent Bullying At School
Prevent Bullying At SchoolPrevent Bullying At School
Prevent Bullying At School
 
Bullying
BullyingBullying
Bullying
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Research Study about Bullying
Research Study about BullyingResearch Study about Bullying
Research Study about Bullying
 

Ähnlich wie Cyberbullying

Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
Trevschic
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
ijtsrd
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullying
hoskei
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullying
hoskei
 
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxIs Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
christiandean12115
 

Ähnlich wie Cyberbullying (18)

Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cyber stalking
Cyber stalking Cyber stalking
Cyber stalking
 
Cyrenne Madlangsakay
Cyrenne MadlangsakayCyrenne Madlangsakay
Cyrenne Madlangsakay
 
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
 
Essays On Cyber Bullying
Essays On Cyber BullyingEssays On Cyber Bullying
Essays On Cyber Bullying
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
 
ASA style sample
ASA style sampleASA style sample
ASA style sample
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
Edp 279 unit 2.4
Edp 279 unit 2.4Edp 279 unit 2.4
Edp 279 unit 2.4
 
Week7assgn2KwanHoY
Week7assgn2KwanHoYWeek7assgn2KwanHoY
Week7assgn2KwanHoY
 
Week7 assgn2suphaphonp
Week7 assgn2suphaphonpWeek7 assgn2suphaphonp
Week7 assgn2suphaphonp
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
 
Facebook
FacebookFacebook
Facebook
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullying
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullying
 
Cyberbullying full
Cyberbullying fullCyberbullying full
Cyberbullying full
 
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxIs Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
 

Mehr von sapphirechallenge (13)

Bullying
BullyingBullying
Bullying
 
Binge drinking
Binge drinkingBinge drinking
Binge drinking
 
Renewable energies
Renewable energiesRenewable energies
Renewable energies
 
Stereotyping
StereotypingStereotyping
Stereotyping
 
Presentacion estereotypes
Presentacion estereotypesPresentacion estereotypes
Presentacion estereotypes
 
Anorexia and obesity
Anorexia and obesityAnorexia and obesity
Anorexia and obesity
 
A more equal world
A more equal worldA more equal world
A more equal world
 
Be healthier
Be healthierBe healthier
Be healthier
 
Unaisamu
UnaisamuUnaisamu
Unaisamu
 
Eating destroyers
Eating destroyersEating destroyers
Eating destroyers
 
Do sport and be healthy
Do sport and be healthyDo sport and be healthy
Do sport and be healthy
 
Same work same money
Same work same moneySame work same money
Same work same money
 
Avatar challenge3
Avatar challenge3Avatar challenge3
Avatar challenge3
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Kürzlich hochgeladen (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Cyberbullying