SlideShare a Scribd company logo
1 of 16
Cyberbullying
Brindetta Cook
CSIS 200
April 29, 2013
Source: http://thinkprogress.org/wp-content/uploads/2012/06/Cyberbullying.jpg
What is “Cyberbullying”?
“Cyberbullying is bullying that takes place using
electronic technology. “
Statistics
The Harford County Examiner reported similarly concerning cyber bullying 
statistics:
• Around half of teens have been the victims of cyber bullying
• Only 1 in 10 teens tells a parent if they have been a cyber bully victim
• Fewer than 1 in 5 cyber bullying incidents are reported to law
enforcement
• 1 in 10 adolescents or teens have had embarrassing or damaging
pictures taken of themselves without their permission, often using cell
phone cameras
• About 1 in 5 teens have posted or sent sexually suggestive or nude
pictures of themselves to others
Causes
• revenge of other peers
• for entertainment purposes
• to boost their ego
• to get a laugh from their peers
• help bolster or remind people of their
own social standing
Effects
•Undermining your confidence, self-esteem and sense of
security
•Affecting your performance and attendance at school
•Causing stress and affecting your health
•Affecting your professional reputation and career
•Fueling prejudice in areas such as race, religion and
sexuality
•Leading to suicidal thoughts
Who is affected?
• Ages 15-17
• Females are about twice as likely as
males to be victims and perpetrators of
cyber bullying.
• Males are more likely to be threatened
by cyber bullies than females
• Affects all races
Tyler Clementi
Jessica Logan
Technology’s Role
• Over 80% of teens use a cell phone regularly, making it the
most common medium for cyber bullying
• Cyberbullying can happen 24 hours a day, 7 days a week
• Cyberbullying messages and images can be posted
anonymously and distributed quickly to a very wide
audience.
• Deleting inappropriate or harassing messages, texts, and
pictures is extremely difficult after they have been posted or
sent.
How you can help!
• Don’t engage in or support mean material,
gossip, or rumors posted online, or talk about
it
• Support the victim being targeted online by
posting positive messages!
• Print the evidence to share with an authority
Remember!
• we are not invisible online, and
anything we post can be traced back to
us. Monitor your online reputation
YOU have the power
• If cyberbullying becomes severe and involves
threats of violence, you should contact the
police immediately. Some states have
computer harassment laws to prosecute
offenders.
Governor Cuomo Signs Legislation to
Help Protect Students from
Cyberbullying
• Requires Schools to Act When Cyberbullying Occurs
• Ensures Proper Protocols Are in Place to Deal with
Cyberbullying
• Sets Training Requirements For School Employees to Help
Identify and Prevent Cyberbullying
Have you ever been a victim of cyberbullying?
• A.)YES
• B.) NO
Source:
http://samuelflinn.files.wordpress.com/2012/05/cyber-
bullying-poster.jpg
Resources
Anti Bullying Campaigns and Programs:
• The Great American NO BULL Challenge
• Internet Safety 101
• Olweus Bullying Prevention Program
• Stomp Out Bullying
• Delete Digital Drama
• Cyberbully411
• STOP Cyberbullying
Sources
" What are the effects of cyberbullying? | Cyberbullying | Teacher advice | Teachtoday."
Teachtoday. N.p., n.d. Web. 28 Apr. 2013. <http://www.teachtoday.eu/en/Teacher-
advice/Cyberbullying/What-are-the-effects-of-cyberbullying.aspx>.
"Cyber Bullying Statistics - Bullying Statistics." Bullying Statistics ­ Teen Violence, Anger, 
Bullying, Treatment Options. N.p., n.d. Web. 29 Apr. 2013.
<http://www.bullyingstatistics.org/content/cyber-bullying-statistics.html>.
"Cyberbullying Effects | End Of Bullying." EndofBullying.com. N.p., n.d. Web. 29 Apr. 2013.
<http://endofbullying.com/cyberbullying-effects/>.
Sources cont’d.
"Governor Cuomo Signs Legislation to Help Protect Students from Cyberbullying |
Governor Andrew M. Cuomo." Governor Andrew M. Cuomo. N.p., n.d. Web.
29 Apr. 2013. <http://www.governor.ny.gov/press/07092012cyberbullying>.
"InternetSafety101.org: Statistics." InternetSafety101.org: Home. N.p., n.d. Web.
29 Apr. 2013.
<http://www.internetsafety101.org/cyberbullyingstatistics.htm#_ftnref>.
"What is Cyberbullying | StopBullying.gov." Home | StopBullying.gov. N.p., n.d.
Web. 27 Apr. 2013. <http://www.stopbullying.gov/cyberbullying/what-is-
it/index.html>.
"my Secure Cyberspace:." Cyberbullying. N.p., n.d. Web. 28 Apr. 2013.
<www.mysecurecyberspace.com/encyclopedia/index/cyberbullying.html>.

More Related Content

What's hot

Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying CarlosE15
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullyingMelissa
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingCoachElrod
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateMarian Merritt
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingQazi Anwar
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide sharebr03wood
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentationclifforddyyy
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentationSally Garza
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointHannahMorrell
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.jessy0121
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableKhy Amigable
 
bullying and the effects it has on students
bullying and the effects it has on studentsbullying and the effects it has on students
bullying and the effects it has on studentschris18
 

What's hot (20)

Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentation
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigable
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
bullying and the effects it has on students
bullying and the effects it has on studentsbullying and the effects it has on students
bullying and the effects it has on students
 
Cyber bullying vs traditional bullying
Cyber bullying vs traditional bullyingCyber bullying vs traditional bullying
Cyber bullying vs traditional bullying
 

Viewers also liked

Bullying virtual
Bullying virtualBullying virtual
Bullying virtualiesfa
 
Bullying apresentação
Bullying apresentaçãoBullying apresentação
Bullying apresentação-
 
Trabalho sobre bullying
Trabalho sobre bullyingTrabalho sobre bullying
Trabalho sobre bullyingjackzeus
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpointjosiebrookeday
 
Research thesis (effects of bullying)
Research thesis (effects of bullying)Research thesis (effects of bullying)
Research thesis (effects of bullying)frncsm13
 

Viewers also liked (10)

Bullying virtual
Bullying virtualBullying virtual
Bullying virtual
 
Bullying
BullyingBullying
Bullying
 
Bullying verbal
Bullying verbalBullying verbal
Bullying verbal
 
Microsoft Power Point Bullying
Microsoft Power Point   BullyingMicrosoft Power Point   Bullying
Microsoft Power Point Bullying
 
Bullying
BullyingBullying
Bullying
 
Bullying apresentação
Bullying apresentaçãoBullying apresentação
Bullying apresentação
 
Trabalho sobre bullying
Trabalho sobre bullyingTrabalho sobre bullying
Trabalho sobre bullying
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Research thesis (effects of bullying)
Research thesis (effects of bullying)Research thesis (effects of bullying)
Research thesis (effects of bullying)
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 

Similar to Cyberbullying

Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jfJohn Field
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big ProblemGail Rebuck
 
Stop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measuresStop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measureskanika sharma
 
Cabatian & Estrada 1
Cabatian & Estrada 1Cabatian & Estrada 1
Cabatian & Estrada 1Samphiriane
 
Cyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItCyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItFeliciaDixon5
 
Cyber-bullying
Cyber-bullyingCyber-bullying
Cyber-bullyinganwidener
 
Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By AnamikaGisha Mathyari
 
Social and Ethical Issues in the Digital Era Presentation
Social and Ethical Issues in the Digital Era Presentation Social and Ethical Issues in the Digital Era Presentation
Social and Ethical Issues in the Digital Era Presentation courtneyjohnson105
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullyingZiar Khan
 
MultiMedia Presentation
MultiMedia PresentationMultiMedia Presentation
MultiMedia PresentationAshlynnH
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullyingsepulvedamd
 

Similar to Cyberbullying (20)

Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jf
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big Problem
 
Bully
BullyBully
Bully
 
Stop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measuresStop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measures
 
Cabatian & Estrada 1
Cabatian & Estrada 1Cabatian & Estrada 1
Cabatian & Estrada 1
 
Symposium On Anti-Bullying In Schools
Symposium On Anti-Bullying In SchoolsSymposium On Anti-Bullying In Schools
Symposium On Anti-Bullying In Schools
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItCyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent It
 
Cyber-bullying
Cyber-bullyingCyber-bullying
Cyber-bullying
 
Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By Anamika
 
Social and Ethical Issues in the Digital Era Presentation
Social and Ethical Issues in the Digital Era Presentation Social and Ethical Issues in the Digital Era Presentation
Social and Ethical Issues in the Digital Era Presentation
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
MultiMedia Presentation
MultiMedia PresentationMultiMedia Presentation
MultiMedia Presentation
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Recently uploaded

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Cyberbullying

  • 2. What is “Cyberbullying”? “Cyberbullying is bullying that takes place using electronic technology. “
  • 3. Statistics The Harford County Examiner reported similarly concerning cyber bullying  statistics: • Around half of teens have been the victims of cyber bullying • Only 1 in 10 teens tells a parent if they have been a cyber bully victim • Fewer than 1 in 5 cyber bullying incidents are reported to law enforcement • 1 in 10 adolescents or teens have had embarrassing or damaging pictures taken of themselves without their permission, often using cell phone cameras • About 1 in 5 teens have posted or sent sexually suggestive or nude pictures of themselves to others
  • 4. Causes • revenge of other peers • for entertainment purposes • to boost their ego • to get a laugh from their peers • help bolster or remind people of their own social standing
  • 5. Effects •Undermining your confidence, self-esteem and sense of security •Affecting your performance and attendance at school •Causing stress and affecting your health •Affecting your professional reputation and career •Fueling prejudice in areas such as race, religion and sexuality •Leading to suicidal thoughts
  • 6. Who is affected? • Ages 15-17 • Females are about twice as likely as males to be victims and perpetrators of cyber bullying. • Males are more likely to be threatened by cyber bullies than females • Affects all races
  • 8. Technology’s Role • Over 80% of teens use a cell phone regularly, making it the most common medium for cyber bullying • Cyberbullying can happen 24 hours a day, 7 days a week • Cyberbullying messages and images can be posted anonymously and distributed quickly to a very wide audience. • Deleting inappropriate or harassing messages, texts, and pictures is extremely difficult after they have been posted or sent.
  • 9. How you can help! • Don’t engage in or support mean material, gossip, or rumors posted online, or talk about it • Support the victim being targeted online by posting positive messages! • Print the evidence to share with an authority
  • 10. Remember! • we are not invisible online, and anything we post can be traced back to us. Monitor your online reputation
  • 11. YOU have the power • If cyberbullying becomes severe and involves threats of violence, you should contact the police immediately. Some states have computer harassment laws to prosecute offenders.
  • 12. Governor Cuomo Signs Legislation to Help Protect Students from Cyberbullying • Requires Schools to Act When Cyberbullying Occurs • Ensures Proper Protocols Are in Place to Deal with Cyberbullying • Sets Training Requirements For School Employees to Help Identify and Prevent Cyberbullying
  • 13. Have you ever been a victim of cyberbullying? • A.)YES • B.) NO Source: http://samuelflinn.files.wordpress.com/2012/05/cyber- bullying-poster.jpg
  • 14. Resources Anti Bullying Campaigns and Programs: • The Great American NO BULL Challenge • Internet Safety 101 • Olweus Bullying Prevention Program • Stomp Out Bullying • Delete Digital Drama • Cyberbully411 • STOP Cyberbullying
  • 15. Sources " What are the effects of cyberbullying? | Cyberbullying | Teacher advice | Teachtoday." Teachtoday. N.p., n.d. Web. 28 Apr. 2013. <http://www.teachtoday.eu/en/Teacher- advice/Cyberbullying/What-are-the-effects-of-cyberbullying.aspx>. "Cyber Bullying Statistics - Bullying Statistics." Bullying Statistics ­ Teen Violence, Anger,  Bullying, Treatment Options. N.p., n.d. Web. 29 Apr. 2013. <http://www.bullyingstatistics.org/content/cyber-bullying-statistics.html>. "Cyberbullying Effects | End Of Bullying." EndofBullying.com. N.p., n.d. Web. 29 Apr. 2013. <http://endofbullying.com/cyberbullying-effects/>.
  • 16. Sources cont’d. "Governor Cuomo Signs Legislation to Help Protect Students from Cyberbullying | Governor Andrew M. Cuomo." Governor Andrew M. Cuomo. N.p., n.d. Web. 29 Apr. 2013. <http://www.governor.ny.gov/press/07092012cyberbullying>. "InternetSafety101.org: Statistics." InternetSafety101.org: Home. N.p., n.d. Web. 29 Apr. 2013. <http://www.internetsafety101.org/cyberbullyingstatistics.htm#_ftnref>. "What is Cyberbullying | StopBullying.gov." Home | StopBullying.gov. N.p., n.d. Web. 27 Apr. 2013. <http://www.stopbullying.gov/cyberbullying/what-is- it/index.html>. "my Secure Cyberspace:." Cyberbullying. N.p., n.d. Web. 28 Apr. 2013. <www.mysecurecyberspace.com/encyclopedia/index/cyberbullying.html>.

Editor's Notes

  1. http://www.stopbullying.gov/cyberbullying/what-is-it/index.html Examples of cyberbullying include: mean text messages or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles. Being a victim of cyberbullying can be a common and painful experience. Some youth who cyberbully: Pretend they are other people online to trick others Spread lies and rumors about victims Trick people into revealing personal information Send or forward private text messages, pictures, etc. Post pictures of victims without their consent Sending mean messages or threats to a person&apos;s email account or cell phone Spreading rumors online or through texts Posting hurtful or threatening messages on social networking sites or web pages Stealing a person&apos;s account information to break into their account and send damaging messages Pretending to be someone else online to hurt another person Taking unflattering pictures of a person and spreading them through cell phones or the Internet Sexting, or circulating sexually suggestive pictures or messages about a person
  2. Cyber world has become the new way to communicate in today&apos;s society People (students) in particular don’t think they can get caught Can lead to other devastating tragedies (school shootings, suicide, and other harm) http://www.bullyingstatistics.org/content/cyber-bullying-statistics.html
  3. The teen years can be cruel. Nearly everyone has been a part of some form of bullying during his or her lifetime, be it on the giving or receiving end. In general, cyber bullies have their own motives on why they are involved in cyber bullying. Some of their intentions have been identified as power, attention, retaliation, boredom, jealousy, and the pleasure of inflicting pain.
  4. Can have a lasting impression on you for the rest of your life
  5. Cyberbullying has become a prevalent problem globally Homosexual and bisexual teens are more likely to report bullying than heterosexual teens Students with disabilities are more likely to be the victims of bullying Females are more often the victims of bullying than males
  6. Tyler Clementi: jumped to his death from the George Washington Bridge. This occurred after a sexual encounter he had with a man in his dorm room was allegedly video streamed over the internet without Clementi&apos;s knowledge Jessica Logan: committed suicide after sexting a nude photo of herself to her boyfriend. When they broke up, he sent the photo to everyone else at her school. Jessica was cruelly harassed for months by the other girls at her school, Jessica Logan decided to tell her story on a Cincinnati television station. Her purpose was simple: “I just want to make sure no one else will have to go through this again.” The interview was in May 2008. Two months later, on July 3, 2008, Jessie attended the funeral of a boy who committed suicide, then came home and killed herself.
  7. The psychological and emotional outcomes of cyber bullying are similar to those of real-life bullying. The difference is, real-life bullying often ends when school ends. For cyber bullying, there is no escape. And, it’s getting worse. http://www.dosomething.org/tipsandtools/11-facts-about-cyber-bullying
  8. You may be able to sue a cyberbully or the bully&apos;s parents for damages if you can prove defamation, invasion of privacy, or intentional infliction of emotional distress. Damages can include money spent on counseling, limited college opportunities due to failing grades, etc.
  9. The new law goes into effect on July 1, 2013. The new law cracks down on cyberbullying through the following provisions: “ The new law is designed to strengthen a school&apos;s response to harassment and bullying through improved reporting, investigation, intervention, training and prevention. The new law requires schools to take action when students experience cyberbullying or other forms of harassment. It ensures that school districts take immediate steps to end harmful behavior, prevent recurrences, and ensure the safety of the targeted students. The legislation also establishes improved training to help teachers and administrators better prevent and respond to bullying and other harmful acts.” http://www.governor.ny.gov/press/07092012cyberbullying