SlideShare a Scribd company logo
1 of 11
Cyberbullying is any harassment that occurs via the
Internet. Vicious forum posts, name calling in chat rooms, posting
fake profiles on web sites, and mean or cruel email messages are all
ways of cyberbullying.
Because their motives differ, the solutions and responses to each type of
cyberbullying incident has to differ too. Unfortunately, there is no "one size fits
all" when cyberbullying is concerned. Only two of the types of cyberbullies have
something in common with the traditional schoolyard bully. Experts who
understand schoolyard bullying often misunderstand cyberbullying, thinking it is
just another method of bullying. But the motives and the nature of
cybercommunications, as well as the demographic and profile of a cyberbully
differ from their offline counterpart.
There are two kinds of cyberbullying, direct attacks (messages sent to your
kids directly) and cyberbullying by proxy (using others to help cyberbully the
victim, either with or without the accomplice's knowledge). Because
cyberbullying by proxy often gets adults involved in the harassment, it is much
more dangerous.
Education can help considerably in preventing and dealing with the
consequences of cyberbullying. The first place to begin an education campaign
is with the kids and teens themselves. We need to address ways they can
become inadvertent cyberbullies, how to be accountable for their actions and
not to stand by and allow bullying (in any form) to be acceptable. We need to
teach them not to ignore the pain of others.
Teaching kids to “Take 5!” before responding to something they encounter
online is a good place to start. Jokingly, we tell them to “Drop the Mouse! And
step away from the computer and no one will get hurt!” We then encourage
them to find ways to help them calm down. This may include doing yoga, or
deep-breathing. It may include running, playing catch or shooting hoops. It
may involve taking a bath, hugging a stuffed animal or talking on the phone
with friends.
Cyberbullying
Cyberbullying
Cyberbullying
Cyberbullying
Cyberbullying
Cyberbullying

More Related Content

What's hot

Bullying and Cyber bullying explained
Bullying and Cyber bullying explained  Bullying and Cyber bullying explained
Bullying and Cyber bullying explained sebt32
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingsamhauck
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.jessy0121
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentationSally Garza
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointshannonmf
 
Cyber bullying project
Cyber bullying projectCyber bullying project
Cyber bullying projectvolpila
 
Cyber Wellness Power point slides
Cyber Wellness Power point slidesCyber Wellness Power point slides
Cyber Wellness Power point slidesguest7e2cdf
 
The Impact Of Cyberbullying On Its Victims And
The Impact Of Cyberbullying On Its Victims AndThe Impact Of Cyberbullying On Its Victims And
The Impact Of Cyberbullying On Its Victims Andso_f1y
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingJoe Gauder
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpointjosiebrookeday
 
Cyberbullying project
Cyberbullying projectCyberbullying project
Cyberbullying projectJoannaNieves
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingkntrainer
 

What's hot (20)

Edp 279 unit 2.4
Edp 279 unit 2.4Edp 279 unit 2.4
Edp 279 unit 2.4
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Bullying and Cyber bullying explained
Bullying and Cyber bullying explained  Bullying and Cyber bullying explained
Bullying and Cyber bullying explained
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentation
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 
Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyber bullying project
Cyber bullying projectCyber bullying project
Cyber bullying project
 
Cyber Wellness Power point slides
Cyber Wellness Power point slidesCyber Wellness Power point slides
Cyber Wellness Power point slides
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
The Impact Of Cyberbullying On Its Victims And
The Impact Of Cyberbullying On Its Victims AndThe Impact Of Cyberbullying On Its Victims And
The Impact Of Cyberbullying On Its Victims And
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Ethics and cyber bullying
Ethics and cyber bullyingEthics and cyber bullying
Ethics and cyber bullying
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
 
Cyberbullying project
Cyberbullying projectCyberbullying project
Cyberbullying project
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 

Viewers also liked

Viewers also liked (8)

Introductie selectiedag knrm lifeguards
Introductie selectiedag knrm lifeguardsIntroductie selectiedag knrm lifeguards
Introductie selectiedag knrm lifeguards
 
What's the Deal with Phing?
What's the Deal with Phing?What's the Deal with Phing?
What's the Deal with Phing?
 
ENTREPRENEURSHIP, COLLABORATION, NETWORKING
ENTREPRENEURSHIP, COLLABORATION, NETWORKINGENTREPRENEURSHIP, COLLABORATION, NETWORKING
ENTREPRENEURSHIP, COLLABORATION, NETWORKING
 
Computer class
Computer classComputer class
Computer class
 
Evlilik-Manifestosu1
Evlilik-Manifestosu1Evlilik-Manifestosu1
Evlilik-Manifestosu1
 
Introduction to Zend Framework
Introduction to Zend FrameworkIntroduction to Zend Framework
Introduction to Zend Framework
 
Maruti
Maruti Maruti
Maruti
 
Presentation2
Presentation2Presentation2
Presentation2
 

Similar to Cyberbullying

Cyberbullyng: Causes, Effects, and Possible Solutions
Cyberbullyng: Causes, Effects, and Possible SolutionsCyberbullyng: Causes, Effects, and Possible Solutions
Cyberbullyng: Causes, Effects, and Possible SolutionsJericoDiola
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullyingseswear9388
 
Cyberbullying- Lacson, Espinosa.pdf
Cyberbullying- Lacson, Espinosa.pdfCyberbullying- Lacson, Espinosa.pdf
Cyberbullying- Lacson, Espinosa.pdfYnigoXaviLacson
 
Adrian y santiago cyberbulying
Adrian y santiago cyberbulying Adrian y santiago cyberbulying
Adrian y santiago cyberbulying dk_10
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaasofisalazar00
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying estegiulimazziotti96
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngmiliarguelles1
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaamiliarguelles
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngmiliarguelles1
 
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxIs Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxchristiandean12115
 
Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Joyce Hirsh
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying griehl
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullyingZiar Khan
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican GuardApostolos Syropoulos
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
SOCIAL MEDIA AWARENESS MONTH
SOCIAL MEDIA AWARENESS MONTHSOCIAL MEDIA AWARENESS MONTH
SOCIAL MEDIA AWARENESS MONTHCBD College
 

Similar to Cyberbullying (20)

Cyberbullyng: Causes, Effects, and Possible Solutions
Cyberbullyng: Causes, Effects, and Possible SolutionsCyberbullyng: Causes, Effects, and Possible Solutions
Cyberbullyng: Causes, Effects, and Possible Solutions
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
 
Cyberbullying- Lacson, Espinosa.pdf
Cyberbullying- Lacson, Espinosa.pdfCyberbullying- Lacson, Espinosa.pdf
Cyberbullying- Lacson, Espinosa.pdf
 
Adrian y santiago cyberbulying
Adrian y santiago cyberbulying Adrian y santiago cyberbulying
Adrian y santiago cyberbulying
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying este
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxIs Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
 
Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican Guard
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
SOCIAL MEDIA AWARENESS MONTH
SOCIAL MEDIA AWARENESS MONTHSOCIAL MEDIA AWARENESS MONTH
SOCIAL MEDIA AWARENESS MONTH
 
Essays On Cyber Bullying
Essays On Cyber BullyingEssays On Cyber Bullying
Essays On Cyber Bullying
 
Bullying
BullyingBullying
Bullying
 

More from Tomi Mirra

Trabajo Practico 2
Trabajo Practico 2Trabajo Practico 2
Trabajo Practico 2Tomi Mirra
 
Trabajo Practico 9
Trabajo Practico 9Trabajo Practico 9
Trabajo Practico 9Tomi Mirra
 
Trabajo practico 5
Trabajo practico 5Trabajo practico 5
Trabajo practico 5Tomi Mirra
 
Trabajo practico n°5
Trabajo practico n°5Trabajo practico n°5
Trabajo practico n°5Tomi Mirra
 
Trabajo practico 3
Trabajo practico 3Trabajo practico 3
Trabajo practico 3Tomi Mirra
 
Trabajo practico 2
Trabajo practico 2Trabajo practico 2
Trabajo practico 2Tomi Mirra
 
Trabajo practico 1
Trabajo practico 1Trabajo practico 1
Trabajo practico 1Tomi Mirra
 
Trabajo practico1
Trabajo practico1 Trabajo practico1
Trabajo practico1 Tomi Mirra
 
Trabajo practio4
Trabajo practio4 Trabajo practio4
Trabajo practio4 Tomi Mirra
 
Trabaj practico 2
Trabaj practico 2Trabaj practico 2
Trabaj practico 2Tomi Mirra
 

More from Tomi Mirra (10)

Trabajo Practico 2
Trabajo Practico 2Trabajo Practico 2
Trabajo Practico 2
 
Trabajo Practico 9
Trabajo Practico 9Trabajo Practico 9
Trabajo Practico 9
 
Trabajo practico 5
Trabajo practico 5Trabajo practico 5
Trabajo practico 5
 
Trabajo practico n°5
Trabajo practico n°5Trabajo practico n°5
Trabajo practico n°5
 
Trabajo practico 3
Trabajo practico 3Trabajo practico 3
Trabajo practico 3
 
Trabajo practico 2
Trabajo practico 2Trabajo practico 2
Trabajo practico 2
 
Trabajo practico 1
Trabajo practico 1Trabajo practico 1
Trabajo practico 1
 
Trabajo practico1
Trabajo practico1 Trabajo practico1
Trabajo practico1
 
Trabajo practio4
Trabajo practio4 Trabajo practio4
Trabajo practio4
 
Trabaj practico 2
Trabaj practico 2Trabaj practico 2
Trabaj practico 2
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Cyberbullying

  • 1.
  • 2. Cyberbullying is any harassment that occurs via the Internet. Vicious forum posts, name calling in chat rooms, posting fake profiles on web sites, and mean or cruel email messages are all ways of cyberbullying.
  • 3. Because their motives differ, the solutions and responses to each type of cyberbullying incident has to differ too. Unfortunately, there is no "one size fits all" when cyberbullying is concerned. Only two of the types of cyberbullies have something in common with the traditional schoolyard bully. Experts who understand schoolyard bullying often misunderstand cyberbullying, thinking it is just another method of bullying. But the motives and the nature of cybercommunications, as well as the demographic and profile of a cyberbully differ from their offline counterpart.
  • 4. There are two kinds of cyberbullying, direct attacks (messages sent to your kids directly) and cyberbullying by proxy (using others to help cyberbully the victim, either with or without the accomplice's knowledge). Because cyberbullying by proxy often gets adults involved in the harassment, it is much more dangerous.
  • 5. Education can help considerably in preventing and dealing with the consequences of cyberbullying. The first place to begin an education campaign is with the kids and teens themselves. We need to address ways they can become inadvertent cyberbullies, how to be accountable for their actions and not to stand by and allow bullying (in any form) to be acceptable. We need to teach them not to ignore the pain of others. Teaching kids to “Take 5!” before responding to something they encounter online is a good place to start. Jokingly, we tell them to “Drop the Mouse! And step away from the computer and no one will get hurt!” We then encourage them to find ways to help them calm down. This may include doing yoga, or deep-breathing. It may include running, playing catch or shooting hoops. It may involve taking a bath, hugging a stuffed animal or talking on the phone with friends.