• Like


Flash Player 9 (or above) is needed to view presentations.
We have detected that you do not have it on your computer. To install it, go here.

Draft for prezi and poster

Uploaded on


  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads


Total Views
On Slideshare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide


  • 1. The following content will be presented in the form of a Prezi and a poster.1. What is cyber bullying?Cyber bullying involves the use of Internet and communication technologies to deliberately andrepeatedly inflict harm on an individual or a group of people through harassment, embarrassmentand/or threats. (http://www.endcyberbullying.org/what-is-cyber-bullying/)Examples of cyber bullying:● Forwarding embarrassing picture, videos or messages without the consent of the owner.● Using a false identity to post hurtful entries on social networking sites.● Sending emails or text messages to harass others.2. Why does cyber bullying occur?● For revenge or out of anger● As a source of entertainment● Peer pressure● Being able to hide behind false identities, they are more bold to say things that they won’t say in person.● For the feeling of superiority● To garner attention● Cyber bullies do not see the impacts their actions can have on their victims.3. Is cyber bullying becoming a serious issue worldwide?● 12% of the parents surveyed by Ipsos for Reuters News say that their child has become a victim to cyber bullying.● 26% of them say that they know a child in their neighborhood who has been cyber bullied.● Another 60% say that the children are cyber bullied through social networking sites like Facebook.● 77% of the respondents say that parents and schools should give special attention to cyber bullying.● (Ipsos, 2012)4)Impacts of cyber bullying on the victims:● Poor performance at school● Turn to drugs and alcohol● Increase in truancy● Take revenge by becoming a cyber bullying themselves● Unable to deal with the situation, they might commit suicide● Decrease in confidence and self-esteem(http://www.stopbullying.gov/cyberbullying/what-is-it/index.html)(http://www.afp.gov.au/policing/cybercrime/~/media/afp/pdf/c/cyber-bullying-no-crops.ashx)
  • 2. 5) The role of social networking sites and lawmakersSocial networking sites:- Should social networking sites like Facebook be allowed to monitor their users’ activity on thesesites? Yes NoMany of the cyber bullying cases happen on Cyber bullying is a problem caused by oursocial networking sites. As a result, they society, so social networking sites shouldshould be proactive in solving the problem. not be the one who takes all the blame. It can only be solved if people are more ethical and are more aware of the consequences of cyber bullying.Personal victim: The bullying can be very If social networking sites are allowed tohurtful and it needs to stop. Social monitor, then it may be like living under Bignetworking sites should place more Brother. It violates our rights to freerestrictions to prevent cyber bullying from speech and privacy.happening. There could be some kind ofpunishment for users who misuse theiraccounts. For example, their account wouldbe terminated or they would be brought tocourt.Some social networking sites like Ask.fm Social networking sites already have a lot ofrefuses to be held accountable for their access to personal information. Having tousers’ posts on their sites. Users cannot monitor their users’ activities would provereport other users for harassment. too much of a burden to them. Education is the best way to address cyber bullying.People should have the right to feel safe We should be responsible for the friendswhen they are on social networking sites. that we make on social networking sites.Parents cannot monitor their children’s Social networking sites are not responsibleactivity on these sites 24/7. Therefore, for how their users interact with onethere should be more monitoring on social another. Parents should be the one who isnetworking sites to help deal with cyber responsible for educating their children sobullying. that they will use the Internet responsibly.Social networking sites are the major cause Social networking sites merely provide aof cyber bullying. On these sites, cyber medium for people from all around thebullies can choose to remain anonymous, world to communicate with each other.making them bolder to say hurtful things Any attempts to monitor the things postedonline. on these sites would infringe the users’ rights free speech. Websites should not be the one to judge something that may actually be a harmless joke.
  • 3. Social networking sites should use a bettersystem to check the real age of their users.If young people could be barred from usingthese sites, then cyber bullying would bereduced. It is not about responsibility, butbecause it is the right thing to do.
  • 4. What are social networking sites doing now?FacebookFacebook provides the option of reporting inappropriate posts by others, hiding stories, blockingunwanted contact, unfriending people and removing tags from embarrassing photos.
  • 5. YouTubeYouTube lets its users report any abusive comments and flag things that they considerinappropriate. “YouTube has a zero-tolerance policy for predatory behavior, stalking, threats andharassment and reacts to most flags in less than an hour,” according to Victoria Grand, Head ofCommunications and Community Policy, at YouTube.MySpaceMySpace lets parents report through e-mail and phone and responds within 24 hours. The ‘ContactMySpace’ tab and ‘Safety Tips’ tab allow parents to flag abusive posts.Role of lawmakersShould lawmakers do more to combat cyber bullying?It is difficult to draw the line between harassment and a mere joke. A
  • 6. In some countries, there are laws like the United States and Canada, have laws that deal with cyberbullying. However, some people feel that it is inadequate as cases of cyber bullying is still on therise. Certain countries like India and Malaysia do not have laws that address the crime of cyberbullying directly. As a result, many of the cyber bullies are not brought to the face of justice.Nevertheless, it is rather challenging for the government when dealing with such issues as poststhat are taken lightly by some would upset others. Besides, some are concern that laws which allowthe government to monitor the internet to track down cyber bullies might violate our rights tofree speech and privacy, like what happened in South Korea. There is an ensuing debate over theextent of government involvement when it comes to dealing with cyber bullying.In the ‘Global Perspectives’ section, I would be looking at how different countries deal with cyberbullying.http://jjie.org/resources/wp-content/uploads/2011/06/FOSI-Report-Cyberbullying-A-Global-Concern.pdfShould the government be allowed to monitor the internet or require users to register using theirreal identities to track down cyber bullies? Yes NoThis would force the citizens to become It would not be effective. Like in Southmore civilized online and would reduce Korea, people would just turn to a foreigncases of cyber bullying. service and stop using local social networking sites.It would be easier to track down cyber It infringes our right to free speech andbullies, as they cannot hide behind false privacy.identities.Create a safer environment for the citizens Governments monitoring the Internetas they can go online knowing that cyber would create a Big Brother society andbullies would leave them alone. people would be afraid to voice their opinions for fear of persecution.Discourages people from posting malicious This may become an excuse for theand defamatory comments online, hence government to discourage criticism of thereducing cases of suicide caused by cyber government and eventually lead tobullying. propaganda. Hackers may be able to obtain personal information by hacking the database of social networking sites.