SlideShare a Scribd company logo
1 of 33
CYBER BULLYING AND
PREVENTION
2
There is no single definition of
bullying and cyberbullying
agreed upon internationally
and at European level.
However, attempts to define
these phenomena have been
made by international
organizations, EU
institutions and academia.
2
WHAT IS CYBER BULLYING?
3
Bullying is generally understood
as an aggressive and
intentional act or behaviour
carried out by a group or an
individual repeatedly and over
time against a victim who
cannot easily defend him or
herself.
The term cyberbullying is used to
describe bullying taking place
on the internet mostly through
mobile phones and social
media. 3
WHAT IS CYBER BULLYING?
4
WHY IS IT SO IMPORTANT?

1/3 children has been a
victim of cyber-bullying.

Nearly half of suicides
among 10 to 14-year-
olds are due to bullying.

1 in 7 teachers is a victim
of cyber-bullying.
5
There are two kinds of Cyber Bullying...

Direct Attacks- messages
sent directly to the
victim.

Cyber Bullying by Proxy-
Using someone else to
cyber bully a victim, this
proxy may know they
are cyber bullying and
they may not.
6
Why do children Cyber Bully?

Anger

Frustration

Revenge

Entertainment

To get laughs or reactions

Power hungry

Because all motives for bullying are different so
are the solutions and responses
7
Elements characterizing cyberbullying
The use of electronic or
digital means
Intentional harm
Imbalance of power
Repetition
Sense of anonymity and
lack of accountability
Publicity
8
3 Key bullying characteristics are:
Bullying is intentional acts. Bullies
understands that their actions hurt
the other and they are doing it
deliberately.
Repetitive behavior. Just one
aggressive action is not bullying.
Bullying called such behavior, which
takes place systematically for some
time.
Bullying with striking psychological
or physical strength advantage.
Thus, the offended child feels
weaker than the perpetrators and
can not defend himself from them.
9
FORMS OF CYBERBULLYING
Behavior Definition
Exclusion the rejection of a person from an online group provoking his/her social marginalization
and exclusion
Online
harassment
the repetition of harassment behaviours on the net, including insults, mocking, slander,
menacing chain messages, denigrations, name calling, gossiping, abusive or hate-
related behaviours. Harassment differs from nuisance in light of its frequency. It can
also be featured as sexual harassment if it includes the spreading of sexual rumours, or
the commenting of the body, appearance, sex, gender of an individual.
Griefing the harassment of someone in a cyber-game or virtual word (e.g. ChatRoulette,
Formspring, etc.)
Flaming the online sending of violent or vulgar messages. It differentiates from harassment on
the basis that flaming is an online fight featured by anger and violence (e.g. use of
capital letter or images to make their point)
Trolling the persistent abusive comments on a website
10
FORMS OF CYBERBULLYING
Behavior Definition
Cyberstalking involves continual threatening and sending of rude messages.
Cyber - persecution continuous and repetitive harassment, denigration, insulting, and threats.
Masquerade a situation where a bully creates a fake identity to harass someone else.
Impersonation the impersonation of someone else to send malicious messages, as well as the
breaking into someone’s account to send messages, or like posts that will cause
embarrassment or damage to the person’s reputation and affect his/her social
Life.
11
EXTENT AND SCOPE OF THE PHENOMENOM
 A worldwide survey conducted in 2011 in 24 countries found that 66%
of the 18,687 interviewed people including children and adults, saw,
read or heard something about cyberbullying behaviours.
 In the USA, the Cyberbullying Research Center assessed that one out of
four teenagers has experienced cyberbullying and one out of six has
perpetrated cyberbullying.
 The 2014 EU Net Children Go Mobile Report showed that 12% of the
3,500 children aged 9-16 years old were cyberbullied. The 2011 EU Kids
Online report found that 6% of the 25,142 children between 9 and 16
years of age had been bullied online across Europe, and 3 % had carried
out cyberbullying.
12
MEANS USED
 Cyberbullying can be carried out through
different means, such as mobile devices,
internet, messaging (e.g. instant
messaging, chat programs,
text/audio/video programs, multimedia
messages, gaming devices and social
networks).
 Initial research in this area showed that
the most common channels to perpetrate
cyberbullying were phone calls and text
messages.
 However, the rapid pace of ICT innovation
determined changes in patterns.
Nowadays, cyberbullying is increasingly
performed through social networks
(mostly Facebook, followed by Twitter,
Instagram, Tumblr and YouTube)
13
VICTIMS
 Trends reflect a relationship between
age and frequency of victimization with
a higher number of victims in the group
of 13–15-year-old children.
 According to the Net Children Go Mobile
survey, which interviewed 3,500 children
of seven EU Member States, over the
period 2013–2014, children between 13
and 14 years of age were the most
affected by cyberbullying.
 Victims of cyberbullying tend to be
younger than the perpetrators.
 More than twice the number of teenage
girls being cyberbullied compared to
boys.
14
PERPETRATORS
 The few studies available at the international
level tend to indicate that older children are
more likely to perpetrate cyberbullying.
 Older children, 14 years old and above,
emerged as the majority of perpetrators and
their actions were perceived as rougher.
 Cyberbullying is generally equal for both
sexes. Although some studies suggest that
girls are perpetrators of cyberbullying as
much as boys, no conclusive evidence can be
drawn on this aspect.
 Girls are more involved in bullying online
than offline.
15
Cyber Bully Profile
Cyber Bullies:
High self image
Social competence
High relationship between
traditional and online bully
Lack of surveillance by
parents
16
Cyberbullying -VS- Bullying
Bullying Cyberbullying
Face – to - face 24 hours a day, 7 days a week, 365 days/yr
Can find a safe space or escape No safe space – hard to escape
Limited to onlookers Shared by wide audience – can go viral in a
matter of seconds
Bully can be identified Bully can be anonymous
Can see facial and body reaction of target
and onlookers
Harder to empathize with the target
No geographical limitations
The target can easily become the bully
Bullying online and offline seem also to be linked. Cyberbullying perpetrators are often involved
as victims or perpetrators in traditional bullying.
17
Consequences of Cyber Bullying

Anxiety

Sadness

Shame

Anger

Depression

Stress Related Disorders

Suicide

Low Self Esteem

Withdrawal from friends and activities

Changes in mood, behaviour and appetite

Emotional Distress during and after using
technology

Bullying others
18
Why is Cyberbullying so hurtful?
1. Permanence: The insults,
comments or images can be
preserved by the person who
was bullied or by others so
that the victim may read or
view them over and over
again and the harm is re-
inflicted with each reading or
viewing.
19
Why is Cyberbullying so hurtful?
2. Audience size: The
size of the audience
that is able to view or
access the damaging
material increases the
victim’s humiliation.
20
Why is Cyberbullying so hurtful?
3. Familiarity: many young
people are friends with or
know their cyber bully
either threw school or
other personal
connections, increasing
the potential for
embarrassment and
humiliation.
21
Why is Cyberbullying so hurtful?
4. Social Networking:
Social Networking sites
such as Facebook and
MySpace allow cyber
bullies to engage in
campaigns against a
particular person which
may involve many
others.
22
Why is Cyberbullying so hurtful?
5. Speed: The speed at
which harmful
messages can reach
large audiences also
plays a major part in
making cyberbullying
so damaging to the
targets.
23
Statistics

Around half of teens have been the
victims of cyber bullying.

Only 1 in 10 teens tells a parent if they
have been a cyber bully victim.

Fewer than 1 in 5 cyber bullying
incidents are reported to law
enforcement.

1 in 10 adolescents or teens have had
embarrassing or damaging pictures
taken of themselves without their
permission, often using cellphone
cameras.

About 1 in 5 teens have posted or sent
sexually suggestive or nude pictures of
themselves to others.
24
How to help prevent cyberbullying?

Block all
communication with
cyberbullies

Do not forward any
messages, comments,
etc. that involve
cyberbulling

Always report any
cyberbulling taking
place to an adult
25
Don’t Be a Victim!

Talk about bullying in general with friends,
teachers and family.

Discuss what personal information is
appropriate to tell others, and what is not.

Visit some popular teen sites with your
parents, teachers, or friends and discuss
what you see there and what could be a
danger.

Learn to develop realistic expectations for
both personal and on-line relationships.
26
Tips How to Stop a Cyberbully

Be private - keep passwords,
pictures and secrets to yourself.

Take five - don’t reply in anger.

Stop, block and tell - don’t reply,
block the sender, tell someone.

Save the evidence - on your
computer or print out.

Google yourself.
27
Steps to Take if you believe you have been a victim of
Cyberbullying

Determine if cyberbullying is actually
going on.

Save the evidence.

Identify the sender - contact your ISP
(Internet Service Provider) if necessary.

Contact the offender’s parents - who
may or may not be supportive.

Back up your remarks with written
evidence.

Contact your school.

Threats, extortion, sexual harassment
should be reported to the police.
28
Why Don’t Victims Ask for Help?

Kids view the Internet is
a lifeline to their peer
group.

Kids don’t want adults
to know they have a
problem with
cyberbullying because
they fear that adults will
take their computer
away.
29
How you can help!

Don’t engage in or support
mean material,gossip, or rumors
posted online, or talk about it.

Support the victim being
targeted online byposting
positive messages!

Print the evidence to share with
an authority.
30
Responsibility

There are no legal provisions aimed at
targeting cyberbullying.

In the absence of a specific criminal
offence for cyberbullying, all countries
address cyberbullying within the legal
framework of other offences in a broad
range of areas such as: violence; anti-
discrimination and computer-related
crimes.
31
Criminal code of the Republic of Lithuania

Art. 154. Libel
A person who spreads false information about another person that
could arouse contempt for this person or humiliate him or
undermine trust in him shall be punished by a fine or by
restriction of liberty or by arrest or by imprisonment for a term
of up to one year.

Art. 155. Insult
person who publicly humiliates a person in an abusive manner by an
action, word of mouth or in writing shall be punished by a fine
or by restriction of liberty or by arrest or by imprisonment for
a term of up to one year.

Art. 145. Threatening to Murder or Cause a Severe Health
Impairment to a Person or Terrorisation of a Person
A person who threatens to murder a person or cause a severe
health impairment to him, where there is a sufficient basis for
believing that the threat may be fulfilled shall be punished by
community service or by a fine or by restriction of liberty or by
arrest or by imprisonment for a term of up to two year.
32
Remember!
We are not invisible online, and anything we
post can be traced back to us.
Monitor your online reputation!
33
Thank you for your attention!
33
Mantas Struckas
Head of Public order Division
Alytus county police headquarters
2017.03.21

More Related Content

What's hot

Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying griehl
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpointjosiebrookeday
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentationSally Garza
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide sharebr03wood
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.jessy0121
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingpscl
 
Cyber crime
Cyber crimeCyber crime
Cyber crimedixitas
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...HDCH
 

What's hot (20)

Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 

Similar to CYBER BULLYING AND PREVENTION

Similar to CYBER BULLYING AND PREVENTION (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptx
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Cyberbullying_Presentation.pptx.pdf
Cyberbullying_Presentation.pptx.pdfCyberbullying_Presentation.pptx.pdf
Cyberbullying_Presentation.pptx.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
Olmv cyberbullying
Olmv cyberbullyingOlmv cyberbullying
Olmv cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Essays On Cyber Bullying
Essays On Cyber BullyingEssays On Cyber Bullying
Essays On Cyber Bullying
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptx
 
Cyberbullying and social media
Cyberbullying and social mediaCyberbullying and social media
Cyberbullying and social media
 

More from Apostolos Syropoulos

A Presentation of Braga. It was made by students of school
A Presentation of Braga. It was made by students of schoolA Presentation of Braga. It was made by students of school
A Presentation of Braga. It was made by students of schoolApostolos Syropoulos
 
A short presentation of Italy made by students of a school in Cosimo, Sicily,...
A short presentation of Italy made by students of a school in Cosimo, Sicily,...A short presentation of Italy made by students of a school in Cosimo, Sicily,...
A short presentation of Italy made by students of a school in Cosimo, Sicily,...Apostolos Syropoulos
 
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ Project
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ ProjectSocial Media Algorithms - Part of the "Computers in out Life" Erasmus+ Project
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ ProjectApostolos Syropoulos
 
A gentle introduction to Artificial Intelligence
A gentle introduction to Artificial IntelligenceA gentle introduction to Artificial Intelligence
A gentle introduction to Artificial IntelligenceApostolos Syropoulos
 
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu Mansion
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu MansionΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu Mansion
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu MansionApostolos Syropoulos
 
Το Ορφανοτροφείο Θηλέων Ξάνθης
Το Ορφανοτροφείο Θηλέων ΞάνθηςΤο Ορφανοτροφείο Θηλέων Ξάνθης
Το Ορφανοτροφείο Θηλέων ΞάνθηςApostolos Syropoulos
 
Το Αρχαιολογικό Μουσείο Αβδήρων
Το Αρχαιολογικό Μουσείο ΑβδήρωνΤο Αρχαιολογικό Μουσείο Αβδήρων
Το Αρχαιολογικό Μουσείο ΑβδήρωνApostolos Syropoulos
 
Ταφικά έθιμα στα αρχαία Άβδηρα
Ταφικά έθιμα στα αρχαία ΆβδηραΤαφικά έθιμα στα αρχαία Άβδηρα
Ταφικά έθιμα στα αρχαία ΆβδηραApostolos Syropoulos
 
Το ορφανοτροφείο της Ξάνθης
Το ορφανοτροφείο της ΞάνθηςΤο ορφανοτροφείο της Ξάνθης
Το ορφανοτροφείο της ΞάνθηςApostolos Syropoulos
 
Μικρασιατική κατατστροφή - Μέρος 3
Μικρασιατική κατατστροφή - Μέρος 3Μικρασιατική κατατστροφή - Μέρος 3
Μικρασιατική κατατστροφή - Μέρος 3Apostolos Syropoulos
 
Μικρασιατική κατατστροφή - Μέρος 2
Μικρασιατική κατατστροφή - Μέρος 2Μικρασιατική κατατστροφή - Μέρος 2
Μικρασιατική κατατστροφή - Μέρος 2Apostolos Syropoulos
 
Αφιέρωμα στη Μικρά Ασία
Αφιέρωμα στη Μικρά ΑσίαΑφιέρωμα στη Μικρά Ασία
Αφιέρωμα στη Μικρά ΑσίαApostolos Syropoulos
 
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptx
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptxΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptx
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptxApostolos Syropoulos
 
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing mathematical tex...
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing  mathematical tex...Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing  mathematical tex...
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing mathematical tex...Apostolos Syropoulos
 
Inflected Forms of Nouns and Adjectives
Inflected Forms of Nouns and AdjectivesInflected Forms of Nouns and Adjectives
Inflected Forms of Nouns and AdjectivesApostolos Syropoulos
 
Computational Thinking and...the Greek Alphabet
Computational Thinking and...the Greek AlphabetComputational Thinking and...the Greek Alphabet
Computational Thinking and...the Greek AlphabetApostolos Syropoulos
 
Το Αποτύπωμα του 1821 στον Τόπο μου
Το Αποτύπωμα του 1821 στον Τόπο μουΤο Αποτύπωμα του 1821 στον Τόπο μου
Το Αποτύπωμα του 1821 στον Τόπο μουApostolos Syropoulos
 
Παγκόσμια ημέρα της σταθεράς π=3,14...
Παγκόσμια ημέρα της σταθεράς π=3,14...Παγκόσμια ημέρα της σταθεράς π=3,14...
Παγκόσμια ημέρα της σταθεράς π=3,14...Apostolos Syropoulos
 

More from Apostolos Syropoulos (20)

A Presentation of Braga. It was made by students of school
A Presentation of Braga. It was made by students of schoolA Presentation of Braga. It was made by students of school
A Presentation of Braga. It was made by students of school
 
A short presentation of Italy made by students of a school in Cosimo, Sicily,...
A short presentation of Italy made by students of a school in Cosimo, Sicily,...A short presentation of Italy made by students of a school in Cosimo, Sicily,...
A short presentation of Italy made by students of a school in Cosimo, Sicily,...
 
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ Project
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ ProjectSocial Media Algorithms - Part of the "Computers in out Life" Erasmus+ Project
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ Project
 
A gentle introduction to Artificial Intelligence
A gentle introduction to Artificial IntelligenceA gentle introduction to Artificial Intelligence
A gentle introduction to Artificial Intelligence
 
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu Mansion
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu MansionΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu Mansion
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu Mansion
 
Το Ορφανοτροφείο Θηλέων Ξάνθης
Το Ορφανοτροφείο Θηλέων ΞάνθηςΤο Ορφανοτροφείο Θηλέων Ξάνθης
Το Ορφανοτροφείο Θηλέων Ξάνθης
 
Το Αρχαιολογικό Μουσείο Αβδήρων
Το Αρχαιολογικό Μουσείο ΑβδήρωνΤο Αρχαιολογικό Μουσείο Αβδήρων
Το Αρχαιολογικό Μουσείο Αβδήρων
 
Ταφικά έθιμα στα αρχαία Άβδηρα
Ταφικά έθιμα στα αρχαία ΆβδηραΤαφικά έθιμα στα αρχαία Άβδηρα
Ταφικά έθιμα στα αρχαία Άβδηρα
 
Το ορφανοτροφείο της Ξάνθης
Το ορφανοτροφείο της ΞάνθηςΤο ορφανοτροφείο της Ξάνθης
Το ορφανοτροφείο της Ξάνθης
 
Μικρασιατική κατατστροφή - Μέρος 3
Μικρασιατική κατατστροφή - Μέρος 3Μικρασιατική κατατστροφή - Μέρος 3
Μικρασιατική κατατστροφή - Μέρος 3
 
Μικρασιατική κατατστροφή - Μέρος 2
Μικρασιατική κατατστροφή - Μέρος 2Μικρασιατική κατατστροφή - Μέρος 2
Μικρασιατική κατατστροφή - Μέρος 2
 
Αφιέρωμα στη Μικρά Ασία
Αφιέρωμα στη Μικρά ΑσίαΑφιέρωμα στη Μικρά Ασία
Αφιέρωμα στη Μικρά Ασία
 
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptx
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptxΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptx
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptx
 
How to Convert Units of Measure
How to Convert Units of MeasureHow to Convert Units of Measure
How to Convert Units of Measure
 
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing mathematical tex...
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing  mathematical tex...Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing  mathematical tex...
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing mathematical tex...
 
Inflected Forms of Nouns and Adjectives
Inflected Forms of Nouns and AdjectivesInflected Forms of Nouns and Adjectives
Inflected Forms of Nouns and Adjectives
 
Learning Simple Phrases in Greek
Learning Simple Phrases in GreekLearning Simple Phrases in Greek
Learning Simple Phrases in Greek
 
Computational Thinking and...the Greek Alphabet
Computational Thinking and...the Greek AlphabetComputational Thinking and...the Greek Alphabet
Computational Thinking and...the Greek Alphabet
 
Το Αποτύπωμα του 1821 στον Τόπο μου
Το Αποτύπωμα του 1821 στον Τόπο μουΤο Αποτύπωμα του 1821 στον Τόπο μου
Το Αποτύπωμα του 1821 στον Τόπο μου
 
Παγκόσμια ημέρα της σταθεράς π=3,14...
Παγκόσμια ημέρα της σταθεράς π=3,14...Παγκόσμια ημέρα της σταθεράς π=3,14...
Παγκόσμια ημέρα της σταθεράς π=3,14...
 

Recently uploaded

Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxBipin Adhikari
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 

Recently uploaded (20)

Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptx
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 

CYBER BULLYING AND PREVENTION

  • 2. 2 There is no single definition of bullying and cyberbullying agreed upon internationally and at European level. However, attempts to define these phenomena have been made by international organizations, EU institutions and academia. 2 WHAT IS CYBER BULLYING?
  • 3. 3 Bullying is generally understood as an aggressive and intentional act or behaviour carried out by a group or an individual repeatedly and over time against a victim who cannot easily defend him or herself. The term cyberbullying is used to describe bullying taking place on the internet mostly through mobile phones and social media. 3 WHAT IS CYBER BULLYING?
  • 4. 4 WHY IS IT SO IMPORTANT?  1/3 children has been a victim of cyber-bullying.  Nearly half of suicides among 10 to 14-year- olds are due to bullying.  1 in 7 teachers is a victim of cyber-bullying.
  • 5. 5 There are two kinds of Cyber Bullying...  Direct Attacks- messages sent directly to the victim.  Cyber Bullying by Proxy- Using someone else to cyber bully a victim, this proxy may know they are cyber bullying and they may not.
  • 6. 6 Why do children Cyber Bully?  Anger  Frustration  Revenge  Entertainment  To get laughs or reactions  Power hungry  Because all motives for bullying are different so are the solutions and responses
  • 7. 7 Elements characterizing cyberbullying The use of electronic or digital means Intentional harm Imbalance of power Repetition Sense of anonymity and lack of accountability Publicity
  • 8. 8 3 Key bullying characteristics are: Bullying is intentional acts. Bullies understands that their actions hurt the other and they are doing it deliberately. Repetitive behavior. Just one aggressive action is not bullying. Bullying called such behavior, which takes place systematically for some time. Bullying with striking psychological or physical strength advantage. Thus, the offended child feels weaker than the perpetrators and can not defend himself from them.
  • 9. 9 FORMS OF CYBERBULLYING Behavior Definition Exclusion the rejection of a person from an online group provoking his/her social marginalization and exclusion Online harassment the repetition of harassment behaviours on the net, including insults, mocking, slander, menacing chain messages, denigrations, name calling, gossiping, abusive or hate- related behaviours. Harassment differs from nuisance in light of its frequency. It can also be featured as sexual harassment if it includes the spreading of sexual rumours, or the commenting of the body, appearance, sex, gender of an individual. Griefing the harassment of someone in a cyber-game or virtual word (e.g. ChatRoulette, Formspring, etc.) Flaming the online sending of violent or vulgar messages. It differentiates from harassment on the basis that flaming is an online fight featured by anger and violence (e.g. use of capital letter or images to make their point) Trolling the persistent abusive comments on a website
  • 10. 10 FORMS OF CYBERBULLYING Behavior Definition Cyberstalking involves continual threatening and sending of rude messages. Cyber - persecution continuous and repetitive harassment, denigration, insulting, and threats. Masquerade a situation where a bully creates a fake identity to harass someone else. Impersonation the impersonation of someone else to send malicious messages, as well as the breaking into someone’s account to send messages, or like posts that will cause embarrassment or damage to the person’s reputation and affect his/her social Life.
  • 11. 11 EXTENT AND SCOPE OF THE PHENOMENOM  A worldwide survey conducted in 2011 in 24 countries found that 66% of the 18,687 interviewed people including children and adults, saw, read or heard something about cyberbullying behaviours.  In the USA, the Cyberbullying Research Center assessed that one out of four teenagers has experienced cyberbullying and one out of six has perpetrated cyberbullying.  The 2014 EU Net Children Go Mobile Report showed that 12% of the 3,500 children aged 9-16 years old were cyberbullied. The 2011 EU Kids Online report found that 6% of the 25,142 children between 9 and 16 years of age had been bullied online across Europe, and 3 % had carried out cyberbullying.
  • 12. 12 MEANS USED  Cyberbullying can be carried out through different means, such as mobile devices, internet, messaging (e.g. instant messaging, chat programs, text/audio/video programs, multimedia messages, gaming devices and social networks).  Initial research in this area showed that the most common channels to perpetrate cyberbullying were phone calls and text messages.  However, the rapid pace of ICT innovation determined changes in patterns. Nowadays, cyberbullying is increasingly performed through social networks (mostly Facebook, followed by Twitter, Instagram, Tumblr and YouTube)
  • 13. 13 VICTIMS  Trends reflect a relationship between age and frequency of victimization with a higher number of victims in the group of 13–15-year-old children.  According to the Net Children Go Mobile survey, which interviewed 3,500 children of seven EU Member States, over the period 2013–2014, children between 13 and 14 years of age were the most affected by cyberbullying.  Victims of cyberbullying tend to be younger than the perpetrators.  More than twice the number of teenage girls being cyberbullied compared to boys.
  • 14. 14 PERPETRATORS  The few studies available at the international level tend to indicate that older children are more likely to perpetrate cyberbullying.  Older children, 14 years old and above, emerged as the majority of perpetrators and their actions were perceived as rougher.  Cyberbullying is generally equal for both sexes. Although some studies suggest that girls are perpetrators of cyberbullying as much as boys, no conclusive evidence can be drawn on this aspect.  Girls are more involved in bullying online than offline.
  • 15. 15 Cyber Bully Profile Cyber Bullies: High self image Social competence High relationship between traditional and online bully Lack of surveillance by parents
  • 16. 16 Cyberbullying -VS- Bullying Bullying Cyberbullying Face – to - face 24 hours a day, 7 days a week, 365 days/yr Can find a safe space or escape No safe space – hard to escape Limited to onlookers Shared by wide audience – can go viral in a matter of seconds Bully can be identified Bully can be anonymous Can see facial and body reaction of target and onlookers Harder to empathize with the target No geographical limitations The target can easily become the bully Bullying online and offline seem also to be linked. Cyberbullying perpetrators are often involved as victims or perpetrators in traditional bullying.
  • 17. 17 Consequences of Cyber Bullying  Anxiety  Sadness  Shame  Anger  Depression  Stress Related Disorders  Suicide  Low Self Esteem  Withdrawal from friends and activities  Changes in mood, behaviour and appetite  Emotional Distress during and after using technology  Bullying others
  • 18. 18 Why is Cyberbullying so hurtful? 1. Permanence: The insults, comments or images can be preserved by the person who was bullied or by others so that the victim may read or view them over and over again and the harm is re- inflicted with each reading or viewing.
  • 19. 19 Why is Cyberbullying so hurtful? 2. Audience size: The size of the audience that is able to view or access the damaging material increases the victim’s humiliation.
  • 20. 20 Why is Cyberbullying so hurtful? 3. Familiarity: many young people are friends with or know their cyber bully either threw school or other personal connections, increasing the potential for embarrassment and humiliation.
  • 21. 21 Why is Cyberbullying so hurtful? 4. Social Networking: Social Networking sites such as Facebook and MySpace allow cyber bullies to engage in campaigns against a particular person which may involve many others.
  • 22. 22 Why is Cyberbullying so hurtful? 5. Speed: The speed at which harmful messages can reach large audiences also plays a major part in making cyberbullying so damaging to the targets.
  • 23. 23 Statistics  Around half of teens have been the victims of cyber bullying.  Only 1 in 10 teens tells a parent if they have been a cyber bully victim.  Fewer than 1 in 5 cyber bullying incidents are reported to law enforcement.  1 in 10 adolescents or teens have had embarrassing or damaging pictures taken of themselves without their permission, often using cellphone cameras.  About 1 in 5 teens have posted or sent sexually suggestive or nude pictures of themselves to others.
  • 24. 24 How to help prevent cyberbullying?  Block all communication with cyberbullies  Do not forward any messages, comments, etc. that involve cyberbulling  Always report any cyberbulling taking place to an adult
  • 25. 25 Don’t Be a Victim!  Talk about bullying in general with friends, teachers and family.  Discuss what personal information is appropriate to tell others, and what is not.  Visit some popular teen sites with your parents, teachers, or friends and discuss what you see there and what could be a danger.  Learn to develop realistic expectations for both personal and on-line relationships.
  • 26. 26 Tips How to Stop a Cyberbully  Be private - keep passwords, pictures and secrets to yourself.  Take five - don’t reply in anger.  Stop, block and tell - don’t reply, block the sender, tell someone.  Save the evidence - on your computer or print out.  Google yourself.
  • 27. 27 Steps to Take if you believe you have been a victim of Cyberbullying  Determine if cyberbullying is actually going on.  Save the evidence.  Identify the sender - contact your ISP (Internet Service Provider) if necessary.  Contact the offender’s parents - who may or may not be supportive.  Back up your remarks with written evidence.  Contact your school.  Threats, extortion, sexual harassment should be reported to the police.
  • 28. 28 Why Don’t Victims Ask for Help?  Kids view the Internet is a lifeline to their peer group.  Kids don’t want adults to know they have a problem with cyberbullying because they fear that adults will take their computer away.
  • 29. 29 How you can help!  Don’t engage in or support mean material,gossip, or rumors posted online, or talk about it.  Support the victim being targeted online byposting positive messages!  Print the evidence to share with an authority.
  • 30. 30 Responsibility  There are no legal provisions aimed at targeting cyberbullying.  In the absence of a specific criminal offence for cyberbullying, all countries address cyberbullying within the legal framework of other offences in a broad range of areas such as: violence; anti- discrimination and computer-related crimes.
  • 31. 31 Criminal code of the Republic of Lithuania  Art. 154. Libel A person who spreads false information about another person that could arouse contempt for this person or humiliate him or undermine trust in him shall be punished by a fine or by restriction of liberty or by arrest or by imprisonment for a term of up to one year.  Art. 155. Insult person who publicly humiliates a person in an abusive manner by an action, word of mouth or in writing shall be punished by a fine or by restriction of liberty or by arrest or by imprisonment for a term of up to one year.  Art. 145. Threatening to Murder or Cause a Severe Health Impairment to a Person or Terrorisation of a Person A person who threatens to murder a person or cause a severe health impairment to him, where there is a sufficient basis for believing that the threat may be fulfilled shall be punished by community service or by a fine or by restriction of liberty or by arrest or by imprisonment for a term of up to two year.
  • 32. 32 Remember! We are not invisible online, and anything we post can be traced back to us. Monitor your online reputation!
  • 33. 33 Thank you for your attention! 33 Mantas Struckas Head of Public order Division Alytus county police headquarters 2017.03.21

Editor's Notes

  1. Cyberbullying corresponds, thus, to an equally aggressive and intentional act, carried out through the use of information and communications technologies (ICTs). Bullying off and online usually involves the following key participants: the perpetrator, the victim and bystanders. Bystanders are those who see what is happening between the bully and the victim but they are not directly involved in the bullying. Cyberbullying has greatly increased in recent years bolstered by the growth of social media and taking new forms such as mockery, insults, threats, rumours, gossip, disagreeable comments, slander, etc. The geographical and temporal scope of cyberbullying is almost unlimited. Due to the means used, cyberbullying can take place everywhere and at any time as it may occur inside or outside schools and homes.
  2. The use of electronic or digital means through which the abuse is perpetrated; Intentional harm, which represents the intention of the perpetrator to inflict harm on the victim putting in place unpleasant and distressing behaviours against him; Imbalance of power, which is the advantage of the perpetrator over the victim, where the latter cannot easily defend him/herself77. Although some scholars consider this element hard to align with cyberbullying due to the fact that both the victim and the perpetrator may have advanced ICTs skills78, the imbalance of power is still considered to be present in cyberbullying since the bully holds a dominant position compared to the victim at least at psychological level. Therefore, while recognizing the complexity of measuring the imbalance of power online, some scholars stress the need to assess the difficulty of the victim to defend him/herself on a case-by-case basis. Repetition which should be interpreted as the possibility to quickly share harmful content with a broad audience in a virtual environment80 with one single action. Moreover, harmful content can be reposted, shared, or liked81 causing significant harm to the victim even without the repetition of the act over time82.  Sense of anonymity and lack of accountability which refer to the possibility for the perpetrator to remain anonymous and the feeling of not being accountable for his/her own actions. Anonymity may intensify the negative perception of the act by the victim who feels powerless as a result of not knowing where the attack comes from. For some authors, anonymity may reduce the need for an imbalance of power as a criterion for defining cyberbullying due to the fact that not knowing where the attack comes from puts the cyberbully in a powerful position compared to that of the victim84. Moreover, the perceived anonymity of the online environment encourages adolescents to act in ways they would not in face-to-face interactions. Therefore, anonymity may empower those who are unlikely to carry out traditional bullying to perpetrate bullying online.  Publicity which refers to the ability of cyberbullying actions to be accessible to multiple people exponentially increasing the breadth of the audience (i.e. the cyberbullying action may register numerous views by bystanders).