SlideShare a Scribd company logo
1 of 26
CYBER BULLYING
AND
INTERNET ADDICTION
CYBERBULLYING
• Cyberbullying or cyberharassment is a form of bullying or harassment using
electronic means. It has become increasingly common, especially among
teenagers. Harmful bullying behavior can include posting rumors, threats, sexual
remarks, a victims' personal information, or pejorative labels (i.e., hate
speech). Bullying or harassment can be identified by repeated behavior and an
intent to harm. Victims may have lower self-esteem, increased suicidal ideation, and
a variety of emotional responses, including being scared, frustrated, angry, and
depressed. Cyberbullying may be more harmful than traditional bullying.
DEFINITIONS
• A frequently used definition of cyberbullying is "an aggressive, intentional act or behavior
that is carried out by a group or an individual, using electronic forms of contact, repeatedly
and over time against a victim who cannot easily defend him or herself." There are many
variations of the definition, such as the National Crime Prevention Council's more specific
definition: "the process of using the Internet, cell phones or other devices to send or post
text or images intended to hurt or embarrass another person."
• Cyberbullying is often similar to traditional bullying, with some notable distinctions. Victims
of cyberbullying may not know the identity of their bully, or why the bully is targeting them.
The harassment can have wide-reaching effects on the victim, as the content used to harass
the victim can be spread and shared easily among many people and often remains
accessible long after the initial incident.
• The terms "cyberharassment" and "cyberbullying" are sometimes used synonymously,
though some people use the latter to refer specifically to harassment among minors or in a
school setting.
FURTHER INFORMATION…..
Cyberstalking
• Cyberstalking is a form of online
harassment in which the perpetrator uses
electronic communications to stalk a victim.
This is considered more dangerous than
other forms of cyberbullying because it
generally involves a credible threat to the
victim's safety. Cyberstalkers may send
repeated messages intended to threaten or
harass. They may encourage others to do
the same, either explicitly or by
impersonating their victim and asking
others to contact them.
Trolling
• Cyberstalking is a form of online
harassment in which the perpetrator uses
electronic communications to stalk a victim.
This is considered more dangerous than
other forms of cyberbullying because it
generally involves a credible threat to the
victim's safety. Cyberstalkers may send
repeated messages intended to threaten or
harass. They may encourage others to do
the same, either explicitly or by
impersonating their victim and asking
others to contact them.
METHODS USED
In social media
Cyberbullying can take place on social
media sites such as Facebook, Myspace,
and Twitter. "By 2008, 93% of young
people between the ages of 12 and 17
were online. In fact, youth spend more
time with media than any single other
activity besides sleeping." The last
decade has witnessed a surge of
cyberbullying, bullying that occurs
through the use of electronic
communication technologies, such as e-
mail, instant messaging, social media,
online gaming, or through digital
messages or images sent to a cellular
phone.
In gaming
Of those who reported having
experienced online harassment in a Pew
Research poll, 16% said the most recent
incident had occurred in an online
game.] A study from National Sun Yat-
sen University observed that children
who enjoyed violent video games were
significantly more likely to both
experience and perpetrate cyberbullying
In search engines
Information cascades happen when users
start passing along information they
assume to be true, but cannot know to
be true, based on information on what
other users are doing. This can be
accelerated by search engines' ranking
technologies and their tendency to return
results relevant to a user's previous
interests. This type of information
spreading is hard to stop. Information
cascades over social media and the
Internet may also be harmless, and may
contain truthful information
LAW ENFORCEMENT
A majority of states have laws that explicitly include electronic forms of communication
within stalking or harassment laws. Most law enforcement agencies have cyber-crime
units, and Internet stalking is often treated with more seriousness than reports of
physical stalking. Help and resources can be searched by state or area.
• The safety of schools is increasingly
becoming a focus of state legislative action.
There was an increase in cyberbullying
enacted legislation between 2006 and
2010. Initiatives and curriclulum requirements
also exist in the UK (the Ofsted eSafety
guidance) and Australia (Overarching
Learning Outcome 13).
Protection
• There are laws that only address online
harassment of children or focus on child
predators, as well as laws that protect adult
cyberstalking victims, or victims of any age.
Currently, there are 45 cyberstalking (and
related) laws on the books. While some sites
specialize in laws that protect victims age 18
and under, Working to Halt Online Abuse is a
help resource containing a list of current and
pending cyberstalking-related United States
federal and state laws. It also lists those states
that do not yet have laws, and related laws
from other countries. The Global Cyber Law
Database (GCLD) aims to become the most
comprehensive and authoritative source of
cyber laws for all countries.
Schools
Age
• Children report negative online behaviours
occurring from the second grade.
According to research, boys initiate
negative online activity earlier than girls.
However, by middle school, girls are more
likely to engage in cyberbullying than
boys. Whether the bully is male or female,
the purpose is to intentionally embarrass,
harass, intimidate, or make threats online.
Adults
• Cyberstalking may be an extension of
physical stalking, and may have criminal
consequences. A target's understanding of
why cyberstalking is happening is helpful
to remedy and take protective action.
Among factors that motivate stalkers
are envy, pathological obsession
(professional or sexual), unemployment or
failure with own job or life, or the desire to
intimidate and cause others to feel inferior.
The stalker may be delusional and believe
he/she "knows" the target. The stalker
wants to instill fear in a person to justify
his/her status, or may believe they can get
away with these actions (anonymity).[
HARMFUL EFFECTS
Research has demonstrated a number of serious consequences of cyberbullying
victimization. Victims may have lower self-esteem, increased suicidal ideation, and a variety of
emotional responses, including being scared, frustrated, angry, and depressed. Cyberbullying
may be more harmful than traditional bullying, because there is no escaping it. One of the most
damaging effects is that a victim begins to avoid friends and activities, which is often the very
intention of the bully.
Cyberbullying campaigns are sometimes so damaging that victims have committed suicide.
There are at least four examples in the United States in which cyberbullying has been linked to
the suicide of a teenager. The suicide of Megan Meier is a recent example that led to the
conviction of the adult perpetrator of the attacks. Holly Grogan committed suicide by jumping
off a 30-foot bridge near Gloucester in the UK. It was reported that a number of her schoolmates
had posted a number of hateful messages on her Facebook page.
INTIMIDATION, EMOTIONAL DAMAGE,
AND SUICIDE
• According to the Cyberbullying Research Center, "there have been several high‐profile
cases involving teenagers taking their own lives in part because of being harassed and
mistreated over the Internet, a phenomenon we have termed cyberbullicide – suicide
indirectly or directly influenced by experiences with online aggression."
• Cyberbullying is an intense form of psychological abuse, whose victims are more than twice
as likely to suffer from mental disorders compared to traditional bullying.
• The reluctance youth have in telling an authority figure about instances of cyberbullying
has led to fatal outcomes. At least three children between the ages of 12 and 13 have
committed suicide due to depression brought on by cyberbullying, according to reports
by USA Today and the Baltimore Examiner. These include the suicide of Ryan Halligan and
the suicide of Megan Meier, the latter of which resulted in United States v. Lori Drew. Teen
suicides tied to cyberbullying have recently become more prevalent. Rebecca Ann Sedwick
committed suicide after being terrorized through mobile applications such as Ask.fm, Kik
Messenger and Voxer.
ON YOUTH AND TEENAGERS
• The effects of cyberbullying vary, but research illustrates that cyberbullying
adversely affects youth to a higher degree than adolescents and adults. Youth are
more likely to suffer since they are still growing mentally and physically. Jennifer N.
Caudle, a certified family physician, says, "Kids that are bullied are likely to
experience anxiety, depression, loneliness, unhappiness and poor sleep”
• “Most of the time cyberbullying goes unnoticed; the younger generation hides
their bullying from anyone that can help to prevent the bullying from occurring
and from getting worse. Between 20% and 40% of adolescents are victims of
cyberbullying worldwide. The youth slowly change their behaviours and actions so
they become more withdrawn and quiet, but this may go unnoticed since the
change is subtle. Metin Deniz believes cyberbullying will "become a serious
problem in the future with an increase in the Internet and mobile phone usage
among young people".
THIS IMAGE SHOWS DIFFERENT ASPECTS OF CYBERBULLYING THAT
CAN TAKE PLACE ON THE INTERNET WHICH PUTS MORE
EMOTIONAL STRAIN ON THE YOUNGER CHILDREN AND TEENAGE
WHO EXPERIENCE CYBERBULLYING.
WARNING SIGNS A CHILD IS BEING
CYBERBULLIED OR IS CYBERBULLYING
OTHERS
Many of the warning signs that cyberbullying is occurring happen around a child’s use of
their device. Some of the warning signs that a child may be involved in cyberbullying are:
• Noticeable increases or decreases in device use, including texting.
• A child exhibits emotional responses (laughter, anger, upset) to what is happening on their
device.
• A child hides their screen or device when others are near, and avoids discussion about
what they are doing on their device.
• Social media accounts are shut down or new ones appear.
• A child starts to avoid social situations, even those that were enjoyed in the past.
• A child becomes withdrawn or depressed, or loses interest in people and activities.
WHAT TO DO WHEN
CYBERBULLYING HAPPENS
• Notice – Recognize if there has been a change in mood or behavior and explore what the cause might be.
Try to determine if these changes happen around a child’s use of their digital devices.
• Talk – Ask questions to learn what is happening, how it started, and who is involved.
• Document – Keep a record of what is happening and where. Take screenshots of harmful posts or content
if possible. Most laws and policies note that bullying is a repeated behavior, so records help to document it.
• Report – Most social media platforms and schools have clear policies and reporting processes. If a
classmate is cyberbullying, report it the school. You can also contact app or social media platforms to
report offensive content and have it removed. If a child has received physical threats, or if a potential crime
or illegal behavior is occurring, report it to the police.
• Support – Peers, mentors, and trusted adults can sometimes intervene publicly to positively influence a
situation where negative or hurtful content posts about a child. Public Intervention can include posting
positive comments about the person targeted with bullying to try to shift the conversation in a positive
direction. It can also help to reach out to the child who is bullying and the target of the bullying to express
your concern. If possible, try to determine if more professional support is needed for those involved, such
as speaking with a guidance counselor or mental health professional.
INTERNET
ADDICTION
defined as any online-related,
compulsive behavior which
interferes with normal living and
causes severe stress on family,
friends, loved ones, and one's
work environment.Internet
addiction has been
called Internet dependency and
Internet compulsivity.
WHAT ARE THE SIGNS OF INTERNET
ADDICTION?
The following symptoms are characteristic of someone who uses the
computer for a very long period of time:
• Backache.
• Headaches.
• Weight gain or loss.
• Disturbances in sleep.
• Carpal tunnel syndrome.
• Blurred or strained vision.
WHAT ARE THE EFFECTS?
• Internet addiction results in personal, family, academic, financial, and occupational
problems that are characteristic of other addictions. Impairments of real life
relationships are disrupted as a result of excessive use of the Internet. Individuals
suffering from Internet addiction spend more time in solitary seclusion, spend less
time with real people in their lives, and are often viewed as socially awkward.
Arguments may result due to the volume of time spent on-line. Those suffering
from Internet addiction may attempt to conceal the amount of time spent on-line,
which results in distrust and the disturbance of quality in once stable relationships.
• Many persons who attempt to quit their Internet use experience withdrawal
including: anger, depression, relief, mood swings, anxiety, fear, irritability, sadness,
loneliness, boredom, restlessness, procrastination, and upset stomach. Being
addicted to the Internet can also cause physical discomfort or medical problems
such as: Carpal Tunnel Syndrome, dry eyes, backaches, severe headaches, eating
irregularities, (such as skipping meals), failure to attend to personal hygiene, and
sleep disturbance.
WHAT ARE THE SYMPTOMS OF
SOMEONE WHO IS ADDICTED TO
COMPUTER GAMES?
Feelings of restlessness and/or
irritability when unable to play.
Preoccupation with thoughts of
previous online activity or
anticipation of the next online
session.
Lying to friends or family
members regarding the amount
of time spent playing.
• There is considerable controversy with
respect to so-called internet
addiction and whether it ought to be
reified as a diagnosis in the Diagnostic
and Statistical Manual of Mental
Disorders, Fifth Edition. The
relationship between “addiction” and
various compulsive or impulsive
behaviors is also a source of confusion.
Is Internet addiction a real
problem?
• Internet addiction disorder is not
listed in the latest DSM manual (DSM-
5, 2013), which is commonly used by
psychiatrists. Gambling disorder is the
only behavioural (non-substance
related) addiction included in DSM-5.
Is Internet addiction a mental
illness?
HOW IS IT DIAGNOSED?
Though it is gaining traction in the mental health field – and recently added to the Diagnostic
and Statistical Manual of Mental Disorders as a disorder that needs more research, a
standardized diagnosis of Internet Addiction Disorder has not been discovered. This is also a
significant contributing factor to the overall variability in the disorder as a whole and wide
range of prevalence in the population from 0.3% to a whopping 38%.
One of the more accepted diagnostic assessments of Internet Addiction Disorder has been
proposed by KW Beard’s 2005 article in CyberPsychology and Behavior. Beard proposes five
diagnostic criteria in the identification of Internet Addiction Disorder in the general
population:
• Is preoccupied with the Internet (constantly thinks about past use or future use)
• Needs to use the Internet with increased amounts of time to gain satisfaction
• Has made unsuccessful efforts to control, cut back, or stop use of the Internet
• Is restless, moody, depressed, or irritable when attempting to control Internet use
• Has stayed online longer than originally intended
THE TREATMENT OF INTERNET
ADDICTION
1. Track time. This can help you see where your problem areas
are.
2. Block them. Save yourself from surfing by making your
favorite sites inaccessible. ...
3. Unplug. ...
4. Take an Internet vacation. ...
5. Just let go. ...
6. Limit time.
Cyrenne Madlangsakay

More Related Content

What's hot

Plugged in and tuned out
Plugged in and tuned outPlugged in and tuned out
Plugged in and tuned outMohamed Sedky
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullyingZiar Khan
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?AJ Tivol
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointtburdzy1
 
Legal PD - Cyberbullying
Legal PD - CyberbullyingLegal PD - Cyberbullying
Legal PD - Cyberbullyingjgrosenthal
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullyingseswear9388
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingdrogt1mm
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingQazi Anwar
 
Cyberbullying No27 2009 Laurence And Saad
Cyberbullying No27 2009 Laurence And SaadCyberbullying No27 2009 Laurence And Saad
Cyberbullying No27 2009 Laurence And Saadsbaluch1
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technologyijtsrd
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersMemorial University
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingtackleglass54
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parentsdamarissepulveda
 
21st Century Bullying Crueler Than Ever
21st Century Bullying   Crueler Than Ever21st Century Bullying   Crueler Than Ever
21st Century Bullying Crueler Than Evermbernstein
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingringw1sl
 
Cyberbullying Presentation 2008
Cyberbullying Presentation 2008Cyberbullying Presentation 2008
Cyberbullying Presentation 2008Josie Fraser
 
Cyber Bullying and Internet Addiction
Cyber Bullying and Internet AddictionCyber Bullying and Internet Addiction
Cyber Bullying and Internet AddictionAruell Tamaray
 

What's hot (19)

Plugged in and tuned out
Plugged in and tuned outPlugged in and tuned out
Plugged in and tuned out
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Legal PD - Cyberbullying
Legal PD - CyberbullyingLegal PD - Cyberbullying
Legal PD - Cyberbullying
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying No27 2009 Laurence And Saad
Cyberbullying No27 2009 Laurence And SaadCyberbullying No27 2009 Laurence And Saad
Cyberbullying No27 2009 Laurence And Saad
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and Teachers
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parents
 
21st Century Bullying Crueler Than Ever
21st Century Bullying   Crueler Than Ever21st Century Bullying   Crueler Than Ever
21st Century Bullying Crueler Than Ever
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying Presentation 2008
Cyberbullying Presentation 2008Cyberbullying Presentation 2008
Cyberbullying Presentation 2008
 
Cyber Bullying and Internet Addiction
Cyber Bullying and Internet AddictionCyber Bullying and Internet Addiction
Cyber Bullying and Internet Addiction
 

Similar to Cyrenne Madlangsakay

Cyber Bullying and Internet Addiction
Cyber Bullying and Internet AddictionCyber Bullying and Internet Addiction
Cyber Bullying and Internet Addictionmabahongutot
 
Enhancing law penalty to prevent cyberbullying among.docx
Enhancing law penalty to prevent cyberbullying among.docxEnhancing law penalty to prevent cyberbullying among.docx
Enhancing law penalty to prevent cyberbullying among.docxYASHU40
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingpardolopez
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimesNilendra Kumar
 
Presentation 2
Presentation 2Presentation 2
Presentation 2bdonaghy
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safetyRay Brannon
 
Genderissues-RakhiS.pptx
Genderissues-RakhiS.pptxGenderissues-RakhiS.pptx
Genderissues-RakhiS.pptxRAKHI SAWLANI
 
Presentation2
Presentation2Presentation2
Presentation2bdonaghy
 
Bullying in the digital age
Bullying in the digital ageBullying in the digital age
Bullying in the digital ageVia Christi Health
 
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...Brian Markle
 
Social justice
Social justiceSocial justice
Social justicekm03john
 
Cyberbullying and Internet Addiction
Cyberbullying and Internet AddictionCyberbullying and Internet Addiction
Cyberbullying and Internet AddictionReuben Millare
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONApostolos Syropoulos
 

Similar to Cyrenne Madlangsakay (18)

Essays On Cyber Bullying
Essays On Cyber BullyingEssays On Cyber Bullying
Essays On Cyber Bullying
 
Cyber Bullying and Internet Addiction
Cyber Bullying and Internet AddictionCyber Bullying and Internet Addiction
Cyber Bullying and Internet Addiction
 
Enhancing law penalty to prevent cyberbullying among.docx
Enhancing law penalty to prevent cyberbullying among.docxEnhancing law penalty to prevent cyberbullying among.docx
Enhancing law penalty to prevent cyberbullying among.docx
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
 
Presentation 2
Presentation 2Presentation 2
Presentation 2
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Genderissues-RakhiS.pptx
Genderissues-RakhiS.pptxGenderissues-RakhiS.pptx
Genderissues-RakhiS.pptx
 
Presentation2
Presentation2Presentation2
Presentation2
 
Bullying in the digital age
Bullying in the digital ageBullying in the digital age
Bullying in the digital age
 
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Social justice
Social justiceSocial justice
Social justice
 
Effects Of Bullying
Effects Of BullyingEffects Of Bullying
Effects Of Bullying
 
Cyberbullying and Internet Addiction
Cyberbullying and Internet AddictionCyberbullying and Internet Addiction
Cyberbullying and Internet Addiction
 
cyber bulling
 cyber bulling cyber bulling
cyber bulling
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 

Recently uploaded

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 

Recently uploaded (20)

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

Cyrenne Madlangsakay

  • 2. CYBERBULLYING • Cyberbullying or cyberharassment is a form of bullying or harassment using electronic means. It has become increasingly common, especially among teenagers. Harmful bullying behavior can include posting rumors, threats, sexual remarks, a victims' personal information, or pejorative labels (i.e., hate speech). Bullying or harassment can be identified by repeated behavior and an intent to harm. Victims may have lower self-esteem, increased suicidal ideation, and a variety of emotional responses, including being scared, frustrated, angry, and depressed. Cyberbullying may be more harmful than traditional bullying.
  • 3. DEFINITIONS • A frequently used definition of cyberbullying is "an aggressive, intentional act or behavior that is carried out by a group or an individual, using electronic forms of contact, repeatedly and over time against a victim who cannot easily defend him or herself." There are many variations of the definition, such as the National Crime Prevention Council's more specific definition: "the process of using the Internet, cell phones or other devices to send or post text or images intended to hurt or embarrass another person." • Cyberbullying is often similar to traditional bullying, with some notable distinctions. Victims of cyberbullying may not know the identity of their bully, or why the bully is targeting them. The harassment can have wide-reaching effects on the victim, as the content used to harass the victim can be spread and shared easily among many people and often remains accessible long after the initial incident. • The terms "cyberharassment" and "cyberbullying" are sometimes used synonymously, though some people use the latter to refer specifically to harassment among minors or in a school setting.
  • 4.
  • 5. FURTHER INFORMATION….. Cyberstalking • Cyberstalking is a form of online harassment in which the perpetrator uses electronic communications to stalk a victim. This is considered more dangerous than other forms of cyberbullying because it generally involves a credible threat to the victim's safety. Cyberstalkers may send repeated messages intended to threaten or harass. They may encourage others to do the same, either explicitly or by impersonating their victim and asking others to contact them. Trolling • Cyberstalking is a form of online harassment in which the perpetrator uses electronic communications to stalk a victim. This is considered more dangerous than other forms of cyberbullying because it generally involves a credible threat to the victim's safety. Cyberstalkers may send repeated messages intended to threaten or harass. They may encourage others to do the same, either explicitly or by impersonating their victim and asking others to contact them.
  • 6. METHODS USED In social media Cyberbullying can take place on social media sites such as Facebook, Myspace, and Twitter. "By 2008, 93% of young people between the ages of 12 and 17 were online. In fact, youth spend more time with media than any single other activity besides sleeping." The last decade has witnessed a surge of cyberbullying, bullying that occurs through the use of electronic communication technologies, such as e- mail, instant messaging, social media, online gaming, or through digital messages or images sent to a cellular phone. In gaming Of those who reported having experienced online harassment in a Pew Research poll, 16% said the most recent incident had occurred in an online game.] A study from National Sun Yat- sen University observed that children who enjoyed violent video games were significantly more likely to both experience and perpetrate cyberbullying In search engines Information cascades happen when users start passing along information they assume to be true, but cannot know to be true, based on information on what other users are doing. This can be accelerated by search engines' ranking technologies and their tendency to return results relevant to a user's previous interests. This type of information spreading is hard to stop. Information cascades over social media and the Internet may also be harmless, and may contain truthful information
  • 7.
  • 8. LAW ENFORCEMENT A majority of states have laws that explicitly include electronic forms of communication within stalking or harassment laws. Most law enforcement agencies have cyber-crime units, and Internet stalking is often treated with more seriousness than reports of physical stalking. Help and resources can be searched by state or area.
  • 9. • The safety of schools is increasingly becoming a focus of state legislative action. There was an increase in cyberbullying enacted legislation between 2006 and 2010. Initiatives and curriclulum requirements also exist in the UK (the Ofsted eSafety guidance) and Australia (Overarching Learning Outcome 13). Protection • There are laws that only address online harassment of children or focus on child predators, as well as laws that protect adult cyberstalking victims, or victims of any age. Currently, there are 45 cyberstalking (and related) laws on the books. While some sites specialize in laws that protect victims age 18 and under, Working to Halt Online Abuse is a help resource containing a list of current and pending cyberstalking-related United States federal and state laws. It also lists those states that do not yet have laws, and related laws from other countries. The Global Cyber Law Database (GCLD) aims to become the most comprehensive and authoritative source of cyber laws for all countries. Schools
  • 10. Age • Children report negative online behaviours occurring from the second grade. According to research, boys initiate negative online activity earlier than girls. However, by middle school, girls are more likely to engage in cyberbullying than boys. Whether the bully is male or female, the purpose is to intentionally embarrass, harass, intimidate, or make threats online. Adults • Cyberstalking may be an extension of physical stalking, and may have criminal consequences. A target's understanding of why cyberstalking is happening is helpful to remedy and take protective action. Among factors that motivate stalkers are envy, pathological obsession (professional or sexual), unemployment or failure with own job or life, or the desire to intimidate and cause others to feel inferior. The stalker may be delusional and believe he/she "knows" the target. The stalker wants to instill fear in a person to justify his/her status, or may believe they can get away with these actions (anonymity).[
  • 11. HARMFUL EFFECTS Research has demonstrated a number of serious consequences of cyberbullying victimization. Victims may have lower self-esteem, increased suicidal ideation, and a variety of emotional responses, including being scared, frustrated, angry, and depressed. Cyberbullying may be more harmful than traditional bullying, because there is no escaping it. One of the most damaging effects is that a victim begins to avoid friends and activities, which is often the very intention of the bully. Cyberbullying campaigns are sometimes so damaging that victims have committed suicide. There are at least four examples in the United States in which cyberbullying has been linked to the suicide of a teenager. The suicide of Megan Meier is a recent example that led to the conviction of the adult perpetrator of the attacks. Holly Grogan committed suicide by jumping off a 30-foot bridge near Gloucester in the UK. It was reported that a number of her schoolmates had posted a number of hateful messages on her Facebook page.
  • 12. INTIMIDATION, EMOTIONAL DAMAGE, AND SUICIDE • According to the Cyberbullying Research Center, "there have been several high‐profile cases involving teenagers taking their own lives in part because of being harassed and mistreated over the Internet, a phenomenon we have termed cyberbullicide – suicide indirectly or directly influenced by experiences with online aggression." • Cyberbullying is an intense form of psychological abuse, whose victims are more than twice as likely to suffer from mental disorders compared to traditional bullying. • The reluctance youth have in telling an authority figure about instances of cyberbullying has led to fatal outcomes. At least three children between the ages of 12 and 13 have committed suicide due to depression brought on by cyberbullying, according to reports by USA Today and the Baltimore Examiner. These include the suicide of Ryan Halligan and the suicide of Megan Meier, the latter of which resulted in United States v. Lori Drew. Teen suicides tied to cyberbullying have recently become more prevalent. Rebecca Ann Sedwick committed suicide after being terrorized through mobile applications such as Ask.fm, Kik Messenger and Voxer.
  • 13. ON YOUTH AND TEENAGERS • The effects of cyberbullying vary, but research illustrates that cyberbullying adversely affects youth to a higher degree than adolescents and adults. Youth are more likely to suffer since they are still growing mentally and physically. Jennifer N. Caudle, a certified family physician, says, "Kids that are bullied are likely to experience anxiety, depression, loneliness, unhappiness and poor sleep” • “Most of the time cyberbullying goes unnoticed; the younger generation hides their bullying from anyone that can help to prevent the bullying from occurring and from getting worse. Between 20% and 40% of adolescents are victims of cyberbullying worldwide. The youth slowly change their behaviours and actions so they become more withdrawn and quiet, but this may go unnoticed since the change is subtle. Metin Deniz believes cyberbullying will "become a serious problem in the future with an increase in the Internet and mobile phone usage among young people".
  • 14. THIS IMAGE SHOWS DIFFERENT ASPECTS OF CYBERBULLYING THAT CAN TAKE PLACE ON THE INTERNET WHICH PUTS MORE EMOTIONAL STRAIN ON THE YOUNGER CHILDREN AND TEENAGE WHO EXPERIENCE CYBERBULLYING.
  • 15. WARNING SIGNS A CHILD IS BEING CYBERBULLIED OR IS CYBERBULLYING OTHERS Many of the warning signs that cyberbullying is occurring happen around a child’s use of their device. Some of the warning signs that a child may be involved in cyberbullying are: • Noticeable increases or decreases in device use, including texting. • A child exhibits emotional responses (laughter, anger, upset) to what is happening on their device. • A child hides their screen or device when others are near, and avoids discussion about what they are doing on their device. • Social media accounts are shut down or new ones appear. • A child starts to avoid social situations, even those that were enjoyed in the past. • A child becomes withdrawn or depressed, or loses interest in people and activities.
  • 16. WHAT TO DO WHEN CYBERBULLYING HAPPENS • Notice – Recognize if there has been a change in mood or behavior and explore what the cause might be. Try to determine if these changes happen around a child’s use of their digital devices. • Talk – Ask questions to learn what is happening, how it started, and who is involved. • Document – Keep a record of what is happening and where. Take screenshots of harmful posts or content if possible. Most laws and policies note that bullying is a repeated behavior, so records help to document it. • Report – Most social media platforms and schools have clear policies and reporting processes. If a classmate is cyberbullying, report it the school. You can also contact app or social media platforms to report offensive content and have it removed. If a child has received physical threats, or if a potential crime or illegal behavior is occurring, report it to the police. • Support – Peers, mentors, and trusted adults can sometimes intervene publicly to positively influence a situation where negative or hurtful content posts about a child. Public Intervention can include posting positive comments about the person targeted with bullying to try to shift the conversation in a positive direction. It can also help to reach out to the child who is bullying and the target of the bullying to express your concern. If possible, try to determine if more professional support is needed for those involved, such as speaking with a guidance counselor or mental health professional.
  • 17.
  • 18. INTERNET ADDICTION defined as any online-related, compulsive behavior which interferes with normal living and causes severe stress on family, friends, loved ones, and one's work environment.Internet addiction has been called Internet dependency and Internet compulsivity.
  • 19. WHAT ARE THE SIGNS OF INTERNET ADDICTION? The following symptoms are characteristic of someone who uses the computer for a very long period of time: • Backache. • Headaches. • Weight gain or loss. • Disturbances in sleep. • Carpal tunnel syndrome. • Blurred or strained vision.
  • 20.
  • 21. WHAT ARE THE EFFECTS? • Internet addiction results in personal, family, academic, financial, and occupational problems that are characteristic of other addictions. Impairments of real life relationships are disrupted as a result of excessive use of the Internet. Individuals suffering from Internet addiction spend more time in solitary seclusion, spend less time with real people in their lives, and are often viewed as socially awkward. Arguments may result due to the volume of time spent on-line. Those suffering from Internet addiction may attempt to conceal the amount of time spent on-line, which results in distrust and the disturbance of quality in once stable relationships. • Many persons who attempt to quit their Internet use experience withdrawal including: anger, depression, relief, mood swings, anxiety, fear, irritability, sadness, loneliness, boredom, restlessness, procrastination, and upset stomach. Being addicted to the Internet can also cause physical discomfort or medical problems such as: Carpal Tunnel Syndrome, dry eyes, backaches, severe headaches, eating irregularities, (such as skipping meals), failure to attend to personal hygiene, and sleep disturbance.
  • 22. WHAT ARE THE SYMPTOMS OF SOMEONE WHO IS ADDICTED TO COMPUTER GAMES? Feelings of restlessness and/or irritability when unable to play. Preoccupation with thoughts of previous online activity or anticipation of the next online session. Lying to friends or family members regarding the amount of time spent playing.
  • 23. • There is considerable controversy with respect to so-called internet addiction and whether it ought to be reified as a diagnosis in the Diagnostic and Statistical Manual of Mental Disorders, Fifth Edition. The relationship between “addiction” and various compulsive or impulsive behaviors is also a source of confusion. Is Internet addiction a real problem? • Internet addiction disorder is not listed in the latest DSM manual (DSM- 5, 2013), which is commonly used by psychiatrists. Gambling disorder is the only behavioural (non-substance related) addiction included in DSM-5. Is Internet addiction a mental illness?
  • 24. HOW IS IT DIAGNOSED? Though it is gaining traction in the mental health field – and recently added to the Diagnostic and Statistical Manual of Mental Disorders as a disorder that needs more research, a standardized diagnosis of Internet Addiction Disorder has not been discovered. This is also a significant contributing factor to the overall variability in the disorder as a whole and wide range of prevalence in the population from 0.3% to a whopping 38%. One of the more accepted diagnostic assessments of Internet Addiction Disorder has been proposed by KW Beard’s 2005 article in CyberPsychology and Behavior. Beard proposes five diagnostic criteria in the identification of Internet Addiction Disorder in the general population: • Is preoccupied with the Internet (constantly thinks about past use or future use) • Needs to use the Internet with increased amounts of time to gain satisfaction • Has made unsuccessful efforts to control, cut back, or stop use of the Internet • Is restless, moody, depressed, or irritable when attempting to control Internet use • Has stayed online longer than originally intended
  • 25. THE TREATMENT OF INTERNET ADDICTION 1. Track time. This can help you see where your problem areas are. 2. Block them. Save yourself from surfing by making your favorite sites inaccessible. ... 3. Unplug. ... 4. Take an Internet vacation. ... 5. Just let go. ... 6. Limit time.