SlideShare a Scribd company logo
1 of 10
CYBERBULLYING
BY: ELLAINE JASMIN VALENTOS
CYBERBULLYING
• is a practice where an individual or
group uses the Internet to ridicule,
harass or harm another person. The
social and emotional harm inflicted by
cyberbullies grows out of - or leads to
- physical bullying in the offline world.
• is a form of bullying that takes place over digital
mediums. Students may be cyberbullied on their
phones, computers, and other devices by receiving
harassing chats, texts, messages, comments, forum
posts, and pictures that cause them emotional harm.
TYPES OF CYBERBULLYING
1. Social Media Bullying
• Cyberbullies thrive on social media because the entire
social network is interconnected, and there are
opportunities to shame their victims in front of their
social circles.
• Mean comments, making fun of the victim publicly on
social media, gossiping, and even threatening through
private messages are all ways social bullying occurs.
• While some of these platforms allow users to block
specific people from communicating with them,
cyberbullying can still continue even if the bully has
been blocked by the victim. They can still spread
malicious rumors, share humiliating pictures, and make
fun of the victim to their other connections, continuing
their patterns of social media bullying without the
victim even being directly accessible.
TYPES OF CYBERBULLYING
2. Harassment
• Harassment is an extremely common component of most
types of cyberbullying. This is because harassment is the
repeated and unrelenting negative threats, mean
comments, and other hurtful activity, which is a
defining characteristic of cyberbullying: repetition.
• Harassment can occur over all different channels,
including text messaging, instant messaging, as part of
social media bullying, or on gaming platforms.
• Specifically, harassment can mean sharing private
communications online with others, targeting the victim
relentlessly in group communications, or simply sending
hurtful private messages.
• An extreme but common form of harassment is posing or
impersonating. The bully creates a fake profile of the
victim and poses as them (often on dating sites), posting
their name, phone number, and other personal details,
putting the victim at risk for further harassment and
danger.
TYPES OF CYBERBULLYING
3. Flaming
• Instead of taking place over private messaging or texts,
flaming usually occurs in a more public setting online,
such as a chat group, gaming chat, or forum. The
cyberbully (or bullies) send hurtful, angry, or shaming
messages to the victim directly, but within the group so
others can see.
• In addition to the effect of the hurtful message itself, the
victim has also lost some of their credibility and
reputation within the group, and may feel like they
cannot be part of the community anymore.
4. Exclusion
• Social bullying doesn’t even have to include talking to the
victim—sometimes, cyberbullies torment their victims by
doing the opposite.
• Instead of directing harassment at the victim directly,
cyberbullies sometimes use exclusion, deliberately cutting
their victim out of an online group. It’s common for the
group to then make fun of the victim and harass them
with malicious comments and discuss the victim among
WHERE DOES CYBERBULLYING
TAKE PLACE?
• Facebook and other social media websites can be
used, and allow for “anonymous” cyberbullying to
occur. For example, there may be a private group chat
or page set up in which the child, who is the victim of
the bullying is unaware of its existence. These more
private setups are usually eventually discovered, which
then brings the full weight of paranoia,
embarrassment, and feelings of isolation on the victim.
Text messages and group chats have the same effect
upon its victims. Forums, typically gaming forums or
other hobbyist forums, can also turn into cyberbullying
arenas. Reddit.com, which is one of the largest and
most visited social websites, is a forum-type of social
media, and users there are nearly completely
anonymous. This gives cyberbullies less empathy for
their victims, and allows them to continually attack.
Because the victim is not bullied at school or other
areas where teachers are usually present, responsible
adults are not alerted to the bullying or able to
WHAT ARE THE CAUSES OF
CYBERBULLYING?
1. One main cause for cyberbullying is frustration or
revenge.
2. Another cause is wanting to take advantage of others
and showing how powerful the bullies are.
3. The last main cause of bullying is because victims
have been bullied and the people who have been
bullied bully others so they can feel better for
themselves.
WHAT ARE THE EFFECTS OF
CYBERBULLYING?
• Cyberbullying usually has long-term detrimental effects on a
victim. Truancy is quite common when a victim is continually
bullied both in-person and through technology. Also, their
grades may suffer, their self-esteem is hurt, depression can set in,
they may have increased health-related issues, abuse of alcohol
and/or drugs may begin, and many more negative effects can
occur, depending on the child. With children using technology at
younger ages, the data collected in past years is becoming less
relevant. In 2010-2011, the School Crime Supplement reported
9% of children in grades 6-12 are cyberbullied, but the increase in
children that use technology can result in a much higher number.
• Some individuals groom children in hopes of initiating sexual
contact with them. Grooming usually happens in children with
lower self-esteem and those children who have issues of
loneliness or isolation. In these instances, a targeted
cyberbullying campaign can also be a tool for a predator.
• Cyberbullying should not be seen as any less of a threat as
traditional bullying. Since most cyberbullying is inflicted upon a
child without the presence of adult supervision, the
consequences can be far reaching. Cyberbullying will evolve as
new technology is used and adapted, and so should methods to
not only react against cyberbullying, but also to be proactive and
CYBERBULLYING PREVENTION
TIPS
• Though cyberbullying prevention isn’t 100% effective, parents and
educators should remain vigilant and apply these tips to help keep
kids from being abused by their peers online:
• Acknowledge cyberbullying and discuss with children and teens
exactly what it is and why it’s so harmful.
• Create expectations around online conduct—teens should not send or
circulate harmful content including messages, photos, or videos, even
in retaliation.
• Look for signs of withdrawal, anxiety, depression, irritability, and other
changes in behavior. This could indicate cyberbullying or other
harassment.
• Remind teens to avoid sending or posting anything they would not
want shared with all of their classmates.
• Be cautious about access to computers, phones, and social media
accounts.
• Teach young people to safeguard their passwords and personal
details online.
• Have teens block cyberbullies if they are being repeatedly contacted
by someone who is trying to demean, humiliate, or harass them.
• Encourage teens to stand up to others who are being harassed, and to
report cyberbullying they may witness.
• Provide resources such as counseling and hotline assistance for teens
CITATIONS
• Tulane University (2018) 2018 Guide to Cyberbullying
Awareness. Retrived from:
https://socialwork.tulane.edu/blog/cyberbullying-
awareness-guide
• U.S. Department of Health and Human Services (2016)
Law Enforcement’s Reminder: the Negative Effects of
Cyberbullying. Retrived from:
https://www.stopbullying.gov/blog/2016/10/27/law-
enforcements-reminder-negative-effects-
cyberbullying-and-what-we-can-do-prevent-it.html
• McDonald & Avid (2014) The Three Main Causes of
Cyberbullying. Retrived from:
https://prezi.com/zsyxh2r3hdkc/the-three-main-
causes-of-cyberbullying/

More Related Content

What's hot

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide sharebr03wood
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointHannahMorrell
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying CarlosE15
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...HDCH
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationpamelazuley
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation introkscheidy
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingMarc Kuhn
 

What's hot (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
 
Cyber stalking
Cyber stalking Cyber stalking
Cyber stalking
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Similar to Cyberbullying

Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.jessy0121
 
Cyberbullying and internent addiction
Cyberbullying  and internent addictionCyberbullying  and internent addiction
Cyberbullying and internent addictionChristopher Mejia
 
Cyberbullying- Lacson, Espinosa.pdf
Cyberbullying- Lacson, Espinosa.pdfCyberbullying- Lacson, Espinosa.pdf
Cyberbullying- Lacson, Espinosa.pdfYnigoXaviLacson
 
Cyberbullying and social media
Cyberbullying and social mediaCyberbullying and social media
Cyberbullying and social mediaevieasmedia
 
Cyberbullying full
Cyberbullying fullCyberbullying full
Cyberbullying fullLiam1997
 
Cyberbullying and Internet Addiction
Cyberbullying and Internet AddictionCyberbullying and Internet Addiction
Cyberbullying and Internet AddictionRossehna Mari Magtoto
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GArissa Ablao
 
Technology Presentation
Technology PresentationTechnology Presentation
Technology PresentationTatiDenai
 
MultiMedia Presentation
MultiMedia PresentationMultiMedia Presentation
MultiMedia PresentationAshlynnH
 
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose ManlinconCYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlinconkatrinarose14
 
Cyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItCyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItFeliciaDixon5
 
Cyberbullying by david siaborret
Cyberbullying by david siaborretCyberbullying by david siaborret
Cyberbullying by david siaborretdavid terrobias
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenHomeGuides
 

Similar to Cyberbullying (20)

Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)
 
Bullying vs cyber bullying italy
Bullying vs cyber bullying italyBullying vs cyber bullying italy
Bullying vs cyber bullying italy
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying and internent addiction
Cyberbullying  and internent addictionCyberbullying  and internent addiction
Cyberbullying and internent addiction
 
Cyberbullying- Lacson, Espinosa.pdf
Cyberbullying- Lacson, Espinosa.pdfCyberbullying- Lacson, Espinosa.pdf
Cyberbullying- Lacson, Espinosa.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying and social media
Cyberbullying and social mediaCyberbullying and social media
Cyberbullying and social media
 
Cyberbullying full
Cyberbullying fullCyberbullying full
Cyberbullying full
 
Cyberbullying and Internet Addiction
Cyberbullying and Internet AddictionCyberbullying and Internet Addiction
Cyberbullying and Internet Addiction
 
English 10 Q1 WK1.pptx
English 10 Q1 WK1.pptxEnglish 10 Q1 WK1.pptx
English 10 Q1 WK1.pptx
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
 
Technology Presentation
Technology PresentationTechnology Presentation
Technology Presentation
 
MultiMedia Presentation
MultiMedia PresentationMultiMedia Presentation
MultiMedia Presentation
 
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose ManlinconCYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
Cyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItCyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent It
 
Cyberbullying by david siaborret
Cyberbullying by david siaborretCyberbullying by david siaborret
Cyberbullying by david siaborret
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 

Recently uploaded

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 

Recently uploaded (20)

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 

Cyberbullying

  • 2. CYBERBULLYING • is a practice where an individual or group uses the Internet to ridicule, harass or harm another person. The social and emotional harm inflicted by cyberbullies grows out of - or leads to - physical bullying in the offline world. • is a form of bullying that takes place over digital mediums. Students may be cyberbullied on their phones, computers, and other devices by receiving harassing chats, texts, messages, comments, forum posts, and pictures that cause them emotional harm.
  • 3. TYPES OF CYBERBULLYING 1. Social Media Bullying • Cyberbullies thrive on social media because the entire social network is interconnected, and there are opportunities to shame their victims in front of their social circles. • Mean comments, making fun of the victim publicly on social media, gossiping, and even threatening through private messages are all ways social bullying occurs. • While some of these platforms allow users to block specific people from communicating with them, cyberbullying can still continue even if the bully has been blocked by the victim. They can still spread malicious rumors, share humiliating pictures, and make fun of the victim to their other connections, continuing their patterns of social media bullying without the victim even being directly accessible.
  • 4. TYPES OF CYBERBULLYING 2. Harassment • Harassment is an extremely common component of most types of cyberbullying. This is because harassment is the repeated and unrelenting negative threats, mean comments, and other hurtful activity, which is a defining characteristic of cyberbullying: repetition. • Harassment can occur over all different channels, including text messaging, instant messaging, as part of social media bullying, or on gaming platforms. • Specifically, harassment can mean sharing private communications online with others, targeting the victim relentlessly in group communications, or simply sending hurtful private messages. • An extreme but common form of harassment is posing or impersonating. The bully creates a fake profile of the victim and poses as them (often on dating sites), posting their name, phone number, and other personal details, putting the victim at risk for further harassment and danger.
  • 5. TYPES OF CYBERBULLYING 3. Flaming • Instead of taking place over private messaging or texts, flaming usually occurs in a more public setting online, such as a chat group, gaming chat, or forum. The cyberbully (or bullies) send hurtful, angry, or shaming messages to the victim directly, but within the group so others can see. • In addition to the effect of the hurtful message itself, the victim has also lost some of their credibility and reputation within the group, and may feel like they cannot be part of the community anymore. 4. Exclusion • Social bullying doesn’t even have to include talking to the victim—sometimes, cyberbullies torment their victims by doing the opposite. • Instead of directing harassment at the victim directly, cyberbullies sometimes use exclusion, deliberately cutting their victim out of an online group. It’s common for the group to then make fun of the victim and harass them with malicious comments and discuss the victim among
  • 6. WHERE DOES CYBERBULLYING TAKE PLACE? • Facebook and other social media websites can be used, and allow for “anonymous” cyberbullying to occur. For example, there may be a private group chat or page set up in which the child, who is the victim of the bullying is unaware of its existence. These more private setups are usually eventually discovered, which then brings the full weight of paranoia, embarrassment, and feelings of isolation on the victim. Text messages and group chats have the same effect upon its victims. Forums, typically gaming forums or other hobbyist forums, can also turn into cyberbullying arenas. Reddit.com, which is one of the largest and most visited social websites, is a forum-type of social media, and users there are nearly completely anonymous. This gives cyberbullies less empathy for their victims, and allows them to continually attack. Because the victim is not bullied at school or other areas where teachers are usually present, responsible adults are not alerted to the bullying or able to
  • 7. WHAT ARE THE CAUSES OF CYBERBULLYING? 1. One main cause for cyberbullying is frustration or revenge. 2. Another cause is wanting to take advantage of others and showing how powerful the bullies are. 3. The last main cause of bullying is because victims have been bullied and the people who have been bullied bully others so they can feel better for themselves.
  • 8. WHAT ARE THE EFFECTS OF CYBERBULLYING? • Cyberbullying usually has long-term detrimental effects on a victim. Truancy is quite common when a victim is continually bullied both in-person and through technology. Also, their grades may suffer, their self-esteem is hurt, depression can set in, they may have increased health-related issues, abuse of alcohol and/or drugs may begin, and many more negative effects can occur, depending on the child. With children using technology at younger ages, the data collected in past years is becoming less relevant. In 2010-2011, the School Crime Supplement reported 9% of children in grades 6-12 are cyberbullied, but the increase in children that use technology can result in a much higher number. • Some individuals groom children in hopes of initiating sexual contact with them. Grooming usually happens in children with lower self-esteem and those children who have issues of loneliness or isolation. In these instances, a targeted cyberbullying campaign can also be a tool for a predator. • Cyberbullying should not be seen as any less of a threat as traditional bullying. Since most cyberbullying is inflicted upon a child without the presence of adult supervision, the consequences can be far reaching. Cyberbullying will evolve as new technology is used and adapted, and so should methods to not only react against cyberbullying, but also to be proactive and
  • 9. CYBERBULLYING PREVENTION TIPS • Though cyberbullying prevention isn’t 100% effective, parents and educators should remain vigilant and apply these tips to help keep kids from being abused by their peers online: • Acknowledge cyberbullying and discuss with children and teens exactly what it is and why it’s so harmful. • Create expectations around online conduct—teens should not send or circulate harmful content including messages, photos, or videos, even in retaliation. • Look for signs of withdrawal, anxiety, depression, irritability, and other changes in behavior. This could indicate cyberbullying or other harassment. • Remind teens to avoid sending or posting anything they would not want shared with all of their classmates. • Be cautious about access to computers, phones, and social media accounts. • Teach young people to safeguard their passwords and personal details online. • Have teens block cyberbullies if they are being repeatedly contacted by someone who is trying to demean, humiliate, or harass them. • Encourage teens to stand up to others who are being harassed, and to report cyberbullying they may witness. • Provide resources such as counseling and hotline assistance for teens
  • 10. CITATIONS • Tulane University (2018) 2018 Guide to Cyberbullying Awareness. Retrived from: https://socialwork.tulane.edu/blog/cyberbullying- awareness-guide • U.S. Department of Health and Human Services (2016) Law Enforcement’s Reminder: the Negative Effects of Cyberbullying. Retrived from: https://www.stopbullying.gov/blog/2016/10/27/law- enforcements-reminder-negative-effects- cyberbullying-and-what-we-can-do-prevent-it.html • McDonald & Avid (2014) The Three Main Causes of Cyberbullying. Retrived from: https://prezi.com/zsyxh2r3hdkc/the-three-main- causes-of-cyberbullying/