SlideShare a Scribd company logo
1 of 10
Cyber bullying:
Cause, Effects, and Solution
By: Manabat & Toledo
Cyber bullying
 Cyber bullying is bullying that takes place
over digital devices like cell phones,
computers, and tablets.
 It can include sharing personal or private
information about someone else causing
embarrassment or humiliation.
Causes
 Cyber bullying happens for many of the same
reasons as any other type of bullying, but it
may be even more appealing because it can
be done anonymously
 Revenge motivated some individuals to do
cyber bullying
Causes
 Some individuals would bully only to boost
their egos.
Effects:
 For people who are doing cyber bullying, a
bad reputation in the future is waiting for them
if they get caught. Since cyber bullying is also
an action of bullying, there is a law for it and
the victims may report the case if they have
enough proof.
Effects:
 As for the ones who develop cyber bullying,
they become stressed. It would lead them to
do negative things such as skipping school,
locking themselves in their room or worst,
they would try to attempt suicide.
Solutions
 Know that it’s not your fault. What people call “bullying” is
sometimes an argument between two people. But if someone is
repeatedly cruel to you, that’s bullying and you mustn’t blame
yourself. No one deserves to be treated cruelly.
 Don’t respond or retaliate. Sometimes a reaction is exactly what
aggressors are looking for because they think it gives them power
over you, and you don’t want to empower a bully. As for retaliating,
getting back at a bully turns you into one – and can turn one mean
act into a chain reaction. If you can, remove yourself from the
situation. If you can’t, sometimes humor disarms or distracts a
person from bullying.
Solutions
 Save the evidence. The only good news about bullying online or on
phones is that it can usually be captured, saved, and shown to
someone who can help. You can save that evidence in case things
escalate.
 Tell the person to stop. This is completely up to you – don’t do it if
you don’t feel totally comfortable doing it, because you need to make
your position completely clear that you will not stand for this
treatment any more. You may need to practice beforehand with
someone you trust, like a parent or good friend.
 Reach out for help – especially if the behavior’s really getting to
you. You deserve backup. See if there’s someone who can listen,
help you process what’s going on and work through it – a friend,
relative or maybe an adult you trust.
Solutions
 Protect your accounts. Don’t share your passwords with anyone –
even your closest friends, who may not be close forever – and
password-protect your phone so no one can use it to impersonate
you.
 Use available tech tools. Most social media apps and services
allow you to block the person. Whether the harassment’s in an app,
texting, comments or tagged photos, do yourself a favor and block
the person. You can also report the problem to the service. That
probably won’t end it, but you don’t need the harassment in your
face, and you’ll be less tempted to respond. If you’re getting threats
of physical harm, you should call your local police (with a parent or
guardian’s help) and consider reporting it to school authorities.
References:
 https://www.stopbullying.gov/cyberbullying/wh
at-is-it/index.html
 https://english.binus.ac.id/2015/06/22/what-
are-the-causes-of-cyber-bullying/

More Related Content

What's hot

What's hot (19)

Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
 
Cyberwellness talk by mdm saedah 2011 160211
Cyberwellness talk by mdm saedah 2011 160211Cyberwellness talk by mdm saedah 2011 160211
Cyberwellness talk by mdm saedah 2011 160211
 
Cyber wellness 2
Cyber wellness 2Cyber wellness 2
Cyber wellness 2
 
SOCIAL MEDIA AWARENESS MONTH
SOCIAL MEDIA AWARENESS MONTHSOCIAL MEDIA AWARENESS MONTH
SOCIAL MEDIA AWARENESS MONTH
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Bullying [autosaved]
Bullying [autosaved]Bullying [autosaved]
Bullying [autosaved]
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying -
Cyberbullying - Cyberbullying -
Cyberbullying -
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
empowerment technology Pongyan*Agravante
empowerment technology Pongyan*Agravanteempowerment technology Pongyan*Agravante
empowerment technology Pongyan*Agravante
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Netiquette & internet safety
Netiquette & internet safetyNetiquette & internet safety
Netiquette & internet safety
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 

Similar to Cyberbullying

C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GArissa Ablao
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying estegiulimazziotti96
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngmiliarguelles1
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaamiliarguelles
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngmiliarguelles1
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaasofisalazar00
 
Week7assgn2KwanHoY
Week7assgn2KwanHoYWeek7assgn2KwanHoY
Week7assgn2KwanHoYYipKwanHo
 
Week7 assgn2suphaphonp
Week7 assgn2suphaphonpWeek7 assgn2suphaphonp
Week7 assgn2suphaphonpJingboWang9
 
Cyber bullying-and-internet-addiction
Cyber bullying-and-internet-addictionCyber bullying-and-internet-addiction
Cyber bullying-and-internet-addictionStephanie Nichole Ho
 
Cyber bullying-and-internet-addiction
Cyber bullying-and-internet-addictionCyber bullying-and-internet-addiction
Cyber bullying-and-internet-addictionKingRupertRaphaelHab
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenHomeGuides
 
Cyber bullying project
Cyber bullying projectCyber bullying project
Cyber bullying projectvolpila
 
Cyberbullying and internent addiction
Cyberbullying  and internent addictionCyberbullying  and internent addiction
Cyberbullying and internent addictionChristopher Mejia
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
08 25 cyberbullying tips
08 25 cyberbullying tips08 25 cyberbullying tips
08 25 cyberbullying tipscaroline2012cox
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican GuardApostolos Syropoulos
 

Similar to Cyberbullying (20)

C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying este
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Week7assgn2KwanHoY
Week7assgn2KwanHoYWeek7assgn2KwanHoY
Week7assgn2KwanHoY
 
Week7 assgn2suphaphonp
Week7 assgn2suphaphonpWeek7 assgn2suphaphonp
Week7 assgn2suphaphonp
 
Edp 279 unit 2.4
Edp 279 unit 2.4Edp 279 unit 2.4
Edp 279 unit 2.4
 
Cyber bullying-and-internet-addiction
Cyber bullying-and-internet-addictionCyber bullying-and-internet-addiction
Cyber bullying-and-internet-addiction
 
Cyber bullying-and-internet-addiction
Cyber bullying-and-internet-addictionCyber bullying-and-internet-addiction
Cyber bullying-and-internet-addiction
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Cyber bullying project
Cyber bullying projectCyber bullying project
Cyber bullying project
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
Cyberbullying and internent addiction
Cyberbullying  and internent addictionCyberbullying  and internent addiction
Cyberbullying and internent addiction
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
08 25 cyberbullying tips
08 25 cyberbullying tips08 25 cyberbullying tips
08 25 cyberbullying tips
 
Putting your life online
Putting your life onlinePutting your life online
Putting your life online
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican Guard
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 

Recently uploaded

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 

Recently uploaded (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 

Cyberbullying

  • 1. Cyber bullying: Cause, Effects, and Solution By: Manabat & Toledo
  • 2. Cyber bullying  Cyber bullying is bullying that takes place over digital devices like cell phones, computers, and tablets.  It can include sharing personal or private information about someone else causing embarrassment or humiliation.
  • 3. Causes  Cyber bullying happens for many of the same reasons as any other type of bullying, but it may be even more appealing because it can be done anonymously  Revenge motivated some individuals to do cyber bullying
  • 4. Causes  Some individuals would bully only to boost their egos.
  • 5. Effects:  For people who are doing cyber bullying, a bad reputation in the future is waiting for them if they get caught. Since cyber bullying is also an action of bullying, there is a law for it and the victims may report the case if they have enough proof.
  • 6. Effects:  As for the ones who develop cyber bullying, they become stressed. It would lead them to do negative things such as skipping school, locking themselves in their room or worst, they would try to attempt suicide.
  • 7. Solutions  Know that it’s not your fault. What people call “bullying” is sometimes an argument between two people. But if someone is repeatedly cruel to you, that’s bullying and you mustn’t blame yourself. No one deserves to be treated cruelly.  Don’t respond or retaliate. Sometimes a reaction is exactly what aggressors are looking for because they think it gives them power over you, and you don’t want to empower a bully. As for retaliating, getting back at a bully turns you into one – and can turn one mean act into a chain reaction. If you can, remove yourself from the situation. If you can’t, sometimes humor disarms or distracts a person from bullying.
  • 8. Solutions  Save the evidence. The only good news about bullying online or on phones is that it can usually be captured, saved, and shown to someone who can help. You can save that evidence in case things escalate.  Tell the person to stop. This is completely up to you – don’t do it if you don’t feel totally comfortable doing it, because you need to make your position completely clear that you will not stand for this treatment any more. You may need to practice beforehand with someone you trust, like a parent or good friend.  Reach out for help – especially if the behavior’s really getting to you. You deserve backup. See if there’s someone who can listen, help you process what’s going on and work through it – a friend, relative or maybe an adult you trust.
  • 9. Solutions  Protect your accounts. Don’t share your passwords with anyone – even your closest friends, who may not be close forever – and password-protect your phone so no one can use it to impersonate you.  Use available tech tools. Most social media apps and services allow you to block the person. Whether the harassment’s in an app, texting, comments or tagged photos, do yourself a favor and block the person. You can also report the problem to the service. That probably won’t end it, but you don’t need the harassment in your face, and you’ll be less tempted to respond. If you’re getting threats of physical harm, you should call your local police (with a parent or guardian’s help) and consider reporting it to school authorities.