SlideShare a Scribd company logo
1 of 1
FOMO = FEAR OF MISSING OUT
This is the title of a new Hungarian film.
There are about 200 Internet slang terms.
Selfie was Oxford Dictionary’s word of the year in 2013.
Nomophobia is a proposed name for the phobia of being out of cellular phone contact.
FOBO = Fear of Being Offline
JOMO = Joy of Missing Out
TBT = Throw Back Thursday (posting personal photos, songs, or images from the past)
TBH = To Be Honest
IMO = In My Opinion
ASLP = Age, Sex, Location, Picture – BE CAREFUL!!!
FYEO = For Your Eyes Only
CD9 = Code9 (parents around)
POS = Parents Over Shoulder
‘Code’ puts a child in emotional or physical danger.
Words actually do hurt. The hurt is multiplied when others join in a “group” slam (criticise
severely) online, and cause sometimes irreparable damage to a person’s self esteem and
outlook on life.
Be proactive. If you receive inappropriate content, tell your friends not to send offensive
content. Talk to your parents or teachers about it.
Sexting is sending, receiving, or forwarding sexually explicit messages. (sex + texting,
2012)
DON’T COMMUNICATE WITH STRANGERS ONLINE. !!!
Online Challenges
Influencers, YouTubers
CYBER BULLYING causes emotional damage.
Here are some examples of how cyber bullying can look like:
1. Harassment
Harassment usually involves the bully sending offensive and threatening messages via
instant messaging, SMS or any other forms of communication to his or her target.
2. Impersonation
Impersonation is when someone creates a fake profile in another person’s name or hacking
into another person’s account. The cyber bully pretends to be his or her victim online and
tarnishes the victim’s reputation.
3. Flaming
Kids will be kids – they argue over some small matter and make up with each other after a
period of time. But sometimes the anger can build up within individuals and a small
argument can sometimes escalate into a case of cyber bullying when things become
extremely heated.
4. Denigration
Denigration is an attempt to damage the victim’s reputation or ruin the friendships that he
or she has by spreading unfounded gossip or rumours online.
5. Exclusion
Gathering a bunch of friends in the virtual space for online group activities such as group
conversations and multiplayer games is extremely easy these days. Exclusion is
intentionally excluding or singling someone out from these virtual groups.
6. Outing
Friends often share secrets which they promise to keep for each other. But when the
friendship turns sour, the promise can easily be broken and outing may occur. Outing is a
form of cyber bullying in which the cyber bully uses technological means to publicly
“[share] private information without permission with the intent to hurt” the victim 4.
7. Trickery
The cyber bully may employ methods to trick his or her victim into believing that “they are
speaking in confidence with a close friend so that they share sensitive information” such as
secrets or humiliating information. Once the cyber bully has obtained the information, he or
she will use it against the victim by publicly disseminating it to others, “in an attempt to
shame the victim.”
8. Cyber stalking
Cyber stalking is a form of harassment. Victims usually receive threatening and disparaging
electronic messages from cyber bullies.
Cyber bullying is an issue that should not be taken lightly because falling prey to it
can lead to unthinkable consequences. While some victims may be able to successfully
recover from his or her sufferings, there are also others who suffer in silence and
choose to take their own lives to end the pain.

More Related Content

Similar to FOMO.docx

Parents Association Cyberbullying presentation
Parents Association Cyberbullying presentationParents Association Cyberbullying presentation
Parents Association Cyberbullying presentationColEanna
 
Online Responsibility for Teens
Online Responsibility for TeensOnline Responsibility for Teens
Online Responsibility for TeensStephen Curtis
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.jessy0121
 
Cyberbullying and internent addiction
Cyberbullying  and internent addictionCyberbullying  and internent addiction
Cyberbullying and internent addictionChristopher Mejia
 
Cyberbulling
CyberbullingCyberbulling
Cyberbullingeliasfiad
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingNuraySmat
 
Current Issues Powerpt
Current Issues PowerptCurrent Issues Powerpt
Current Issues Powerptdulud2lm
 
DigitalSkills Presentation: Cyberbullying
DigitalSkills Presentation: CyberbullyingDigitalSkills Presentation: Cyberbullying
DigitalSkills Presentation: Cyberbullyingdigitalskills
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullyingZiar Khan
 
Kevin Cullen Cyber Bullying
Kevin Cullen Cyber BullyingKevin Cullen Cyber Bullying
Kevin Cullen Cyber BullyingKevin
 

Similar to FOMO.docx (20)

cyber bulling
 cyber bulling cyber bulling
cyber bulling
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 
Parents Association Cyberbullying presentation
Parents Association Cyberbullying presentationParents Association Cyberbullying presentation
Parents Association Cyberbullying presentation
 
Online Responsibility for Teens
Online Responsibility for TeensOnline Responsibility for Teens
Online Responsibility for Teens
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
Persuasive Essay About Bullying
Persuasive Essay About BullyingPersuasive Essay About Bullying
Persuasive Essay About Bullying
 
Persuasive Essays On Bullying
Persuasive Essays On BullyingPersuasive Essays On Bullying
Persuasive Essays On Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Stephanie nichole ho
Stephanie nichole hoStephanie nichole ho
Stephanie nichole ho
 
Cyberbullying and internent addiction
Cyberbullying  and internent addictionCyberbullying  and internent addiction
Cyberbullying and internent addiction
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Effects Of Bullying Essay
Effects Of Bullying EssayEffects Of Bullying Essay
Effects Of Bullying Essay
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbulling
CyberbullingCyberbulling
Cyberbulling
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Current Issues Powerpt
Current Issues PowerptCurrent Issues Powerpt
Current Issues Powerpt
 
DigitalSkills Presentation: Cyberbullying
DigitalSkills Presentation: CyberbullyingDigitalSkills Presentation: Cyberbullying
DigitalSkills Presentation: Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
Kevin Cullen Cyber Bullying
Kevin Cullen Cyber BullyingKevin Cullen Cyber Bullying
Kevin Cullen Cyber Bullying
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

FOMO.docx

  • 1. FOMO = FEAR OF MISSING OUT This is the title of a new Hungarian film. There are about 200 Internet slang terms. Selfie was Oxford Dictionary’s word of the year in 2013. Nomophobia is a proposed name for the phobia of being out of cellular phone contact. FOBO = Fear of Being Offline JOMO = Joy of Missing Out TBT = Throw Back Thursday (posting personal photos, songs, or images from the past) TBH = To Be Honest IMO = In My Opinion ASLP = Age, Sex, Location, Picture – BE CAREFUL!!! FYEO = For Your Eyes Only CD9 = Code9 (parents around) POS = Parents Over Shoulder ‘Code’ puts a child in emotional or physical danger. Words actually do hurt. The hurt is multiplied when others join in a “group” slam (criticise severely) online, and cause sometimes irreparable damage to a person’s self esteem and outlook on life. Be proactive. If you receive inappropriate content, tell your friends not to send offensive content. Talk to your parents or teachers about it. Sexting is sending, receiving, or forwarding sexually explicit messages. (sex + texting, 2012) DON’T COMMUNICATE WITH STRANGERS ONLINE. !!! Online Challenges Influencers, YouTubers CYBER BULLYING causes emotional damage. Here are some examples of how cyber bullying can look like: 1. Harassment Harassment usually involves the bully sending offensive and threatening messages via instant messaging, SMS or any other forms of communication to his or her target. 2. Impersonation Impersonation is when someone creates a fake profile in another person’s name or hacking into another person’s account. The cyber bully pretends to be his or her victim online and tarnishes the victim’s reputation. 3. Flaming Kids will be kids – they argue over some small matter and make up with each other after a period of time. But sometimes the anger can build up within individuals and a small argument can sometimes escalate into a case of cyber bullying when things become extremely heated. 4. Denigration Denigration is an attempt to damage the victim’s reputation or ruin the friendships that he or she has by spreading unfounded gossip or rumours online. 5. Exclusion Gathering a bunch of friends in the virtual space for online group activities such as group conversations and multiplayer games is extremely easy these days. Exclusion is intentionally excluding or singling someone out from these virtual groups. 6. Outing Friends often share secrets which they promise to keep for each other. But when the friendship turns sour, the promise can easily be broken and outing may occur. Outing is a form of cyber bullying in which the cyber bully uses technological means to publicly “[share] private information without permission with the intent to hurt” the victim 4. 7. Trickery The cyber bully may employ methods to trick his or her victim into believing that “they are speaking in confidence with a close friend so that they share sensitive information” such as secrets or humiliating information. Once the cyber bully has obtained the information, he or she will use it against the victim by publicly disseminating it to others, “in an attempt to shame the victim.” 8. Cyber stalking Cyber stalking is a form of harassment. Victims usually receive threatening and disparaging electronic messages from cyber bullies. Cyber bullying is an issue that should not be taken lightly because falling prey to it can lead to unthinkable consequences. While some victims may be able to successfully recover from his or her sufferings, there are also others who suffer in silence and choose to take their own lives to end the pain.