SlideShare a Scribd company logo
1 of 6
Cyber Bullying
All there is to know about
cyberbullying
what is Cyberbullying
Cyberbullying is when a child or teen is
tormented, threatened, harassed, humiliated,
embarrassed or otherwise targeted by another
child or teen using the Internet, interactive or
digital technologies or cell phones. It has to have
a minor on both sides, or at least have been
instigated by a minor against another minor.
When adults become involved it is classified as
something different.
Different types of Cyberbullying
1. Direct Attacks- messages sent directly to the
victim.
2. Cyberbullying by Proxy- Using someone else
to cyber bully a victim, this proxy may know
they are cyber bullying and they may not.
What do yo say??
In groups of four discuss the
effects of Cyberbullying and
come up with solutions to
help your peers at school
who are victims of
cyberbullying write a report about your
findings or create an anti-cyberbullying poster
Cyber bullying

More Related Content

What's hot

Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?AJ Tivol
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingringw1sl
 
Cyberbulling - TIC
Cyberbulling - TICCyberbulling - TIC
Cyberbulling - TICsanticomolli
 
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji... 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...Jim "Brodie" Brazell
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingdrogt1mm
 
Cyberbullying powerpoint davon b
Cyberbullying powerpoint davon bCyberbullying powerpoint davon b
Cyberbullying powerpoint davon bDrbmusic
 
Cyberbullying by Manuel Negrito
Cyberbullying by Manuel NegritoCyberbullying by Manuel Negrito
Cyberbullying by Manuel NegritoManuelNegrito
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingkntrainer
 
Adrian y santiago cyberbulying
Adrian y santiago cyberbulying Adrian y santiago cyberbulying
Adrian y santiago cyberbulying dk_10
 
Bulling (security)
Bulling (security)Bulling (security)
Bulling (security)pedroximenez
 

What's hot (18)

Angelo G. mendiola
Angelo G. mendiolaAngelo G. mendiola
Angelo G. mendiola
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Olmv cyberbullying
Olmv cyberbullyingOlmv cyberbullying
Olmv cyberbullying
 
Nico santi y tomy
Nico santi y tomyNico santi y tomy
Nico santi y tomy
 
Cyberbulling - TIC
Cyberbulling - TICCyberbulling - TIC
Cyberbulling - TIC
 
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji... 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying powerpoint davon b
Cyberbullying powerpoint davon bCyberbullying powerpoint davon b
Cyberbullying powerpoint davon b
 
Cyberbullying by Manuel Negrito
Cyberbullying by Manuel NegritoCyberbullying by Manuel Negrito
Cyberbullying by Manuel Negrito
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Adrian y santiago cyberbulying
Adrian y santiago cyberbulying Adrian y santiago cyberbulying
Adrian y santiago cyberbulying
 
Bulling (security)
Bulling (security)Bulling (security)
Bulling (security)
 

Viewers also liked

Global Chemists’ Code of Ethics Workshop Kuala Lumpur, Malaysia
Global Chemists’ Code of Ethics Workshop Kuala Lumpur, MalaysiaGlobal Chemists’ Code of Ethics Workshop Kuala Lumpur, Malaysia
Global Chemists’ Code of Ethics Workshop Kuala Lumpur, MalaysiaTaghreed Al-Noor
 
Seeing is Believing: The use of information graphics and visualisation for pr...
Seeing is Believing: The use of information graphics and visualisation for pr...Seeing is Believing: The use of information graphics and visualisation for pr...
Seeing is Believing: The use of information graphics and visualisation for pr...Ray Poynter
 
David Hodges Current Resume.
David Hodges Current Resume.David Hodges Current Resume.
David Hodges Current Resume.David Hodges
 
Ritma Teknoloji Yazılım Firması Sunum
Ritma Teknoloji Yazılım Firması Sunum Ritma Teknoloji Yazılım Firması Sunum
Ritma Teknoloji Yazılım Firması Sunum Ritma Teknoloji
 
Families and Friends of Murder Victims June - 2016 newsletter
Families and Friends of Murder Victims   June - 2016 newsletterFamilies and Friends of Murder Victims   June - 2016 newsletter
Families and Friends of Murder Victims June - 2016 newsletterffmv
 
Curso: Redes y comunicaciones II: 02 CaaS, NaaS
Curso: Redes y comunicaciones II: 02 CaaS, NaaSCurso: Redes y comunicaciones II: 02 CaaS, NaaS
Curso: Redes y comunicaciones II: 02 CaaS, NaaSJack Daniel Cáceres Meza
 
Zero conditional
Zero conditionalZero conditional
Zero conditionalSriosm23
 
Standar operasional prosedur garam yodium
Standar operasional prosedur garam yodiumStandar operasional prosedur garam yodium
Standar operasional prosedur garam yodiumyusup firmawan
 
Standar operasional prosedur vitamin a nifas
Standar operasional prosedur vitamin a nifasStandar operasional prosedur vitamin a nifas
Standar operasional prosedur vitamin a nifasyusup firmawan
 

Viewers also liked (11)

Global Chemists’ Code of Ethics Workshop Kuala Lumpur, Malaysia
Global Chemists’ Code of Ethics Workshop Kuala Lumpur, MalaysiaGlobal Chemists’ Code of Ethics Workshop Kuala Lumpur, Malaysia
Global Chemists’ Code of Ethics Workshop Kuala Lumpur, Malaysia
 
Seeing is Believing: The use of information graphics and visualisation for pr...
Seeing is Believing: The use of information graphics and visualisation for pr...Seeing is Believing: The use of information graphics and visualisation for pr...
Seeing is Believing: The use of information graphics and visualisation for pr...
 
David Hodges Current Resume.
David Hodges Current Resume.David Hodges Current Resume.
David Hodges Current Resume.
 
Ritma Teknoloji Yazılım Firması Sunum
Ritma Teknoloji Yazılım Firması Sunum Ritma Teknoloji Yazılım Firması Sunum
Ritma Teknoloji Yazılım Firması Sunum
 
Families and Friends of Murder Victims June - 2016 newsletter
Families and Friends of Murder Victims   June - 2016 newsletterFamilies and Friends of Murder Victims   June - 2016 newsletter
Families and Friends of Murder Victims June - 2016 newsletter
 
Curso: Redes y comunicaciones II: 02 CaaS, NaaS
Curso: Redes y comunicaciones II: 02 CaaS, NaaSCurso: Redes y comunicaciones II: 02 CaaS, NaaS
Curso: Redes y comunicaciones II: 02 CaaS, NaaS
 
Sangue bom matriz
Sangue bom matrizSangue bom matriz
Sangue bom matriz
 
Zero conditional
Zero conditionalZero conditional
Zero conditional
 
Standar operasional prosedur garam yodium
Standar operasional prosedur garam yodiumStandar operasional prosedur garam yodium
Standar operasional prosedur garam yodium
 
Standar operasional prosedur vitamin a nifas
Standar operasional prosedur vitamin a nifasStandar operasional prosedur vitamin a nifas
Standar operasional prosedur vitamin a nifas
 
عمال التراحيل - عطية الصيرفي
عمال التراحيل  - عطية الصيرفيعمال التراحيل  - عطية الصيرفي
عمال التراحيل - عطية الصيرفي
 

Similar to Cyber bullying

Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Joyce Hirsh
 
Cyberbullyng: Causes, Effects, and Possible Solutions
Cyberbullyng: Causes, Effects, and Possible SolutionsCyberbullyng: Causes, Effects, and Possible Solutions
Cyberbullyng: Causes, Effects, and Possible SolutionsJericoDiola
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingJoe Gauder
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullyingseswear9388
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullyingZiar Khan
 
Cyberbulling
CyberbullingCyberbulling
Cyberbullingeliasfiad
 
Sarah doty cyber bullying
Sarah doty cyber bullyingSarah doty cyber bullying
Sarah doty cyber bullyingSarah Doty
 
The Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingThe Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingKatie_Waters
 
Cyber safety word for edmodo
Cyber safety word for edmodoCyber safety word for edmodo
Cyber safety word for edmodoFolashadeOlaleye
 

Similar to Cyber bullying (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02
 
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
 
Cyberbullyng: Causes, Effects, and Possible Solutions
Cyberbullyng: Causes, Effects, and Possible SolutionsCyberbullyng: Causes, Effects, and Possible Solutions
Cyberbullyng: Causes, Effects, and Possible Solutions
 
Edp 279 unit 2.4
Edp 279 unit 2.4Edp 279 unit 2.4
Edp 279 unit 2.4
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
cyber bulling
 cyber bulling cyber bulling
cyber bulling
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbulling
CyberbullingCyberbulling
Cyberbulling
 
Sarah doty cyber bullying
Sarah doty cyber bullyingSarah doty cyber bullying
Sarah doty cyber bullying
 
Nico santi y tomy
Nico santi y tomyNico santi y tomy
Nico santi y tomy
 
Nico santi y tomy
Nico santi y tomyNico santi y tomy
Nico santi y tomy
 
Cyberbulling - TIC
Cyberbulling - TICCyberbulling - TIC
Cyberbulling - TIC
 
The Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingThe Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber safety word for edmodo
Cyber safety word for edmodoCyber safety word for edmodo
Cyber safety word for edmodo
 

Cyber bullying

  • 1. Cyber Bullying All there is to know about cyberbullying
  • 2. what is Cyberbullying Cyberbullying is when a child or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child or teen using the Internet, interactive or digital technologies or cell phones. It has to have a minor on both sides, or at least have been instigated by a minor against another minor. When adults become involved it is classified as something different.
  • 3. Different types of Cyberbullying 1. Direct Attacks- messages sent directly to the victim. 2. Cyberbullying by Proxy- Using someone else to cyber bully a victim, this proxy may know they are cyber bullying and they may not.
  • 4.
  • 5. What do yo say?? In groups of four discuss the effects of Cyberbullying and come up with solutions to help your peers at school who are victims of cyberbullying write a report about your findings or create an anti-cyberbullying poster