SlideShare a Scribd company logo
1 of 17
1
Cyberbullying
Cyberbullying is bullying that takes place over digital
devices like cell phones, computers, and
tablets. Cyberbullying can occur through SMS, Text,
and apps, or online in social media, forums, or gaming
where people can view, participate in, or share content.
NURAY, ZHAZIRA, AKNUR
3
Ethical perspective of
Cyber bullying
When the majority of people think about ethical
issues revolving around technologies, they think
about things like hacking or misuse of personal
data. However, despite all of those problems,
cyber bullying is actually one of the biggest
concern
Cyberbullying includes sending, posting, or
sharing negative, harmful, false, or mean content
about someone else.
4
Cyber bullying:
Direct Attacks
Direct attacks of cyber bullying includes text
messaging harassment, stealing
passwords, impersonation, sending various
pictures through emails & social networks,
and using blogs & websites.
5
● Text messaging harassment - Bullies
may send offensive, threatening, or hateful
messages to others without knowing that it
can seriously affect someone because
certain words can be serious and hurtful.
● Passwords stealing - The bully may steal
someone's password, go into the account,
and start to chat with other people, faking
to be the real person of the account. The
bully may even say hurtful or abusive
things and cause anger and hatred to that
person's friends or strangers.
● Blogs & Websites - People sometimes
use blogs as a way to damage others'
privacy and reputation. They create fake
blogs or websites pretending to be the real
person and plan to humiliate them.
Types of
Direct
Attacks
Cyber
bullying
By Proxy
When the cyber bully
commands other person or
someone to abuse, it's called,
"Cyber bullying by proxy“. It is
one of the most harmful cyber
bullying because it gets a lot
of people involved and it may
be anonymous.
6
Cyber bullying By Proxy
One serious example of cyber bullying by proxy is
where the bullies take complete control of the
victim's account and send mean messages to all the
friends on the list. The bully may also hack into the
victim's private account and steal their password so
the victim can't get into his/her account. After doing
that, they can even set up a new account faking to
be the victim. This would cause a lot of problems and
will most likely bring anger to the friends of the
victim. Most of the times, the friends would not know
that it was the cyber bully doing it.
7
Is it her?Why did
she say
that?
I am so
angry!!!!
Reasons for Cyber bullying
Boredom &
Entertainment
Bullies think harassing and
humiliating someone is funny
when it's actually not.
Peer Pressure
Cyber bullies generally think that
bullying others through social net
works or any other site is normal
and acceptable with their friends
by their sides.
Power
Bullies tend to bully other people
because they think it will show
others that they are powerful and
have absolute control of them.
8
Anonymity
Since the bullies can easily avoid
facing the victims , it provides the
m with the illusion that they won't
get caught.
Ignorance of the
consequences
Most of the cyber bullies do not
realize the effects of it for
themselves.
Revenge / Frustration
Cyber bullies don't see themselves
as bullies, but they are just help in
attempting to get back at someone
who maltreated them.
Why do people cyber bully others?
Effects of Cyber
bullying
Anxiety / Depression
The victims of cyber
bullying often makes
them doubt their worth
and value. When they get
bullied, they experience
anxiety and extreme
depression, which may
also lead to other
illnesses.
Bullying others
Cyber bullying victims
may sometimes receive
too much pain that they
would do the same thing
that they received to harm
others
Suicide
When the victims are
seriously threatened and
tormented by the bullies
through text messages,
social media, and instant
messaging, they end their
life by suiciding to stop
the pain from the
tormentors. 9
10
More Consequences of
Cyber bullying
● Mood changes
● Stress-related disorders &
other disorders
● Isolation from friends and
family
Statistics of Cyber
bullying
11
● of cyber bullying victims experience low self esteem & other
disorders and even considers suicide.
75%
● of people who experiences cyber bullying tends to not report the
abuse but rather keep to themselves until it completely destroys
them or they choose to suicide.
90%
● of people think that cyber bullying is an easier way to harass
others than bullying in person because you can easily get
away with it.
81%
Statistics in Kazakhstan
Libel
Insult
Convicted
persons
Justified
persons
Convicted
persons
Justified
persons
2018 4 14 5 7
2019 2 13 1 5
2020(4 month) 1 4 0 0
12
13
Graph on Cyber bullying
Ways to alleviate Cyber
bullying (Prevention)
14
1 2 3
15
Situation in Kazakhstan
President of the Internet Association of Kazakhstan ALE Shavkat Sabirov said
that from 2011 to 2019, 19 thousand messages about bullying were
received by the society.
Arys, Kazakhstan
"In the small town of Arys, they found and arrested
in time a man who created a group on the Telegram
channel and persuaded children to commit suicidal
behavior. Games such as «50 steps to paradise»
appeared in the Kazakh language, - it was said in an
online briefing on the CCS site
16
Recall, on September 1, Kassym-Jomart
Tokayev instructed to adopt a law to protect
citizens and children from cyberbullying. The
President noted that the time has come to take
legislative measures to protect citizens,
especially children, from cyberbullying
17
THANK YOU FOR ATTENTION
Please, be polite both in real life
and in the virtual world

More Related Content

What's hot (20)

Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Parents must know about cyber bullying 1
Parents must know about cyber bullying 1Parents must know about cyber bullying 1
Parents must know about cyber bullying 1
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Safety @ Cyber
Safety @ CyberSafety @ Cyber
Safety @ Cyber
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
SOCIAL MEDIA AWARENESS MONTH
SOCIAL MEDIA AWARENESS MONTHSOCIAL MEDIA AWARENESS MONTH
SOCIAL MEDIA AWARENESS MONTH
 
Current Issues Powerpt
Current Issues PowerptCurrent Issues Powerpt
Current Issues Powerpt
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Similar to Cyber bullying

Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.jessy0121
 
Cyberbullying and social media
Cyberbullying and social mediaCyberbullying and social media
Cyberbullying and social mediaevieasmedia
 
Cyberbullying full
Cyberbullying fullCyberbullying full
Cyberbullying fullLiam1997
 
Cyberbullying- Lacson, Espinosa.pdf
Cyberbullying- Lacson, Espinosa.pdfCyberbullying- Lacson, Espinosa.pdf
Cyberbullying- Lacson, Espinosa.pdfYnigoXaviLacson
 
Cabatian & Estrada 1
Cabatian & Estrada 1Cabatian & Estrada 1
Cabatian & Estrada 1Samphiriane
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican GuardApostolos Syropoulos
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullyingZiar Khan
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentationSally Garza
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentationSally Garza
 
Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By AnamikaGisha Mathyari
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 

Similar to Cyber bullying (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
Cyberbullying and social media
Cyberbullying and social mediaCyberbullying and social media
Cyberbullying and social media
 
Cyberbullying full
Cyberbullying fullCyberbullying full
Cyberbullying full
 
cyber bulling
 cyber bulling cyber bulling
cyber bulling
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 
Cyberbullying- Lacson, Espinosa.pdf
Cyberbullying- Lacson, Espinosa.pdfCyberbullying- Lacson, Espinosa.pdf
Cyberbullying- Lacson, Espinosa.pdf
 
Cabatian & Estrada 1
Cabatian & Estrada 1Cabatian & Estrada 1
Cabatian & Estrada 1
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican Guard
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentation
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By Anamika
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Recently uploaded

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 

Recently uploaded (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 

Cyber bullying

  • 1. 1
  • 2. Cyberbullying Cyberbullying is bullying that takes place over digital devices like cell phones, computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content. NURAY, ZHAZIRA, AKNUR
  • 3. 3 Ethical perspective of Cyber bullying When the majority of people think about ethical issues revolving around technologies, they think about things like hacking or misuse of personal data. However, despite all of those problems, cyber bullying is actually one of the biggest concern Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else.
  • 4. 4 Cyber bullying: Direct Attacks Direct attacks of cyber bullying includes text messaging harassment, stealing passwords, impersonation, sending various pictures through emails & social networks, and using blogs & websites.
  • 5. 5 ● Text messaging harassment - Bullies may send offensive, threatening, or hateful messages to others without knowing that it can seriously affect someone because certain words can be serious and hurtful. ● Passwords stealing - The bully may steal someone's password, go into the account, and start to chat with other people, faking to be the real person of the account. The bully may even say hurtful or abusive things and cause anger and hatred to that person's friends or strangers. ● Blogs & Websites - People sometimes use blogs as a way to damage others' privacy and reputation. They create fake blogs or websites pretending to be the real person and plan to humiliate them. Types of Direct Attacks
  • 6. Cyber bullying By Proxy When the cyber bully commands other person or someone to abuse, it's called, "Cyber bullying by proxy“. It is one of the most harmful cyber bullying because it gets a lot of people involved and it may be anonymous. 6
  • 7. Cyber bullying By Proxy One serious example of cyber bullying by proxy is where the bullies take complete control of the victim's account and send mean messages to all the friends on the list. The bully may also hack into the victim's private account and steal their password so the victim can't get into his/her account. After doing that, they can even set up a new account faking to be the victim. This would cause a lot of problems and will most likely bring anger to the friends of the victim. Most of the times, the friends would not know that it was the cyber bully doing it. 7 Is it her?Why did she say that? I am so angry!!!!
  • 8. Reasons for Cyber bullying Boredom & Entertainment Bullies think harassing and humiliating someone is funny when it's actually not. Peer Pressure Cyber bullies generally think that bullying others through social net works or any other site is normal and acceptable with their friends by their sides. Power Bullies tend to bully other people because they think it will show others that they are powerful and have absolute control of them. 8 Anonymity Since the bullies can easily avoid facing the victims , it provides the m with the illusion that they won't get caught. Ignorance of the consequences Most of the cyber bullies do not realize the effects of it for themselves. Revenge / Frustration Cyber bullies don't see themselves as bullies, but they are just help in attempting to get back at someone who maltreated them. Why do people cyber bully others?
  • 9. Effects of Cyber bullying Anxiety / Depression The victims of cyber bullying often makes them doubt their worth and value. When they get bullied, they experience anxiety and extreme depression, which may also lead to other illnesses. Bullying others Cyber bullying victims may sometimes receive too much pain that they would do the same thing that they received to harm others Suicide When the victims are seriously threatened and tormented by the bullies through text messages, social media, and instant messaging, they end their life by suiciding to stop the pain from the tormentors. 9
  • 10. 10 More Consequences of Cyber bullying ● Mood changes ● Stress-related disorders & other disorders ● Isolation from friends and family
  • 11. Statistics of Cyber bullying 11 ● of cyber bullying victims experience low self esteem & other disorders and even considers suicide. 75% ● of people who experiences cyber bullying tends to not report the abuse but rather keep to themselves until it completely destroys them or they choose to suicide. 90% ● of people think that cyber bullying is an easier way to harass others than bullying in person because you can easily get away with it. 81%
  • 13. 13 Graph on Cyber bullying
  • 14. Ways to alleviate Cyber bullying (Prevention) 14 1 2 3
  • 15. 15 Situation in Kazakhstan President of the Internet Association of Kazakhstan ALE Shavkat Sabirov said that from 2011 to 2019, 19 thousand messages about bullying were received by the society. Arys, Kazakhstan "In the small town of Arys, they found and arrested in time a man who created a group on the Telegram channel and persuaded children to commit suicidal behavior. Games such as «50 steps to paradise» appeared in the Kazakh language, - it was said in an online briefing on the CCS site
  • 16. 16 Recall, on September 1, Kassym-Jomart Tokayev instructed to adopt a law to protect citizens and children from cyberbullying. The President noted that the time has come to take legislative measures to protect citizens, especially children, from cyberbullying
  • 17. 17 THANK YOU FOR ATTENTION Please, be polite both in real life and in the virtual world