SlideShare a Scribd company logo
1 of 13
CYBER
BULLYING
Shanice Decosta | 21238374
LEARNING
OUTCOME
S
By the end of this lesson, you should be able to:
• Identify a minimum of four types of cyberbullying
• Identify a minimum of four negative impacts of cyberbullying on
victims
• Be able to list individuals and websites that can provide support
CYBE
R
The act of
intentionally directly
or indirectly harming
or intimidating
someone
Related to technology,
computers and ICT
(information and
communication technology)
CYBER
BULLYING
What is it?
Cyberbullying is the act of
participating in malicious
online activities that are
intended to upset or harm
other individuals.
WHERE
DOES IT
HAPPEN
Online!
• Social media (e.g. Facebook,
Instagram, Snapchat)
• Gaming platforms (e.g.
Fortnite, Among Us, Roblox)
• Livestreaming platforms (e.g.
YouTube, Twitch)
WHY DOES
IT HAPPEN?
Cyberbullying occurs when an
individual with ill intent has
access to technology.
WHO ARE THE
PERPETRATORS IN
CYBERBULLYING
Perpetrator – someone who engages or initiates a
harmful activity.
• Frustrated individuals
• People seeking revenge
• People who want control
• Cyberbullying victims
(Sabella et al.,
NEGATIVE
EFFECTS OF
CYBERBULLYIN
G
Depression Anxiety
Low Self-
Esteem
Academic Issues
Stress
Isolatio
n
Mental
Illness
Behaviour
Issues
Physical Health
Issues
Sleeping
Issues
Loss of
Interest
HOW CAN WE
MITIGATE IT
Mitigate – improve something
from a worsened state
• Encourage victims to ask for
help from parents, teachers
and support services
• Block the perpetrator online
if you feel safe to do so
TYPES OF
CYBERBULLYING
Flaming – A direct, violent attack against an individual
online
Exclusion – The act of intentionally leaving an individual
out of activities with mutual friends
Harassment – Messages sent repeatedly with hurtful
intent
Doxing – Revealing an individual’s personal information
online
Cyberstalking – the act of actively watching an
individual online and sending real-life threats
Impersonation – Pretending to be an individual while
making them seem like a bad person
Outing & Trickery – Befriending an individual to reveal
their personal information without permission
(Khan et al.,
2020)
SUPPORT RESOURCES
Headspace
Kids Helpline
Lifeline
The Bully Project
SITUATION:
Eliza posted a picture of herself online. Her friends saved the
picture and have been making jokes about it in a group chat,
which has made Eliza self-conscious
Is this cyberbullying?
YES
Why?
Because they are intentionally making fun of her.
REFERENCE
S
Khan, F., Limbana, T., Zahid, T., Eskander, N., & Jahan, N. (2020). Traits, Trends, and Trajectory of
Tween and Teen Cyberbullies. Cureus, 12(8). https://doi.org/10.7759/cureus.9738
Sabella, R. A., Patchin, J. W., & Hinduja, S. (2013). Cyberbullying myths and realities. Computers in
Human Behavior, 29(6), 2703–2711. https://doi.org/10.1016/j.chb.2013.06.040

More Related Content

Similar to Cyberbullying Presentation.pptx

Similar to Cyberbullying Presentation.pptx (20)

Week7assgn2KwanHoY
Week7assgn2KwanHoYWeek7assgn2KwanHoY
Week7assgn2KwanHoY
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Week7 assgn2suphaphonp
Week7 assgn2suphaphonpWeek7 assgn2suphaphonp
Week7 assgn2suphaphonp
 
THE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital LeadersTHE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital Leaders
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 
Angelo G. mendiola
Angelo G. mendiolaAngelo G. mendiola
Angelo G. mendiola
 
Olmv cyberbullying
Olmv cyberbullyingOlmv cyberbullying
Olmv cyberbullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptx
 
cyber bulling
 cyber bulling cyber bulling
cyber bulling
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Cyberbullying Presentation.pptx

  • 2. LEARNING OUTCOME S By the end of this lesson, you should be able to: • Identify a minimum of four types of cyberbullying • Identify a minimum of four negative impacts of cyberbullying on victims • Be able to list individuals and websites that can provide support
  • 3. CYBE R The act of intentionally directly or indirectly harming or intimidating someone Related to technology, computers and ICT (information and communication technology)
  • 4. CYBER BULLYING What is it? Cyberbullying is the act of participating in malicious online activities that are intended to upset or harm other individuals.
  • 5. WHERE DOES IT HAPPEN Online! • Social media (e.g. Facebook, Instagram, Snapchat) • Gaming platforms (e.g. Fortnite, Among Us, Roblox) • Livestreaming platforms (e.g. YouTube, Twitch)
  • 6. WHY DOES IT HAPPEN? Cyberbullying occurs when an individual with ill intent has access to technology.
  • 7. WHO ARE THE PERPETRATORS IN CYBERBULLYING Perpetrator – someone who engages or initiates a harmful activity. • Frustrated individuals • People seeking revenge • People who want control • Cyberbullying victims (Sabella et al.,
  • 8. NEGATIVE EFFECTS OF CYBERBULLYIN G Depression Anxiety Low Self- Esteem Academic Issues Stress Isolatio n Mental Illness Behaviour Issues Physical Health Issues Sleeping Issues Loss of Interest
  • 9. HOW CAN WE MITIGATE IT Mitigate – improve something from a worsened state • Encourage victims to ask for help from parents, teachers and support services • Block the perpetrator online if you feel safe to do so
  • 10. TYPES OF CYBERBULLYING Flaming – A direct, violent attack against an individual online Exclusion – The act of intentionally leaving an individual out of activities with mutual friends Harassment – Messages sent repeatedly with hurtful intent Doxing – Revealing an individual’s personal information online Cyberstalking – the act of actively watching an individual online and sending real-life threats Impersonation – Pretending to be an individual while making them seem like a bad person Outing & Trickery – Befriending an individual to reveal their personal information without permission (Khan et al., 2020)
  • 12. SITUATION: Eliza posted a picture of herself online. Her friends saved the picture and have been making jokes about it in a group chat, which has made Eliza self-conscious Is this cyberbullying? YES Why? Because they are intentionally making fun of her.
  • 13. REFERENCE S Khan, F., Limbana, T., Zahid, T., Eskander, N., & Jahan, N. (2020). Traits, Trends, and Trajectory of Tween and Teen Cyberbullies. Cureus, 12(8). https://doi.org/10.7759/cureus.9738 Sabella, R. A., Patchin, J. W., & Hinduja, S. (2013). Cyberbullying myths and realities. Computers in Human Behavior, 29(6), 2703–2711. https://doi.org/10.1016/j.chb.2013.06.040