SlideShare a Scribd company logo
1 of 46
Cyber Bullying
Dr.Suresh Kumar Murugesan PhD
About the Presenter
● Dr.Suresh Kumar Murugesan is a passionate Professor, Researcher
and Positive Mental Health Practitioner from Madurai, Tamil Nadu,
India
● At present he is Heading the department of Psychology, The
American College, Madurai and Adjunct Professor of School of
Behavioural Sciences and Education at TAU
● He is very keen in learning new research studies in behavioural
Sciences and open to learn.
● His ultimate aim is to make impression in the field of Knowledge
● His area of specializations are Psychometry, Positive
Psychotherapy
Yellow
Pond
Disclaimer
● This presentation is prepared for learning
purpose only and all the images and pictures
used in this presentation are taken from google
image search.
● Due recognition was given to all the material
collected from the various sources.
● Any name or reference is missed kindly bring it to
the notice of the presenter for inclusion.
● Email - sureshkumar800@yahoo.com Thank you
Yellow
Pond
Facts About Cyberbullying
Provided by the Police Department
○ Nearly 42% of kids have been bullied online and almost one in four have had it happen more than once.
○ Among this percentage, being ignored and disrespected were the most common forms of cyberbullying.
○ Nine out of 10 middle school students have had their feelings hurt online.
○ About 75% have visited a website bashing another student.
○ Four out of 10 middle school students have had their password(s) stolen and changed by a bully who then
locked them out of their own account or sent communications posing as them.
○ About 21% of kids have received mean or threatening emails.
○ The psychological and emotional outcomes of cyber bullying are similar to real-life bullying outcomes,
except for the reality that with cyber bullying there is often no escape. School ends at 3 p.m., while the
Internet is available all the time.
○ The primary cyberbullying location where victimizing occurs, at 56%, is in chat rooms.
○ Girls are about twice as likely as boys to be victims and perpetrators of cyberbullying.
○ About 58% of kids admit someone has said mean or hurtful things to them online. More than 4 out of 10 say
it has happened more than once.
○ Cyberbullying has increased in recent years. In a national survey of 10-17 year olds, twice as many children
indicated they had been victims and perpetrators.
Bullying
● Bullying is purposeful, repeated behaviour designed to cause physical
and emotional distress.
● Cyberbullying (or online bullying) is bullying using technologies,
particularly over the internet or via mobile and gaming networks.
Cyber Bullying
Cyberbullying, or online bullying, can be defined as the use of technologies
by an individual or by a group of people to deliberately and repeatedly
upset someone else.
Cyber
Bullying
Technology can be used to carry out a wide range of
unacceptable or illegal behaviours. Cyberbullying can include:
● intimidation and threats
● harassment and stalking
● vilification/defamation
● exclusion or peer rejection
● impersonation
● unauthorised publication of personal information or images
● manipulation
Cyber Bullying
Cyberbullying can include discrimination and hate crimes, including:
● sexist bullying
● racist and faith targeted bullying
● bullying related to sexual orientation (homophobic or biphobic bullying)
● bullying related to gender identity (transphobic bullying)
● bullying of people because they have special educational needs and
disabilities
Cyberbullying can be an
extension of face-to-face
bullying, with technology
providing an additional
route to harass an
individual or group.
Cyberbullying can
be a way for
someone being
bullied face-to-face
to retaliate.
Cyberbullying can be carried out by
individuals or groups who are known to the
person being bullied.
There are also cases where individuals
have been cyberbullied by people or
groups they have never met.
Any member of the school community – pupil,
staff member, parent or carer – can be
involved in and be affected by cyberbullying.
Cyberbullying can take place between pupils;
between pupils and staff; between parents
and carers and pupils; between parents and
carers and staff; and between staff members.
Isn’t it just Free Speech?
● “Abuse is different to people expressing an honest opinion which might differ
to those of other people. Abuse aims to hurt.
● Abusers often hide behind the idea that all they are doing is expressing an
opinion or a belief, but if the content or manner of the communication is
threatening or intends to cause distress, then it may be against the law.”
Types of Cyberbullying
Cyberbullying comes in many different forms. Below is a list of types of cyberbullying someone may see or experience:
● Flaming – Online fights, name calling, and similar actions
● Disparaging – Posts or messages that target someone. This could include posts that target someone based on
their race, ethnicity, religion, gender identity, or sexual orientation.
● Exclusion – Leaving someone out of a game or group chat, or any other social media activity.
● Outing – Sharing someone’s secrets or private information.
● Trickery – Tricking someone into telling you something private and then outing them.
● Impersonation – Pretending to be someone you are not. Also known as Catfishing.
● Harassment – Repeatedly sending malicious messages.
● Cyberstalking – Continuously harassing and disparaging including threats of physical harm.
Types or Forms of Cyberbullying
● Threats and intimidation
● Harassment and Stalking
● Vilification and Defamation
● Ostracising / Peer Rejection/ Exclusion
● Identity theft/unauthorised access and impersonation
● Publicly posting, sending or forwarding personal or private information or images
Threats and intimidation ● Threats can be sent by mobile phone, email, within
online games, via comments on websites, social
networking sites or message boards.
● Threats can include violence, including sexual violence,
or threats to disclose information about someone that
may harm them, or that they are not ready to share – for
example, the threat to make someone’s sexual
orientation or gender identity known (to ‘out’ someone)
when they may not feel ready for this.
Harassment or stalking
● Repeatedly sending unwanted text or instant messages, or making phone calls
(including silent calls).
● Using public forums, such as social networking sites or message boards, to repeatedly
harass, or to post derogatory or defamatory statements.
● Tracking someone’s activity and collecting information about them, for example by
searching databases and social network services; by pretending to be other people and
‘friending’ the person; or by using spyware.
● Doxing (which comes from the slang ‘dox’ for ‘documents’) is the practice of posting
personal information about someone online without their permission.
Vilification/defamation
● Posting upsetting or defamatory remarks about an individual online, or name-calling,
general insults, and prejudice-based bullying, for example sexist, homophobic and
racist messages.
● ‘Slut-shaming’ can be defined as the practice of attacking (primarily) girls and women
on the grounds of perceived or fabricated transgressions of socially acceptable sexual
behaviours i.e. reposting of texts or images, or the fabrication of information. This
practice attacks girls and women on the grounds of their gender and sexual identities,
and aims to regulate their behaviour by sending the message that what is deemed as
sexually inappropriate conduct can be legitimately used to publically humiliate them,
whether they engage in it or not.
Ostracising/peer
rejection/exclusion
● Online exclusion may be harder to detect than people being marginalised in a physical space,
such as a classroom. Social networking sites can be an important extension of a person’s
social space and activity.
● On some services, it is possible for members to set up a closed group, which can protect
members from unwanted contact, but can also be used to exclude others. Functions that can
be used to block abusive behaviour can also be used to exclude others online.
Identity theft/unauthorised
access and impersonation
‘Hacking’ is generally used to mean accessing someone else’s account, by finding out
or guessing their username and password information for example. Unauthorised
access of systems, accounts or files is not automatically a form of cyberbullying, but it
is always a serious issue. Unauthorised access to computer material is illegal.
There are cases where sites have been set up which make use of school logos and
name, or using photographs of staff or students taken from the school website
without permission.
Publicly posting,
sending or forwarding
personal or private
information or images
● The deliberate public sharing of private content can
be designed to embarrass or humiliate, and once
such messages or content are made public,
containing them becomes very difficult.
● Creating, possessing, copying or distributing images
of children and young people under the age of 18
which are of an indecent or sexual nature is illegal,
even if they were taken in ‘fun’ or by ‘willing’ parties,
or if they were taken and distributed by the subject of
the photograph.
● Sharing private, sexually provocative or sexually
explicit photographs or films of adults (of people
aged 18 and over) without their consent, and with
intent to cause distress (‘revenge porn’), is an
offence, regardless of whether the subject initially
consented to the creation of the content or created
the pictures themselves.
Why do people cyberbully?
Reasons may include:
● personal, social or family issues
● early childhood experience, including parenting and maltreatment
● they do not like a person
● they feel provoked
● they are taking revenge or may have been bullied themselves
● an acute need for attention
● poor self-esteem, depression or anger that they cannot manage
● asserting and increasing their popularity and social status
● inability or unwillingness to empathise with others
● to feel powerful and in control
● from boredom or as a form of entertainment
Effects of Cyberbullying
When bullying happens online it can feel as if you’re being attacked everywhere, even inside your own home. It can seem
like there’s no escape. The effects can last a long time and affect a person in many ways:
● Mentally — feeling upset, embarrassed, stupid, even angry
● Emotionally — feeling ashamed or losing interest in the things you love
● Physically — tired (loss of sleep), or experiencing symptoms like stomach aches and headaches
The feeling of being laughed at or harassed by others, can prevent people from speaking up or trying to deal with the
problem. In extreme cases, cyberbullying can even lead to people taking their own lives.
Cyberbullying can affect us in many ways. But these can be overcome and people can regain their confidence and health.
Common Places of Cyberbullying
The most common places where cyberbullying occurs are:
● Social Media, such as Facebook, Instagram, Snapchat, and Tik Tok
● Text messaging and messaging apps on mobile or tablet devices
● Instant messaging, direct messaging, and online chatting over the internet
● Online forums, chat rooms, and message boards, such as Reddit
● Email
● Online gaming communities
What you can do if you are being cyberbullied
Life is hard, especially for teenagers. There is so much to worry about, and bullying can make all of that worse. You have
the right to be safe, respected, and you don’t deserve to be bullied or harassed, whether that be online or in person.
Consider the following information if you are dealing with bullying or cyberbullying:
● Talk to a trusted adult. This could be a parent, teacher, counselor, coach, or any other trustworthy adult that you
know. These people can help you and help determine if you need to take additional steps.
● Block, Document, and Report! Many sites have blocking features, and this can help alleviate the frequency of
bullying instances. Document instances of bullying and contact the sites’ administrators. Some social media sites
have divisions that investigate forms of abuse, including cyberbullying.
● If you or someone you know is in an immediate risk of danger or harm, then call 911
● If someone has committed a crime, then contact your local law enforcement
● If you are at risk for hurting yourself or someone else, contact the National Suicide Prevention Lifeline or our crisis
line
Cyberbullying Tactics
It is important to understand how children are cyberbullied so it can be easily recognized and action can be taken. Some of the most
common cyberbullying tactics include:
● Posting comments or rumors about someone online that are mean, hurtful, or embarrassing.
● Threatening to hurt someone or telling them to kill themselves.
● Posting a mean or hurtful picture or video.
● Pretending to be someone else online in order to solicit or post personal or false information about someone else.
● Posting mean or hateful names, comments, or content about any race, religion, ethnicity, or other personal characteristics
online.
● Creating a mean or hurtful webpage about someone.
● Doxing, an abbreviated form of the word documents, is a form of online harassment used to exact revenge and to threaten and
destroy the privacy of individuals by making their personal information public, including addresses, social security, credit card
and phone numbers, links to social media accounts, and other private data.
Viral Tactics: Examples
Because cyberbullying can happen in different ways, examples based on real-life experiences can provide a deeper understanding of the tactics typically used. Along with other risk factors, bullying can increase
the risk for suicide-related behaviors. Furthermore, cyberbullying can be relentless, increasing the likelihood of anxiety and depression. Some states have chosen to prosecute young people who bully for
criminal harassment, including encouraging someone to die by suicide. Some forms of cyberbullying are forms of harassment that cross the line into criminal activity, and some tactics occur in dating
relationships and can turn into interpersonal violence.
The stories below are examples of different cyberbullying tactics that could happen. In reality, with the right interventions, cyberbullying can be addressed positively to lessen harm and the negative outcomes
that could result. When not addressed, cyberbullying can have long-term mental health effects. Cyberbullying and bullying can negatively impact the lives of all who are involved.
Nude photo sharing
A teenage girl sent a nude photo of herself to her boyfriend while they were dating. After they broke up, he shared the photo with other children, who then called her hurtful, derogatory names via text and social
media.
Lies and false accusations
A group of students got into trouble at school for being drunk, and accused a girl who knew nothing about it of reporting them to school officials. They began texting her day and night, and posted hateful,
derogatory messages on social media. Other students saw their messages and joined in harassing the girl. She was bullied constantly via text, and in person at school. She eventually shut down her social media
accounts and changed her phone number. Still, the bullying at school continued.
Bullied for being economically challenged
Students posted mean, negative comments on another classmates’ social media account, commenting on his clothes and sneakers, which were not the more expensive name brands most of them were
wearing. They ridiculed him, calling him “poor” and continued the bullying in school. The boy missed many days of school trying to avoid the harassment and embarrassment.
False identity profile, sometimes referred to as a “Sockpuppet”
A girl’s classmate created a fake social media account in a boy’s name, and began an online relationship with her. Though she had not met him in person, the girl divulged personal information about herself and
her family to this “boy.” The classmate who created the fake account then shared the personal information with other children, who used it to bully, shame, and harass the girl.
Encouraging self-harm or suicide
A young boy with a physical disability and scars on his face was harassed on social media and via text by other students. They called him derogatory names, told him he’d be better off dead. They wrote “why
don’t you die?” on his school locker and encouraged him to take his own life.
Bullied for being gay
A teenage boy who was openly gay began receiving death threats via phone, text, and social media for being gay. Students created an anti-gay social media group and harassed him, posting hateful messages
about him.
Jealousy bullying
A teenage girl was harassed by other girls in her class for dating a very popular boy. The girls sent her hateful messages via text and social media, and wrote derogatory messages on her school locker.
Doxing Over Online Gaming
A teenage boy posted comments on a public gaming forum, expressing his dislike of certain game features and tactics. Another user disagreed with him in the forum, then searched for the boy’s information
online and posted his address, email address, and social media links in another comment. The boy then received multiple emails and messages from strangers threatening to come to his home and assault him,
and to block him from games.
Popular Social Media Apps and Sites
Some current popular social media venues and apps include:
● Amino: An app that lets users join online communities, chats, forums, and groups on a variety of topics based on their interests.
● Askfm: A social networking site that allows users to ask other people questions, often anonymously.
● Calculator%: A “vault” or secret app that appears harmless, but hides photos, videos, files, and browser history.
● Chatroulette: There are over 20 different chat roulette sites that allow users to instantly connect via webcam and video chat. Sites typically pair the users randomly and instantly.
● Discord: A voice-over-IP (VOIP) app that allows users to video chat with others, private message, and join, create, or participate in public and private chat rooms. This app is often used by players to chat with each other while playing videogames.
● Facebook and Facebook Live: The most commonly used social media site that is accessible on many different media platforms.
● Facebook Messenger Kids: A messaging app and platform for children.
● Houseparty: A group video chat and social networking app that allows up to eight people to video chat at once in a “room.”
● Instagram: A photo and video sharing and networking site that connects users through other social networking sites (e.g., Facebook).
● Kik: Messaging app that allows users of all ages to contact others anonymously.
● Line: A messaging app that allows users to make free phone calls, leave voice messages, and text. Users can delete texts or chats from recipient’s phone using a timer.
● LiveMe: A tool to broadcast live-streaming videos and watch other users’ videos.
● MeetMe: A dating app that connects users to others based on geographic proximity.
● Omegle: An app that pairs users with strangers in anonymous one-on-one chat sessions.
● Reddit: A site that stores social news, rates and evaluates web content, and discussion threads.
● Roblox: An online game platform with free multiplayer games created by users. Roblox allows users to communicate with each other and join groups.
● Sarahah: An anonymous messaging app that allows users to send anonymous messages to people they may know.
● Snapchat: A photo messaging app that allows for sharing pictures and short videos that are intended to be erased shortly after delivery.
● Telegram: Messaging app that allows users to share photos, videos, and files; make calls, and delete texts or chats from recipient’s phone using a timer.
● TikTok: An app that allows users to create and share their own videos where they lip-synch, sing, dance, or just talk.
● Tumblr: A social networking site that allows posting of short blogs and media.
● Twitch: A live stream platform for gamers to watch live stream content, chat, and connect
● Twitter: A microblogging site that allows users to send, read, and reply to “tweets” or short messages.
● VSCO: A photography app to capture and edit photos.
● WeChat: An app that allows user to chat with friends, and to search for people nearby and around the globe.
● WhatsApp: A private messaging app that allows users to text, send photos, videos, and location information to their contacts.
● Whisper: An anonymous social media site that allows users to post and share photo and video messages.
● YouTube: A video sharing platform that allows users to post and share videos.
● YUBO (formerly YELLOW): An app referred to as the “Tinder for teens” that allows users to swipe right or left to accept or reject the profiles of other users.
● YouNow: Broadcast, Chat, and Watch Live Video: An app that lets teens broadcast themselves live. They can see and respond to live chat or view other broadcasters and chat with them.
Risks of Social Media Apps and Sites
Social media has many benefits that must be balanced with the risks it presents. Risks to be aware of include:
● Screening for harmful content on websites and apps varies widely.
● Content posted can be incorrect, harmful, or hurtful.
● Apps and platforms can be used to share harmful or adult content.
● Apps and platforms can include users of all ages and allow children to connect with adults.
● Apps and platforms can have no moderator for chats, groups, and forums that allow all types of content to be posted or
shared.
● Apps and platforms can allow all types of content to be posted or shared.
● Privacy controls over who can view or access posted material vary across apps, and many users are not aware of how to use
them effectively.
● Apps that allow for real-time user videos “live streaming” can been used to show bullying, violence, suicide, and harmful acts
as they are happening.
● Some apps that include location information can be used to get personal information, such as someone’s age, current
location, or where someone lives.
● Apps that support telephone calls do not show up on a call log, so parents may not know who their children are talking to.
Warning Signs
Warning Signs a Child is Being Cyberbullied or is Cyberbullying Others
Many of the warning signs that cyberbullying is occurring happen around a child’s use of their device. Some of the
warning signs that a child may be involved in cyberbullying are:
● Noticeable increases or decreases in device use, including texting.
● A child exhibits emotional responses (laughter, anger, upset) to what is happening on their device.
● A child hides their screen or device when others are near, and avoids discussion about what they are doing on
their device.
● Social media accounts are shut down or new ones appear.
● A child starts to avoid social situations, even those that were enjoyed in the past.
● A child becomes withdrawn or depressed, or loses interest in people and activities.
What to Do When Cyberbullying Happens
If you notice warning signs that a child may be involved in cyberbullying, take steps to investigate that child’s digital behavior. Cyberbullying is a form of bullying,
and adults should take the same approach to address it: support the child being bullied, address the bullying behavior of a participant, and show children that
cyberbullying is taken seriously. Because cyberbullying happens online, responding to it requires different approaches. If you think that a child is involved in
cyberbullying, there are several things you can do:
● Notice – Recognize if there has been a change in mood or behavior and explore what the cause might be. Try to determine if these changes happen
around a child’s use of their digital devices.
● Talk – Ask questions to learn what is happening, how it started, and who is involved.
● Document – Keep a record of what is happening and where. Take screenshots of harmful posts or content if possible. Most laws and policies note that
bullying is a repeated behavior, so records help to document it.
● Report – Most social media platforms and schools have clear policies and reporting processes. If a classmate is cyberbullying, report it the school. You
can also contact app or social media platforms to report offensive content and have it removed. If a child has received physical threats, or if a potential
crime or illegal behavior is occurring, report it to the police.
● Support – Peers, mentors, and trusted adults can sometimes intervene publicly to positively influence a situation where negative or hurtful content posts
about a child. Public Intervention can include posting positive comments about the person targeted with bullying to try to shift the conversation in a
positive direction. It can also help to reach out to the child who is bullying and the target of the bullying to express your concern. If possible, try to
determine if more professional support is needed for those involved, such as speaking with a guidance counselor or mental health professional.
Prevent Cyberbullying for Gamers
Gaming can be a fun, safe and positive environment for all. Parents can help prevent cyberbullying of their children who play video games by:
● Playing the game with your child or observing the game to understand how it works and what a child is exposed to in the game.
● Checking in periodically with your child about who is online, playing the game with them.
● Knowing which gaming communities, and social media, and apps your child uses while gaming and their security risks which you can research online.
● Helping your child set the privacy and security settings for their games and apps.
● Teaching children about safe digital behavior, including not clicking on links from strangers; not downloading bots (software for automated tasks) or clicking on links in gaming forums; not sharing
personal information like emails, phone numbers, addresses, and passwords; not participating in bullying behavior of other players; and what to do if they observe or experience cyberbullying.
● Establishing rules about how much time a child can spend playing video games.
● Keeping an open line of communication about your child’s digital life.
There are things that gamers can do if they are experiencing cyberbullying or see it happen to others while gaming:
● Tell the player who is bullying to stop.
● Block the player who is bullying from the game and de-friend them on social media and in gaming communities.
● Report the player who is bullying to the game group, team, platform, community, or developers.
● Take a break from playing the game.
● Tell a parent or trusted adult and get some support.
Digital Awareness for Parents
The digital world is constantly evolving with new social media platforms, apps, and devices, and children and teens are often the first to use them. Some negative things that may occur
include cyberbullying, sexting, posting hateful messages or content, and participating in negative group conversations. If your child posts harmful or negative content online, it may not
only harm other children; it can affect their online reputation, which can have negative implications for their employment or college admission.
While you may not be able to monitor all of your child’s activities, there are things you can do to prevent cyberbullying and protect your child from harmful digital behavior:
● Monitor a teen’s social media sites, apps, and browsing history, if you have concerns that cyberbullying may be occurring.
● Review or re-set your child’s phone location and privacy settings.
● Follow or friend your teen on social media sites or have another trusted adult do so.
● Stay up-to-date on the latest apps, social media platforms, and digital slang used by children and teens.
● Know your child’s user names and passwords for email and social media.
● Establish rules about appropriate digital behavior, content, and apps.
Digital Monitoring Apps and Software for Parents
Parents who want to protect their children from cyberbullying, harmful digital behavior, and exposure to adult content
can use parental control and monitoring software to help them set up systems that are less invasive to their children.
There are free software options and apps available to help parents restrict content, block domains, or view their
children’s online activities, including social media, without looking at their child’s device every day. Most of the free
software options provide some features for free, but charge for more robust insight.
A parent should consider a child’s age, device use, and digital behavior when selecting software – what is suitable to
restrict for a ten-year old may not be useful for a teenager.
Establishing Rules
Tips for Parents: Talk to Your Child about Appropriate Digital Behavior and Content
Parents create trust with children by initiating open, honest discussions. These dialogues are an opportunity to communicate values and expectations about your family’s appropriate
digital behavior, including viewing or sharing content, and apps they can and cannot use.
Check in frequently with your children about their digital experiences to address any potential risk of cyberbullying and harm. Be clear that your intention is to look out for their
wellbeing, and that you want to have an open dialogue. Listen to their concerns and express your perspective.
To minimize the risk of cyberbullying or harm from digital behavior, parents can:
● Set clear expectations about digital behavior and online reputation.
● Educate about the harmful effects of cyberbullying, posting hateful speech or comments, sexting, and sharing naked photos of themselves or others (including potential legal
issues).
● Be clear about what content can be viewed or shared.
● Identify which apps are appropriate for your child’s use and which are not.
● Establish rules about the amount of time that a child can spend online or on their devices.
● Model positive, respectful digital behavior on your own devices and accounts.
Talk to Your Child about Being a Bystander to Cyberbullying
Having conversations with children about cyberbullying and digital behavior is not a one-time event – it is an ongoing dialogue. Begin talking about these issues before children delve into the world of texting,
social media, online gaming, and chat rooms. Help them reflect on real and potential cyberbullying situations, and provide ongoing opportunities to practice ways to respond. Doing so can support the transition
from being passive bystanders to being allies who serve as powerful role models for others. SAMHSA’s free Knowbullying app for parents, teachers, and educators provides conversation starters, tips and other
tools you can use to help prevent bullying.
If you think your child is witnessing cyberbullying, there are things that you can encourage them to do - and not do. Such as:
Do not participate. Encourage children not to “like,” share, or comment on information that has been posted about someone, and do not forward a hurtful text to others. Not participating may limit the potential
damage of the messages – to others and to themselves.
Do not retaliate or respond negatively. If a child feels that they must respond, encourage a calm, clear, and constructive response. Angry and aggressive reactions can make a bad situation worse. Encourage
children (and adults!) to step away from the device so they do not resort to blaming, shaming, or retaliation. This provides time to get calm and centered so they can create a response that makes it clear that
others’ digital behaviors are hurtful and unacceptable.
Respond privately to the person who created the hurtful message. If they feel safe doing so, it may be helpful to follow up with the person who created or shared the hurtful message privately, either online, in a
phone call, or in person. Doing so can make it clear they do not support the negative actions. It also provides an opportunity to authentically share concerns about the behavior and what might be behind it.
Follow up with the person who was targeted. By reaching out, a child can send a powerful message that they care about the person and they do not support the negative behaviors. If needed, this connection can
also provide an opportunity to assist the person in finding help related to the cyberbullying situation.
Tips for Teachers
Warning Signs a Child Is Being Cyberbullied or Is Cyberbullying
A child may be involved in cyberbullying in several ways. A child can be bullied, bully others, or witness bullying. Parents, teachers, and other adults may not be aware of all the social
media platforms and apps that a child is using. The more digital platforms that a child uses, the more opportunities there are for being exposed to potential cyberbullying.
Many of the warning signs that cyberbullying is occurring happen around a child’s use of their device. Since children spend a lot of time on their devices, increases or decreases in use
may be less noticeable. It’s important to pay attention when a child exhibits sudden changes in digital and social behavior. Some of the warning signs that a child may be involved in
cyberbullying are:
● Noticeable, rapid increases or decreases in device use, including texting.
● A child exhibits emotional responses (laughter, anger, upset) to what is happening on their device.
● A child hides their screen or device when others are near, and avoids discussion about what they are doing on their device.
● Social media accounts are shut down or new ones appear.
● A child starts to avoid social situations, even those that were enjoyed in the past.
● A child becomes withdrawn or depressed, or loses interest in people and activities.
Preventing and Addressing Cyberbullying
Teachers, school administrators, camp, community, and faith-based staff are in unique positions to use their skills and roles to create safe
environments with positive social norms. They are also in positions where they may notice children’s behavior changes in group settings, like when
a group or cluster of children focuses on another child, or other signs that cyberbullying may be occurring. There are things that you can do in the
classroom or other group settings to address or prevent cyberbullying.
● If you think a child is being cyberbullied, speak to them privately to ask about it. They may also have proof on their digital devices.
● If you believe a child is being cyberbullied, speak to a parent about it. Serve as a facilitator between the child, parent, and the school if
necessary.
● To understand children’ digital behavior and how it relates to cyberbullying, increase your digital awareness.
● Develop activities that encourage self-reflection, asking children to identify and express what they think and feel, and to consider the
thoughts and feelings of others. Help children develop emotional intelligence so that they can learn self-awareness and self-regulation
skills and learn how to have empathy for others.
● Role model,reinforce, and reward positive behavior towards others.
● Encourage peer involvement in prevention strategies.
Report Cyberbullying
When cyberbullying happens, it is important to document and report the behavior so it can be addressed.
Steps to Take Immediately
● Don’t respond to and don’t forward cyberbullying messages.
● Keep evidence of cyberbullying. Record the dates, times, and descriptions of instances when cyberbullying has
occurred. Save and print screenshots, emails, and text messages. Use this evidence to report cyberbullying to web
and cell phone service providers.
● Block the person who is cyberbullying.
Report Cyberbullying to Online Service Providers
Cyberbullying often violates the terms of service established by social media sites and internet service providers.
● Review their terms and conditions or rights and responsibilities sections. These describe content that is or is
not appropriate.
● Visit social media safety centers to learn how to block users and change settings to control who can contact
you.
● Report cyberbullying to the social media site so they can take action against users abusing the terms of
service.
Report Cyberbullying to Law Enforcement
When cyberbullying involves these activities it is considered a crime and should be reported to law enforcement:
● Threats of violence
● Child pornography or sending sexually explicit messages or photos
● Taking a photo or video of someone in a place where he or she would expect privacy
● Stalking and hate crimes
Some states consider other forms of cyberbullying criminal. Consult your state’s laws and law enforcement for
additional guidance.
Report Cyberbullying to Schools
● Cyberbullying can create a disruptive environment at school and is often related to in-person bullying. The
school can use the information to help inform prevention and response strategies.
● In many states, schools are required to address cyberbullying in their anti-bullying policy. Some state laws also
cover off-campus behavior that creates a hostile school environment.
How to Deal with Haters
Ignore it. Walk away. Don’t react or respond to negative comments. If it continues, there are other things you can do. If someone threatens you, report it to a parent, teacher, or other trusted adult!
Block online haters. If someone is making negative or hateful comments on your posts or account, or is cyberbullying, block them. If they’re threatening you, tell your parents, report it to the platform, and take screenshots.
● How to report things on Facebook
● How to report a post on Instagram
● How to report abusive behavior on Twitter
● How to report offensive content on Tumblr
● How to report abuse on Snapchat
Be kind and respectful, even to haters. It shows that you’re in control of your emotions and that you aren’t letting negativity bring you down.
Stick with supporters. Having a friend nearby if you think you might encounter a hater not only makes it less likely that an incident might happen, but also means you’ll have positive reinforcements just in case.
Remind yourself that comments from a hater are a reflection of them and aren’t really about you. People who feel good about themselves don’t need to put others down.
Understand criticism can be a sign of pain. People sometimes lash out because they have other life struggles. Negative comments may have nothing to do with you.
Acknowledge your feelings. Talk to a trusted adult or friend and get some encouragement and support.
Keep being you. Keep moving forward, pursuing your interests, and being who you are.
References
1. UNICEF. (30 October 2021). Cyberbullying: What is it and how to stop it.
https://www.unicef.org/end-violence/how-to-stop-cyberbullying
2. …...(30 October 2021). What Is Cyberbullying.
https://www.stopbullying.gov/cyberbullying/what-is-it
3. https://kidshealth.org/en/parents/cyberbullying.html
4. https://kidshealth.org/en/teens/cyberbullying.html
5. https://centerstone.org/teen/media/cyberbullying-and-digital-abuse/
6. https://www.annapolis.gov/908/Facts-About-Cyberbullying

More Related Content

What's hot

Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpointjosiebrookeday
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & PrecautionsTalwant Singh
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.jessy0121
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentationRoel Palmaers
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingringw1sl
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentationSally Garza
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafeCheapSSLsecurity
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for studentsAkhil Nadh PC
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; familyDr.Keshav Sathaye
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 

What's hot (20)

Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Phishing
PhishingPhishing
Phishing
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
 
Internet safety
Internet safety Internet safety
Internet safety
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentation
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Bully Powerpoint
Bully PowerpointBully Powerpoint
Bully Powerpoint
 

Similar to Cyber bullying

Technology Presentation
Technology PresentationTechnology Presentation
Technology PresentationTatiDenai
 
What is bullying
What is bullyingWhat is bullying
What is bullyingDev Chauhan
 
SecurAlert September 2014 - Bullying
SecurAlert September 2014 - BullyingSecurAlert September 2014 - Bullying
SecurAlert September 2014 - BullyingChris Carney
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptNaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptpurush203
 
Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Karen Brooks
 
Cyberbullying and Internet addiction by Jhoanne Erika Masaya
Cyberbullying and Internet addiction by Jhoanne Erika MasayaCyberbullying and Internet addiction by Jhoanne Erika Masaya
Cyberbullying and Internet addiction by Jhoanne Erika MasayaJhoanneerika
 
BULLYING IN SCHOOL CASE BASED DISCUSSION.pptx
BULLYING IN SCHOOL CASE BASED DISCUSSION.pptxBULLYING IN SCHOOL CASE BASED DISCUSSION.pptx
BULLYING IN SCHOOL CASE BASED DISCUSSION.pptxManasaVarma7
 
Cyberbullying and Internet Addiction
Cyberbullying and Internet AddictionCyberbullying and Internet Addiction
Cyberbullying and Internet AddictionReuben Millare
 
Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jfJohn Field
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptxliutommy1
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28thDoctora2017
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying PresentationMegan Townes
 
Cyberbullying_Presentation.pptx.pdf
Cyberbullying_Presentation.pptx.pdfCyberbullying_Presentation.pptx.pdf
Cyberbullying_Presentation.pptx.pdfChrisochieng3
 

Similar to Cyber bullying (20)

Technology Presentation
Technology PresentationTechnology Presentation
Technology Presentation
 
What is bullying
What is bullyingWhat is bullying
What is bullying
 
SecurAlert September 2014 - Bullying
SecurAlert September 2014 - BullyingSecurAlert September 2014 - Bullying
SecurAlert September 2014 - Bullying
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
GRADE 6-8.pptx
GRADE 6-8.pptxGRADE 6-8.pptx
GRADE 6-8.pptx
 
Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31
 
Cyberbullying and Internet addiction by Jhoanne Erika Masaya
Cyberbullying and Internet addiction by Jhoanne Erika MasayaCyberbullying and Internet addiction by Jhoanne Erika Masaya
Cyberbullying and Internet addiction by Jhoanne Erika Masaya
 
BULLYING IN SCHOOL CASE BASED DISCUSSION.pptx
BULLYING IN SCHOOL CASE BASED DISCUSSION.pptxBULLYING IN SCHOOL CASE BASED DISCUSSION.pptx
BULLYING IN SCHOOL CASE BASED DISCUSSION.pptx
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Cyberbullying and Internet Addiction
Cyberbullying and Internet AddictionCyberbullying and Internet Addiction
Cyberbullying and Internet Addiction
 
Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jf
 
Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptx
 
Bullying vs cyber bullying italy
Bullying vs cyber bullying italyBullying vs cyber bullying italy
Bullying vs cyber bullying italy
 
Bullying
BullyingBullying
Bullying
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying Presentation
 
Cyberbullying_Presentation.pptx.pdf
Cyberbullying_Presentation.pptx.pdfCyberbullying_Presentation.pptx.pdf
Cyberbullying_Presentation.pptx.pdf
 

More from Suresh Kumar Murugesan

Jacobson's Progressive Muscle Relaxation Technique.pptx
Jacobson's Progressive Muscle Relaxation Technique.pptxJacobson's Progressive Muscle Relaxation Technique.pptx
Jacobson's Progressive Muscle Relaxation Technique.pptxSuresh Kumar Murugesan
 
Statistics in Psychology - an introduction
Statistics in Psychology  - an introduction                 Statistics in Psychology  - an introduction
Statistics in Psychology - an introduction Suresh Kumar Murugesan
 
Mindfulness exercise 03 colour breathing
Mindfulness exercise  03 colour breathingMindfulness exercise  03 colour breathing
Mindfulness exercise 03 colour breathingSuresh Kumar Murugesan
 
Selection of appropriate statistics and tools
Selection of appropriate statistics and toolsSelection of appropriate statistics and tools
Selection of appropriate statistics and toolsSuresh Kumar Murugesan
 

More from Suresh Kumar Murugesan (20)

Cyber Anxiety.pptx
Cyber Anxiety.pptxCyber Anxiety.pptx
Cyber Anxiety.pptx
 
Neuroscience of Stress.pptx
Neuroscience of Stress.pptxNeuroscience of Stress.pptx
Neuroscience of Stress.pptx
 
Neuroscience of Memory.pptx
Neuroscience of Memory.pptxNeuroscience of Memory.pptx
Neuroscience of Memory.pptx
 
Classroom Behaviours.pptx
Classroom Behaviours.pptxClassroom Behaviours.pptx
Classroom Behaviours.pptx
 
ANOVA 1.0.pptx
ANOVA 1.0.pptxANOVA 1.0.pptx
ANOVA 1.0.pptx
 
Jacobson's Progressive Muscle Relaxation Technique.pptx
Jacobson's Progressive Muscle Relaxation Technique.pptxJacobson's Progressive Muscle Relaxation Technique.pptx
Jacobson's Progressive Muscle Relaxation Technique.pptx
 
Measures of central tendency
Measures of central tendencyMeasures of central tendency
Measures of central tendency
 
Statistics in Psychology - an introduction
Statistics in Psychology  - an introduction                 Statistics in Psychology  - an introduction
Statistics in Psychology - an introduction
 
Mindfulness exercise 03 colour breathing
Mindfulness exercise  03 colour breathingMindfulness exercise  03 colour breathing
Mindfulness exercise 03 colour breathing
 
Mindfulness exercise 04 spaceship
Mindfulness exercise  04 spaceshipMindfulness exercise  04 spaceship
Mindfulness exercise 04 spaceship
 
How to raise mentally strong kids
How to raise mentally strong kidsHow to raise mentally strong kids
How to raise mentally strong kids
 
Tele counselling
Tele counsellingTele counselling
Tele counselling
 
Anxiety management strategies
Anxiety management strategiesAnxiety management strategies
Anxiety management strategies
 
Neuroscience of happiness
Neuroscience of happinessNeuroscience of happiness
Neuroscience of happiness
 
Neuroscience of gratitude
Neuroscience of gratitudeNeuroscience of gratitude
Neuroscience of gratitude
 
Personality
PersonalityPersonality
Personality
 
Neuroscience of mindfulness
Neuroscience of mindfulnessNeuroscience of mindfulness
Neuroscience of mindfulness
 
Involuntary client
Involuntary clientInvoluntary client
Involuntary client
 
Selection of appropriate statistics and tools
Selection of appropriate statistics and toolsSelection of appropriate statistics and tools
Selection of appropriate statistics and tools
 
Features of psychotherapy
Features of psychotherapyFeatures of psychotherapy
Features of psychotherapy
 

Recently uploaded

Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 

Recently uploaded (20)

9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 

Cyber bullying

  • 2. About the Presenter ● Dr.Suresh Kumar Murugesan is a passionate Professor, Researcher and Positive Mental Health Practitioner from Madurai, Tamil Nadu, India ● At present he is Heading the department of Psychology, The American College, Madurai and Adjunct Professor of School of Behavioural Sciences and Education at TAU ● He is very keen in learning new research studies in behavioural Sciences and open to learn. ● His ultimate aim is to make impression in the field of Knowledge ● His area of specializations are Psychometry, Positive Psychotherapy Yellow Pond
  • 3. Disclaimer ● This presentation is prepared for learning purpose only and all the images and pictures used in this presentation are taken from google image search. ● Due recognition was given to all the material collected from the various sources. ● Any name or reference is missed kindly bring it to the notice of the presenter for inclusion. ● Email - sureshkumar800@yahoo.com Thank you Yellow Pond
  • 4. Facts About Cyberbullying Provided by the Police Department ○ Nearly 42% of kids have been bullied online and almost one in four have had it happen more than once. ○ Among this percentage, being ignored and disrespected were the most common forms of cyberbullying. ○ Nine out of 10 middle school students have had their feelings hurt online. ○ About 75% have visited a website bashing another student. ○ Four out of 10 middle school students have had their password(s) stolen and changed by a bully who then locked them out of their own account or sent communications posing as them. ○ About 21% of kids have received mean or threatening emails. ○ The psychological and emotional outcomes of cyber bullying are similar to real-life bullying outcomes, except for the reality that with cyber bullying there is often no escape. School ends at 3 p.m., while the Internet is available all the time. ○ The primary cyberbullying location where victimizing occurs, at 56%, is in chat rooms. ○ Girls are about twice as likely as boys to be victims and perpetrators of cyberbullying. ○ About 58% of kids admit someone has said mean or hurtful things to them online. More than 4 out of 10 say it has happened more than once. ○ Cyberbullying has increased in recent years. In a national survey of 10-17 year olds, twice as many children indicated they had been victims and perpetrators.
  • 5. Bullying ● Bullying is purposeful, repeated behaviour designed to cause physical and emotional distress. ● Cyberbullying (or online bullying) is bullying using technologies, particularly over the internet or via mobile and gaming networks.
  • 6. Cyber Bullying Cyberbullying, or online bullying, can be defined as the use of technologies by an individual or by a group of people to deliberately and repeatedly upset someone else.
  • 7. Cyber Bullying Technology can be used to carry out a wide range of unacceptable or illegal behaviours. Cyberbullying can include: ● intimidation and threats ● harassment and stalking ● vilification/defamation ● exclusion or peer rejection ● impersonation ● unauthorised publication of personal information or images ● manipulation
  • 8. Cyber Bullying Cyberbullying can include discrimination and hate crimes, including: ● sexist bullying ● racist and faith targeted bullying ● bullying related to sexual orientation (homophobic or biphobic bullying) ● bullying related to gender identity (transphobic bullying) ● bullying of people because they have special educational needs and disabilities
  • 9. Cyberbullying can be an extension of face-to-face bullying, with technology providing an additional route to harass an individual or group.
  • 10. Cyberbullying can be a way for someone being bullied face-to-face to retaliate.
  • 11. Cyberbullying can be carried out by individuals or groups who are known to the person being bullied.
  • 12. There are also cases where individuals have been cyberbullied by people or groups they have never met.
  • 13. Any member of the school community – pupil, staff member, parent or carer – can be involved in and be affected by cyberbullying.
  • 14. Cyberbullying can take place between pupils; between pupils and staff; between parents and carers and pupils; between parents and carers and staff; and between staff members.
  • 15. Isn’t it just Free Speech? ● “Abuse is different to people expressing an honest opinion which might differ to those of other people. Abuse aims to hurt. ● Abusers often hide behind the idea that all they are doing is expressing an opinion or a belief, but if the content or manner of the communication is threatening or intends to cause distress, then it may be against the law.”
  • 16. Types of Cyberbullying Cyberbullying comes in many different forms. Below is a list of types of cyberbullying someone may see or experience: ● Flaming – Online fights, name calling, and similar actions ● Disparaging – Posts or messages that target someone. This could include posts that target someone based on their race, ethnicity, religion, gender identity, or sexual orientation. ● Exclusion – Leaving someone out of a game or group chat, or any other social media activity. ● Outing – Sharing someone’s secrets or private information. ● Trickery – Tricking someone into telling you something private and then outing them. ● Impersonation – Pretending to be someone you are not. Also known as Catfishing. ● Harassment – Repeatedly sending malicious messages. ● Cyberstalking – Continuously harassing and disparaging including threats of physical harm.
  • 17. Types or Forms of Cyberbullying ● Threats and intimidation ● Harassment and Stalking ● Vilification and Defamation ● Ostracising / Peer Rejection/ Exclusion ● Identity theft/unauthorised access and impersonation ● Publicly posting, sending or forwarding personal or private information or images
  • 18. Threats and intimidation ● Threats can be sent by mobile phone, email, within online games, via comments on websites, social networking sites or message boards. ● Threats can include violence, including sexual violence, or threats to disclose information about someone that may harm them, or that they are not ready to share – for example, the threat to make someone’s sexual orientation or gender identity known (to ‘out’ someone) when they may not feel ready for this.
  • 19. Harassment or stalking ● Repeatedly sending unwanted text or instant messages, or making phone calls (including silent calls). ● Using public forums, such as social networking sites or message boards, to repeatedly harass, or to post derogatory or defamatory statements. ● Tracking someone’s activity and collecting information about them, for example by searching databases and social network services; by pretending to be other people and ‘friending’ the person; or by using spyware. ● Doxing (which comes from the slang ‘dox’ for ‘documents’) is the practice of posting personal information about someone online without their permission.
  • 20. Vilification/defamation ● Posting upsetting or defamatory remarks about an individual online, or name-calling, general insults, and prejudice-based bullying, for example sexist, homophobic and racist messages. ● ‘Slut-shaming’ can be defined as the practice of attacking (primarily) girls and women on the grounds of perceived or fabricated transgressions of socially acceptable sexual behaviours i.e. reposting of texts or images, or the fabrication of information. This practice attacks girls and women on the grounds of their gender and sexual identities, and aims to regulate their behaviour by sending the message that what is deemed as sexually inappropriate conduct can be legitimately used to publically humiliate them, whether they engage in it or not.
  • 21. Ostracising/peer rejection/exclusion ● Online exclusion may be harder to detect than people being marginalised in a physical space, such as a classroom. Social networking sites can be an important extension of a person’s social space and activity. ● On some services, it is possible for members to set up a closed group, which can protect members from unwanted contact, but can also be used to exclude others. Functions that can be used to block abusive behaviour can also be used to exclude others online.
  • 22. Identity theft/unauthorised access and impersonation ‘Hacking’ is generally used to mean accessing someone else’s account, by finding out or guessing their username and password information for example. Unauthorised access of systems, accounts or files is not automatically a form of cyberbullying, but it is always a serious issue. Unauthorised access to computer material is illegal. There are cases where sites have been set up which make use of school logos and name, or using photographs of staff or students taken from the school website without permission.
  • 23. Publicly posting, sending or forwarding personal or private information or images ● The deliberate public sharing of private content can be designed to embarrass or humiliate, and once such messages or content are made public, containing them becomes very difficult. ● Creating, possessing, copying or distributing images of children and young people under the age of 18 which are of an indecent or sexual nature is illegal, even if they were taken in ‘fun’ or by ‘willing’ parties, or if they were taken and distributed by the subject of the photograph. ● Sharing private, sexually provocative or sexually explicit photographs or films of adults (of people aged 18 and over) without their consent, and with intent to cause distress (‘revenge porn’), is an offence, regardless of whether the subject initially consented to the creation of the content or created the pictures themselves.
  • 24. Why do people cyberbully? Reasons may include: ● personal, social or family issues ● early childhood experience, including parenting and maltreatment ● they do not like a person ● they feel provoked ● they are taking revenge or may have been bullied themselves ● an acute need for attention ● poor self-esteem, depression or anger that they cannot manage ● asserting and increasing their popularity and social status ● inability or unwillingness to empathise with others ● to feel powerful and in control ● from boredom or as a form of entertainment
  • 25. Effects of Cyberbullying When bullying happens online it can feel as if you’re being attacked everywhere, even inside your own home. It can seem like there’s no escape. The effects can last a long time and affect a person in many ways: ● Mentally — feeling upset, embarrassed, stupid, even angry ● Emotionally — feeling ashamed or losing interest in the things you love ● Physically — tired (loss of sleep), or experiencing symptoms like stomach aches and headaches The feeling of being laughed at or harassed by others, can prevent people from speaking up or trying to deal with the problem. In extreme cases, cyberbullying can even lead to people taking their own lives. Cyberbullying can affect us in many ways. But these can be overcome and people can regain their confidence and health.
  • 26. Common Places of Cyberbullying The most common places where cyberbullying occurs are: ● Social Media, such as Facebook, Instagram, Snapchat, and Tik Tok ● Text messaging and messaging apps on mobile or tablet devices ● Instant messaging, direct messaging, and online chatting over the internet ● Online forums, chat rooms, and message boards, such as Reddit ● Email ● Online gaming communities
  • 27. What you can do if you are being cyberbullied Life is hard, especially for teenagers. There is so much to worry about, and bullying can make all of that worse. You have the right to be safe, respected, and you don’t deserve to be bullied or harassed, whether that be online or in person. Consider the following information if you are dealing with bullying or cyberbullying: ● Talk to a trusted adult. This could be a parent, teacher, counselor, coach, or any other trustworthy adult that you know. These people can help you and help determine if you need to take additional steps. ● Block, Document, and Report! Many sites have blocking features, and this can help alleviate the frequency of bullying instances. Document instances of bullying and contact the sites’ administrators. Some social media sites have divisions that investigate forms of abuse, including cyberbullying. ● If you or someone you know is in an immediate risk of danger or harm, then call 911 ● If someone has committed a crime, then contact your local law enforcement ● If you are at risk for hurting yourself or someone else, contact the National Suicide Prevention Lifeline or our crisis line
  • 28. Cyberbullying Tactics It is important to understand how children are cyberbullied so it can be easily recognized and action can be taken. Some of the most common cyberbullying tactics include: ● Posting comments or rumors about someone online that are mean, hurtful, or embarrassing. ● Threatening to hurt someone or telling them to kill themselves. ● Posting a mean or hurtful picture or video. ● Pretending to be someone else online in order to solicit or post personal or false information about someone else. ● Posting mean or hateful names, comments, or content about any race, religion, ethnicity, or other personal characteristics online. ● Creating a mean or hurtful webpage about someone. ● Doxing, an abbreviated form of the word documents, is a form of online harassment used to exact revenge and to threaten and destroy the privacy of individuals by making their personal information public, including addresses, social security, credit card and phone numbers, links to social media accounts, and other private data.
  • 29. Viral Tactics: Examples Because cyberbullying can happen in different ways, examples based on real-life experiences can provide a deeper understanding of the tactics typically used. Along with other risk factors, bullying can increase the risk for suicide-related behaviors. Furthermore, cyberbullying can be relentless, increasing the likelihood of anxiety and depression. Some states have chosen to prosecute young people who bully for criminal harassment, including encouraging someone to die by suicide. Some forms of cyberbullying are forms of harassment that cross the line into criminal activity, and some tactics occur in dating relationships and can turn into interpersonal violence. The stories below are examples of different cyberbullying tactics that could happen. In reality, with the right interventions, cyberbullying can be addressed positively to lessen harm and the negative outcomes that could result. When not addressed, cyberbullying can have long-term mental health effects. Cyberbullying and bullying can negatively impact the lives of all who are involved. Nude photo sharing A teenage girl sent a nude photo of herself to her boyfriend while they were dating. After they broke up, he shared the photo with other children, who then called her hurtful, derogatory names via text and social media. Lies and false accusations A group of students got into trouble at school for being drunk, and accused a girl who knew nothing about it of reporting them to school officials. They began texting her day and night, and posted hateful, derogatory messages on social media. Other students saw their messages and joined in harassing the girl. She was bullied constantly via text, and in person at school. She eventually shut down her social media accounts and changed her phone number. Still, the bullying at school continued. Bullied for being economically challenged Students posted mean, negative comments on another classmates’ social media account, commenting on his clothes and sneakers, which were not the more expensive name brands most of them were wearing. They ridiculed him, calling him “poor” and continued the bullying in school. The boy missed many days of school trying to avoid the harassment and embarrassment. False identity profile, sometimes referred to as a “Sockpuppet” A girl’s classmate created a fake social media account in a boy’s name, and began an online relationship with her. Though she had not met him in person, the girl divulged personal information about herself and her family to this “boy.” The classmate who created the fake account then shared the personal information with other children, who used it to bully, shame, and harass the girl. Encouraging self-harm or suicide A young boy with a physical disability and scars on his face was harassed on social media and via text by other students. They called him derogatory names, told him he’d be better off dead. They wrote “why don’t you die?” on his school locker and encouraged him to take his own life. Bullied for being gay A teenage boy who was openly gay began receiving death threats via phone, text, and social media for being gay. Students created an anti-gay social media group and harassed him, posting hateful messages about him. Jealousy bullying A teenage girl was harassed by other girls in her class for dating a very popular boy. The girls sent her hateful messages via text and social media, and wrote derogatory messages on her school locker. Doxing Over Online Gaming A teenage boy posted comments on a public gaming forum, expressing his dislike of certain game features and tactics. Another user disagreed with him in the forum, then searched for the boy’s information online and posted his address, email address, and social media links in another comment. The boy then received multiple emails and messages from strangers threatening to come to his home and assault him, and to block him from games.
  • 30. Popular Social Media Apps and Sites Some current popular social media venues and apps include: ● Amino: An app that lets users join online communities, chats, forums, and groups on a variety of topics based on their interests. ● Askfm: A social networking site that allows users to ask other people questions, often anonymously. ● Calculator%: A “vault” or secret app that appears harmless, but hides photos, videos, files, and browser history. ● Chatroulette: There are over 20 different chat roulette sites that allow users to instantly connect via webcam and video chat. Sites typically pair the users randomly and instantly. ● Discord: A voice-over-IP (VOIP) app that allows users to video chat with others, private message, and join, create, or participate in public and private chat rooms. This app is often used by players to chat with each other while playing videogames. ● Facebook and Facebook Live: The most commonly used social media site that is accessible on many different media platforms. ● Facebook Messenger Kids: A messaging app and platform for children. ● Houseparty: A group video chat and social networking app that allows up to eight people to video chat at once in a “room.” ● Instagram: A photo and video sharing and networking site that connects users through other social networking sites (e.g., Facebook). ● Kik: Messaging app that allows users of all ages to contact others anonymously. ● Line: A messaging app that allows users to make free phone calls, leave voice messages, and text. Users can delete texts or chats from recipient’s phone using a timer. ● LiveMe: A tool to broadcast live-streaming videos and watch other users’ videos. ● MeetMe: A dating app that connects users to others based on geographic proximity. ● Omegle: An app that pairs users with strangers in anonymous one-on-one chat sessions. ● Reddit: A site that stores social news, rates and evaluates web content, and discussion threads. ● Roblox: An online game platform with free multiplayer games created by users. Roblox allows users to communicate with each other and join groups. ● Sarahah: An anonymous messaging app that allows users to send anonymous messages to people they may know. ● Snapchat: A photo messaging app that allows for sharing pictures and short videos that are intended to be erased shortly after delivery. ● Telegram: Messaging app that allows users to share photos, videos, and files; make calls, and delete texts or chats from recipient’s phone using a timer. ● TikTok: An app that allows users to create and share their own videos where they lip-synch, sing, dance, or just talk. ● Tumblr: A social networking site that allows posting of short blogs and media. ● Twitch: A live stream platform for gamers to watch live stream content, chat, and connect ● Twitter: A microblogging site that allows users to send, read, and reply to “tweets” or short messages. ● VSCO: A photography app to capture and edit photos. ● WeChat: An app that allows user to chat with friends, and to search for people nearby and around the globe. ● WhatsApp: A private messaging app that allows users to text, send photos, videos, and location information to their contacts. ● Whisper: An anonymous social media site that allows users to post and share photo and video messages. ● YouTube: A video sharing platform that allows users to post and share videos. ● YUBO (formerly YELLOW): An app referred to as the “Tinder for teens” that allows users to swipe right or left to accept or reject the profiles of other users. ● YouNow: Broadcast, Chat, and Watch Live Video: An app that lets teens broadcast themselves live. They can see and respond to live chat or view other broadcasters and chat with them.
  • 31. Risks of Social Media Apps and Sites Social media has many benefits that must be balanced with the risks it presents. Risks to be aware of include: ● Screening for harmful content on websites and apps varies widely. ● Content posted can be incorrect, harmful, or hurtful. ● Apps and platforms can be used to share harmful or adult content. ● Apps and platforms can include users of all ages and allow children to connect with adults. ● Apps and platforms can have no moderator for chats, groups, and forums that allow all types of content to be posted or shared. ● Apps and platforms can allow all types of content to be posted or shared. ● Privacy controls over who can view or access posted material vary across apps, and many users are not aware of how to use them effectively. ● Apps that allow for real-time user videos “live streaming” can been used to show bullying, violence, suicide, and harmful acts as they are happening. ● Some apps that include location information can be used to get personal information, such as someone’s age, current location, or where someone lives. ● Apps that support telephone calls do not show up on a call log, so parents may not know who their children are talking to.
  • 32. Warning Signs Warning Signs a Child is Being Cyberbullied or is Cyberbullying Others Many of the warning signs that cyberbullying is occurring happen around a child’s use of their device. Some of the warning signs that a child may be involved in cyberbullying are: ● Noticeable increases or decreases in device use, including texting. ● A child exhibits emotional responses (laughter, anger, upset) to what is happening on their device. ● A child hides their screen or device when others are near, and avoids discussion about what they are doing on their device. ● Social media accounts are shut down or new ones appear. ● A child starts to avoid social situations, even those that were enjoyed in the past. ● A child becomes withdrawn or depressed, or loses interest in people and activities.
  • 33. What to Do When Cyberbullying Happens If you notice warning signs that a child may be involved in cyberbullying, take steps to investigate that child’s digital behavior. Cyberbullying is a form of bullying, and adults should take the same approach to address it: support the child being bullied, address the bullying behavior of a participant, and show children that cyberbullying is taken seriously. Because cyberbullying happens online, responding to it requires different approaches. If you think that a child is involved in cyberbullying, there are several things you can do: ● Notice – Recognize if there has been a change in mood or behavior and explore what the cause might be. Try to determine if these changes happen around a child’s use of their digital devices. ● Talk – Ask questions to learn what is happening, how it started, and who is involved. ● Document – Keep a record of what is happening and where. Take screenshots of harmful posts or content if possible. Most laws and policies note that bullying is a repeated behavior, so records help to document it. ● Report – Most social media platforms and schools have clear policies and reporting processes. If a classmate is cyberbullying, report it the school. You can also contact app or social media platforms to report offensive content and have it removed. If a child has received physical threats, or if a potential crime or illegal behavior is occurring, report it to the police. ● Support – Peers, mentors, and trusted adults can sometimes intervene publicly to positively influence a situation where negative or hurtful content posts about a child. Public Intervention can include posting positive comments about the person targeted with bullying to try to shift the conversation in a positive direction. It can also help to reach out to the child who is bullying and the target of the bullying to express your concern. If possible, try to determine if more professional support is needed for those involved, such as speaking with a guidance counselor or mental health professional.
  • 34. Prevent Cyberbullying for Gamers Gaming can be a fun, safe and positive environment for all. Parents can help prevent cyberbullying of their children who play video games by: ● Playing the game with your child or observing the game to understand how it works and what a child is exposed to in the game. ● Checking in periodically with your child about who is online, playing the game with them. ● Knowing which gaming communities, and social media, and apps your child uses while gaming and their security risks which you can research online. ● Helping your child set the privacy and security settings for their games and apps. ● Teaching children about safe digital behavior, including not clicking on links from strangers; not downloading bots (software for automated tasks) or clicking on links in gaming forums; not sharing personal information like emails, phone numbers, addresses, and passwords; not participating in bullying behavior of other players; and what to do if they observe or experience cyberbullying. ● Establishing rules about how much time a child can spend playing video games. ● Keeping an open line of communication about your child’s digital life. There are things that gamers can do if they are experiencing cyberbullying or see it happen to others while gaming: ● Tell the player who is bullying to stop. ● Block the player who is bullying from the game and de-friend them on social media and in gaming communities. ● Report the player who is bullying to the game group, team, platform, community, or developers. ● Take a break from playing the game. ● Tell a parent or trusted adult and get some support.
  • 35. Digital Awareness for Parents The digital world is constantly evolving with new social media platforms, apps, and devices, and children and teens are often the first to use them. Some negative things that may occur include cyberbullying, sexting, posting hateful messages or content, and participating in negative group conversations. If your child posts harmful or negative content online, it may not only harm other children; it can affect their online reputation, which can have negative implications for their employment or college admission. While you may not be able to monitor all of your child’s activities, there are things you can do to prevent cyberbullying and protect your child from harmful digital behavior: ● Monitor a teen’s social media sites, apps, and browsing history, if you have concerns that cyberbullying may be occurring. ● Review or re-set your child’s phone location and privacy settings. ● Follow or friend your teen on social media sites or have another trusted adult do so. ● Stay up-to-date on the latest apps, social media platforms, and digital slang used by children and teens. ● Know your child’s user names and passwords for email and social media. ● Establish rules about appropriate digital behavior, content, and apps.
  • 36. Digital Monitoring Apps and Software for Parents Parents who want to protect their children from cyberbullying, harmful digital behavior, and exposure to adult content can use parental control and monitoring software to help them set up systems that are less invasive to their children. There are free software options and apps available to help parents restrict content, block domains, or view their children’s online activities, including social media, without looking at their child’s device every day. Most of the free software options provide some features for free, but charge for more robust insight. A parent should consider a child’s age, device use, and digital behavior when selecting software – what is suitable to restrict for a ten-year old may not be useful for a teenager.
  • 37. Establishing Rules Tips for Parents: Talk to Your Child about Appropriate Digital Behavior and Content Parents create trust with children by initiating open, honest discussions. These dialogues are an opportunity to communicate values and expectations about your family’s appropriate digital behavior, including viewing or sharing content, and apps they can and cannot use. Check in frequently with your children about their digital experiences to address any potential risk of cyberbullying and harm. Be clear that your intention is to look out for their wellbeing, and that you want to have an open dialogue. Listen to their concerns and express your perspective. To minimize the risk of cyberbullying or harm from digital behavior, parents can: ● Set clear expectations about digital behavior and online reputation. ● Educate about the harmful effects of cyberbullying, posting hateful speech or comments, sexting, and sharing naked photos of themselves or others (including potential legal issues). ● Be clear about what content can be viewed or shared. ● Identify which apps are appropriate for your child’s use and which are not. ● Establish rules about the amount of time that a child can spend online or on their devices. ● Model positive, respectful digital behavior on your own devices and accounts.
  • 38. Talk to Your Child about Being a Bystander to Cyberbullying Having conversations with children about cyberbullying and digital behavior is not a one-time event – it is an ongoing dialogue. Begin talking about these issues before children delve into the world of texting, social media, online gaming, and chat rooms. Help them reflect on real and potential cyberbullying situations, and provide ongoing opportunities to practice ways to respond. Doing so can support the transition from being passive bystanders to being allies who serve as powerful role models for others. SAMHSA’s free Knowbullying app for parents, teachers, and educators provides conversation starters, tips and other tools you can use to help prevent bullying. If you think your child is witnessing cyberbullying, there are things that you can encourage them to do - and not do. Such as: Do not participate. Encourage children not to “like,” share, or comment on information that has been posted about someone, and do not forward a hurtful text to others. Not participating may limit the potential damage of the messages – to others and to themselves. Do not retaliate or respond negatively. If a child feels that they must respond, encourage a calm, clear, and constructive response. Angry and aggressive reactions can make a bad situation worse. Encourage children (and adults!) to step away from the device so they do not resort to blaming, shaming, or retaliation. This provides time to get calm and centered so they can create a response that makes it clear that others’ digital behaviors are hurtful and unacceptable. Respond privately to the person who created the hurtful message. If they feel safe doing so, it may be helpful to follow up with the person who created or shared the hurtful message privately, either online, in a phone call, or in person. Doing so can make it clear they do not support the negative actions. It also provides an opportunity to authentically share concerns about the behavior and what might be behind it. Follow up with the person who was targeted. By reaching out, a child can send a powerful message that they care about the person and they do not support the negative behaviors. If needed, this connection can also provide an opportunity to assist the person in finding help related to the cyberbullying situation.
  • 39. Tips for Teachers Warning Signs a Child Is Being Cyberbullied or Is Cyberbullying A child may be involved in cyberbullying in several ways. A child can be bullied, bully others, or witness bullying. Parents, teachers, and other adults may not be aware of all the social media platforms and apps that a child is using. The more digital platforms that a child uses, the more opportunities there are for being exposed to potential cyberbullying. Many of the warning signs that cyberbullying is occurring happen around a child’s use of their device. Since children spend a lot of time on their devices, increases or decreases in use may be less noticeable. It’s important to pay attention when a child exhibits sudden changes in digital and social behavior. Some of the warning signs that a child may be involved in cyberbullying are: ● Noticeable, rapid increases or decreases in device use, including texting. ● A child exhibits emotional responses (laughter, anger, upset) to what is happening on their device. ● A child hides their screen or device when others are near, and avoids discussion about what they are doing on their device. ● Social media accounts are shut down or new ones appear. ● A child starts to avoid social situations, even those that were enjoyed in the past. ● A child becomes withdrawn or depressed, or loses interest in people and activities.
  • 40. Preventing and Addressing Cyberbullying Teachers, school administrators, camp, community, and faith-based staff are in unique positions to use their skills and roles to create safe environments with positive social norms. They are also in positions where they may notice children’s behavior changes in group settings, like when a group or cluster of children focuses on another child, or other signs that cyberbullying may be occurring. There are things that you can do in the classroom or other group settings to address or prevent cyberbullying. ● If you think a child is being cyberbullied, speak to them privately to ask about it. They may also have proof on their digital devices. ● If you believe a child is being cyberbullied, speak to a parent about it. Serve as a facilitator between the child, parent, and the school if necessary. ● To understand children’ digital behavior and how it relates to cyberbullying, increase your digital awareness. ● Develop activities that encourage self-reflection, asking children to identify and express what they think and feel, and to consider the thoughts and feelings of others. Help children develop emotional intelligence so that they can learn self-awareness and self-regulation skills and learn how to have empathy for others. ● Role model,reinforce, and reward positive behavior towards others. ● Encourage peer involvement in prevention strategies.
  • 41. Report Cyberbullying When cyberbullying happens, it is important to document and report the behavior so it can be addressed. Steps to Take Immediately ● Don’t respond to and don’t forward cyberbullying messages. ● Keep evidence of cyberbullying. Record the dates, times, and descriptions of instances when cyberbullying has occurred. Save and print screenshots, emails, and text messages. Use this evidence to report cyberbullying to web and cell phone service providers. ● Block the person who is cyberbullying.
  • 42. Report Cyberbullying to Online Service Providers Cyberbullying often violates the terms of service established by social media sites and internet service providers. ● Review their terms and conditions or rights and responsibilities sections. These describe content that is or is not appropriate. ● Visit social media safety centers to learn how to block users and change settings to control who can contact you. ● Report cyberbullying to the social media site so they can take action against users abusing the terms of service.
  • 43. Report Cyberbullying to Law Enforcement When cyberbullying involves these activities it is considered a crime and should be reported to law enforcement: ● Threats of violence ● Child pornography or sending sexually explicit messages or photos ● Taking a photo or video of someone in a place where he or she would expect privacy ● Stalking and hate crimes Some states consider other forms of cyberbullying criminal. Consult your state’s laws and law enforcement for additional guidance.
  • 44. Report Cyberbullying to Schools ● Cyberbullying can create a disruptive environment at school and is often related to in-person bullying. The school can use the information to help inform prevention and response strategies. ● In many states, schools are required to address cyberbullying in their anti-bullying policy. Some state laws also cover off-campus behavior that creates a hostile school environment.
  • 45. How to Deal with Haters Ignore it. Walk away. Don’t react or respond to negative comments. If it continues, there are other things you can do. If someone threatens you, report it to a parent, teacher, or other trusted adult! Block online haters. If someone is making negative or hateful comments on your posts or account, or is cyberbullying, block them. If they’re threatening you, tell your parents, report it to the platform, and take screenshots. ● How to report things on Facebook ● How to report a post on Instagram ● How to report abusive behavior on Twitter ● How to report offensive content on Tumblr ● How to report abuse on Snapchat Be kind and respectful, even to haters. It shows that you’re in control of your emotions and that you aren’t letting negativity bring you down. Stick with supporters. Having a friend nearby if you think you might encounter a hater not only makes it less likely that an incident might happen, but also means you’ll have positive reinforcements just in case. Remind yourself that comments from a hater are a reflection of them and aren’t really about you. People who feel good about themselves don’t need to put others down. Understand criticism can be a sign of pain. People sometimes lash out because they have other life struggles. Negative comments may have nothing to do with you. Acknowledge your feelings. Talk to a trusted adult or friend and get some encouragement and support. Keep being you. Keep moving forward, pursuing your interests, and being who you are.
  • 46. References 1. UNICEF. (30 October 2021). Cyberbullying: What is it and how to stop it. https://www.unicef.org/end-violence/how-to-stop-cyberbullying 2. …...(30 October 2021). What Is Cyberbullying. https://www.stopbullying.gov/cyberbullying/what-is-it 3. https://kidshealth.org/en/parents/cyberbullying.html 4. https://kidshealth.org/en/teens/cyberbullying.html 5. https://centerstone.org/teen/media/cyberbullying-and-digital-abuse/ 6. https://www.annapolis.gov/908/Facts-About-Cyberbullying