SlideShare a Scribd company logo
1 of 12
What is Cyberbullying any way?
This involves the use of information and communication technologies such as e-mail, cell phone and pager text
messages, instant messaging (IM), defamatory personal Web sites, and defamatory online personal polling Web sites,
to support deliberate, repeated, and hostile behavior by an individual or group that is intended to harm others."
– Reference from Bill Belsey, Cyberbullying Expert.
But why do bullies bully?
Jealousy: When folks are jealous of you, an inner demon takes them over. Then the defame, harass and discredit you.
Insecurity: Remember that bullies are often lacking something crucial in their lives and they seek pain in others, so do not
fill this void for them by giving them a reaction.
Intimidation: You are something they can never be or doing something they can never do. Hatred and envy sets in and the
bullying begins.
What should you do if you are bullied? Keep being the best at what you are doing. This angers them even more. They
hate progress. Their wish is to see you cry day and night but don’t.
Your reaction is exactly what they are seeking. Instead,
• document everything, and seek the proper authorities.
• Unfortunately cyberbullying allows cruelty at all ages to play out in a 24-7 arena.
• keyboard can be used as a lethal weapon today, and sadly more adults especially women have caught on.
I call upon you today and challenge you to replace those cyber-bullets with words of kindness. As grown-ups and
leaders we need to lead by walking the talk.
Every post we make public, every text message we send, every email we write, should exhibit respect for ourselves
and others.
• Speak and type with respect, because words hurts. They leave lasting scars and the scars left by bullying are very
difficult to erase.
• Do unto others as you want them to do unto you.
• Educate yourself on bullying and how to combat it. You might not be a victim, but knowing how to react when you
encounter harassment can be very important. You can also help others with what you know.
• Let’s teach ourselves and our children that it is so beautiful to care at all ages, and that being nice despite all the
stones thrown at you by bullies isn’t that difficult. From boys, to girls, to adults and to entire villages – we as
women and parents can make a difference by acting as cyber-shields.
• And finally, I cannot emphasize enough about the importance of investing in yourself. Of making you a first rated
version of you than a second rated or an imitation of someone else. It is magical because it takes the distraction
off other people and put on you. I speak from experience. I have been bullied so badly but I decided to ignore and
turn my head and focus on me and just keep going.
http://www.cyberlawsindia.net/
What will finally break the internet?
Using: https://www.polleverywhere.com/
Ethics and cyber bullying
Ethics and cyber bullying

More Related Content

What's hot

Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipKati W
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingringw1sl
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace Karnika Seth
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.jessy0121
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Awareness Of Social Media
Awareness Of Social MediaAwareness Of Social Media
Awareness Of Social MediaAkbar Kiani
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and securitynikunjandy
 
Etiquette in the Digital World
Etiquette in the Digital WorldEtiquette in the Digital World
Etiquette in the Digital Worldmgastgoodman
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingCoachElrod
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 

What's hot (20)

Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
Secrets to E-commerce Success
Secrets to E-commerce SuccessSecrets to E-commerce Success
Secrets to E-commerce Success
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Awareness Of Social Media
Awareness Of Social MediaAwareness Of Social Media
Awareness Of Social Media
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Attack Analysis
Cyber Attack AnalysisCyber Attack Analysis
Cyber Attack Analysis
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Etiquette in the Digital World
Etiquette in the Digital WorldEtiquette in the Digital World
Etiquette in the Digital World
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Cyber law
Cyber lawCyber law
Cyber law
 
Research in ICT
Research in ICTResearch in ICT
Research in ICT
 

Similar to Ethics and cyber bullying

Technology Presentation
Technology PresentationTechnology Presentation
Technology PresentationTatiDenai
 
Cyberbullying and internent addiction
Cyberbullying  and internent addictionCyberbullying  and internent addiction
Cyberbullying and internent addictionChristopher Mejia
 
Ppt cyberbullying nelson mandela school
Ppt cyberbullying nelson mandela schoolPpt cyberbullying nelson mandela school
Ppt cyberbullying nelson mandela schoolAnnemieke Akkermans
 
Bullying prevention #3 2016
Bullying prevention #3 2016Bullying prevention #3 2016
Bullying prevention #3 2016superrin
 
DigitalSkills Presentation: Cyberbullying
DigitalSkills Presentation: CyberbullyingDigitalSkills Presentation: Cyberbullying
DigitalSkills Presentation: Cyberbullyingdigitalskills
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GArissa Ablao
 
2013 officer parler's bullying presentation
2013 officer parler's bullying presentation2013 officer parler's bullying presentation
2013 officer parler's bullying presentationkkopchick
 
cyberbullying among teenagers .pdf
cyberbullying among teenagers .pdfcyberbullying among teenagers .pdf
cyberbullying among teenagers .pdfawatefalshehhi2
 
Cyberbulling
CyberbullingCyberbulling
Cyberbullingeliasfiad
 

Similar to Ethics and cyber bullying (20)

Ciberbullying
CiberbullyingCiberbullying
Ciberbullying
 
Technology Presentation
Technology PresentationTechnology Presentation
Technology Presentation
 
Cyberbullying and internent addiction
Cyberbullying  and internent addictionCyberbullying  and internent addiction
Cyberbullying and internent addiction
 
Ppt cyberbullying nelson mandela school
Ppt cyberbullying nelson mandela schoolPpt cyberbullying nelson mandela school
Ppt cyberbullying nelson mandela school
 
Bullying prevention #3 2016
Bullying prevention #3 2016Bullying prevention #3 2016
Bullying prevention #3 2016
 
Cyberbulling!
Cyberbulling!Cyberbulling!
Cyberbulling!
 
cyberbullying TIC
cyberbullying TICcyberbullying TIC
cyberbullying TIC
 
DigitalSkills Presentation: Cyberbullying
DigitalSkills Presentation: CyberbullyingDigitalSkills Presentation: Cyberbullying
DigitalSkills Presentation: Cyberbullying
 
Alyssa's project
Alyssa's projectAlyssa's project
Alyssa's project
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)
 
Edp 279 unit 2.4
Edp 279 unit 2.4Edp 279 unit 2.4
Edp 279 unit 2.4
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
 
Don't Bullying
Don't BullyingDon't Bullying
Don't Bullying
 
2013 officer parler's bullying presentation
2013 officer parler's bullying presentation2013 officer parler's bullying presentation
2013 officer parler's bullying presentation
 
Bullying vs cyber bullying italy
Bullying vs cyber bullying italyBullying vs cyber bullying italy
Bullying vs cyber bullying italy
 
cyberbullying among teenagers .pdf
cyberbullying among teenagers .pdfcyberbullying among teenagers .pdf
cyberbullying among teenagers .pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbulling
CyberbullingCyberbulling
Cyberbulling
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 

More from Ashokkumar Gnanasekar (8)

Practical demo recon os footprinting
Practical demo recon  os footprintingPractical demo recon  os footprinting
Practical demo recon os footprinting
 
Open floor
Open floorOpen floor
Open floor
 
Famous hackers
Famous hackersFamous hackers
Famous hackers
 
Famous hackers group
Famous hackers groupFamous hackers group
Famous hackers group
 
Ethics and compliances
Ethics and compliancesEthics and compliances
Ethics and compliances
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber Security Worlshop Agenda
Cyber Security Worlshop AgendaCyber Security Worlshop Agenda
Cyber Security Worlshop Agenda
 
ECC-Certificate
ECC-CertificateECC-Certificate
ECC-Certificate
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 

Ethics and cyber bullying

  • 1.
  • 2. What is Cyberbullying any way? This involves the use of information and communication technologies such as e-mail, cell phone and pager text messages, instant messaging (IM), defamatory personal Web sites, and defamatory online personal polling Web sites, to support deliberate, repeated, and hostile behavior by an individual or group that is intended to harm others." – Reference from Bill Belsey, Cyberbullying Expert.
  • 3. But why do bullies bully? Jealousy: When folks are jealous of you, an inner demon takes them over. Then the defame, harass and discredit you. Insecurity: Remember that bullies are often lacking something crucial in their lives and they seek pain in others, so do not fill this void for them by giving them a reaction. Intimidation: You are something they can never be or doing something they can never do. Hatred and envy sets in and the bullying begins.
  • 4.
  • 5. What should you do if you are bullied? Keep being the best at what you are doing. This angers them even more. They hate progress. Their wish is to see you cry day and night but don’t. Your reaction is exactly what they are seeking. Instead, • document everything, and seek the proper authorities. • Unfortunately cyberbullying allows cruelty at all ages to play out in a 24-7 arena. • keyboard can be used as a lethal weapon today, and sadly more adults especially women have caught on. I call upon you today and challenge you to replace those cyber-bullets with words of kindness. As grown-ups and leaders we need to lead by walking the talk. Every post we make public, every text message we send, every email we write, should exhibit respect for ourselves and others.
  • 6.
  • 7.
  • 8. • Speak and type with respect, because words hurts. They leave lasting scars and the scars left by bullying are very difficult to erase. • Do unto others as you want them to do unto you. • Educate yourself on bullying and how to combat it. You might not be a victim, but knowing how to react when you encounter harassment can be very important. You can also help others with what you know. • Let’s teach ourselves and our children that it is so beautiful to care at all ages, and that being nice despite all the stones thrown at you by bullies isn’t that difficult. From boys, to girls, to adults and to entire villages – we as women and parents can make a difference by acting as cyber-shields. • And finally, I cannot emphasize enough about the importance of investing in yourself. Of making you a first rated version of you than a second rated or an imitation of someone else. It is magical because it takes the distraction off other people and put on you. I speak from experience. I have been bullied so badly but I decided to ignore and turn my head and focus on me and just keep going.
  • 10. What will finally break the internet? Using: https://www.polleverywhere.com/