SlideShare a Scribd company logo
1 of 12
+
Cyberbullying
By:Ana Cristina Tames
6B #28
Cyberbullying
+
Cyberbullying
 Cyberbullying is the bullying (an
unwanted, aggressive behavior among school
aged children that involves a real or perceived
power imbalance.) through electronic devices
such as cell phones, computers, tablets with
communication tools like social networks, text
messages, email, chat, and websites
+
 The National Crime Prevention Association
lists tactics often used by teen
cyberbullies.[16]
 Pretend they are other people online to trick
others
 Spread lies and rumors about victims
 Trick people into revealing personal
information
 Send or forward mean text messages
 Post pictures of victims without their consent
 Cyberbullying can happen 24 hour 7 days a
week, it can happen any time.
+
 Kids that are cyberbullied may :
 Use alcohol and drugs
 Skip school
 Experience in-person bullying
 Be unwilling to attend school
 Receive poor grades
 Have lower self-esteem
 Have more health problems
+  They are many ways to prevent parents and
kids pass through cyberbullying:
 Parents may be aware of what their kids are
doing online
 Know the sites they are visiting
 Parents know how to use the sites they like
 Ask their password, only to use them in
case of emergency
 Ask to “friend” or “follow” your kids on social
media sites or ask another trusted adult to
do so.
 Establised Rules about technology use
 be clear about what sites they can visit and
what they are permitted to do when they’re
online
 Tell them not to share anything that could hurt or
embarrass themselves or others
 Encourage kids to think about who they want to
+
THE USE OF SOCIAL
NETWORKS FOR CHILDREN
UNDER 13 YEARS OLD
by:Ana Cristina Tames
+
 The use of social networks for children
under 13 years old is not llegally
permitted however kids under 13 years
old use social networks to
communicate, play, work etc.
+
 This ways can parents protect their kids being on social
networks:
Social networking sites can have many benefits for
children, such as allowing them to explore new interests. Help
your children use them more safely by going over the following
tips and discussion starters.
 Check your child’s friend lists to see who has access to his
or her profile. Make sure your child knows all friends in
person.
 Teach your child to set profiles to private–but be aware that
privacy settings do not guarantee complete privacy.
 Have your child remove any inappropriate content and
photos and delete any personal information.
 Check the profiles of your child’s friends to see if there is
revealing information or photos about your child.
+

Pros Cons
Kids learn since Little how to use
or be part of social networks
The kids are exposed to many
risks
They have many ways to be
communicated with their friends
Sometimes the kids while playing
can be exposed to many risks
because the dont know how to
use social network
They can express themselves
and talk about their interests
Cyber-bullying could be more
prevalent
learn about new things and find
communities that encourage a
hobby or passion.
Most social networking sites put
all user-submitted information on
public view by default. So people
with malicious intentions can
access their profile
+
+
References
 www.stopcyberbullying.org
 denissejimenez.com -
 http://kidshealth.org/parent/positive/talk/cy
berbullying.html
 http://en.wikipedia.org/wiki/Red
+

More Related Content

What's hot

Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents Jennifer Holena
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineLuciusonSecurity
 
Social media contract for parents and teens
Social media contract for parents and teensSocial media contract for parents and teens
Social media contract for parents and teensJill Celeste
 
Social Media and Teenagers
Social Media and TeenagersSocial Media and Teenagers
Social Media and TeenagersJennifer Holena
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital CitizensJason Rushing
 
Social Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineSocial Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineHolly Solomon
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safetyrehmannb
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Family Internet Safety - Cyber Bullying
Family Internet Safety - Cyber BullyingFamily Internet Safety - Cyber Bullying
Family Internet Safety - Cyber BullyingDamon Taylor
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internetmalissa_1041
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentationgrp4.ed451
 
Social Media & Children's Safety 101
Social Media & Children's Safety 101Social Media & Children's Safety 101
Social Media & Children's Safety 101Chad Richards
 
Cyberbullying tips from connect safely
Cyberbullying tips from connect safelyCyberbullying tips from connect safely
Cyberbullying tips from connect safelyCurso RRSS
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 

What's hot (20)

NetSmart [English]
NetSmart [English]NetSmart [English]
NetSmart [English]
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Lotrecchiano grace
Lotrecchiano graceLotrecchiano grace
Lotrecchiano grace
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Social media contract for parents and teens
Social media contract for parents and teensSocial media contract for parents and teens
Social media contract for parents and teens
 
Social Media and Teenagers
Social Media and TeenagersSocial Media and Teenagers
Social Media and Teenagers
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital Citizens
 
Social Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineSocial Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe Online
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safety
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Family Internet Safety - Cyber Bullying
Family Internet Safety - Cyber BullyingFamily Internet Safety - Cyber Bullying
Family Internet Safety - Cyber Bullying
 
Protecting Your Child
Protecting Your ChildProtecting Your Child
Protecting Your Child
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Conversation
ConversationConversation
Conversation
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentation
 
Social Media & Children's Safety 101
Social Media & Children's Safety 101Social Media & Children's Safety 101
Social Media & Children's Safety 101
 
Cyberbullying tips from connect safely
Cyberbullying tips from connect safelyCyberbullying tips from connect safely
Cyberbullying tips from connect safely
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 

Viewers also liked (17)

Recycled Reads
Recycled ReadsRecycled Reads
Recycled Reads
 
Marketing Via Twitter: Fast & Furious 6
Marketing Via Twitter: Fast & Furious 6Marketing Via Twitter: Fast & Furious 6
Marketing Via Twitter: Fast & Furious 6
 
5 günde ingilizce
5 günde ingilizce5 günde ingilizce
5 günde ingilizce
 
BCEE uses BizTalk for more efficient information exchange and conversions
BCEE uses BizTalk for more efficient information exchange and conversionsBCEE uses BizTalk for more efficient information exchange and conversions
BCEE uses BizTalk for more efficient information exchange and conversions
 
Citrine소개서
Citrine소개서Citrine소개서
Citrine소개서
 
Google programmes and internships for students
Google programmes and internships for studentsGoogle programmes and internships for students
Google programmes and internships for students
 
001 design idea
001 design idea001 design idea
001 design idea
 
GroupFinder
GroupFinderGroupFinder
GroupFinder
 
Libraries as Entrepreneurial Booksellers: pt 2
Libraries as Entrepreneurial Booksellers: pt 2Libraries as Entrepreneurial Booksellers: pt 2
Libraries as Entrepreneurial Booksellers: pt 2
 
Creating The Ethereal Library
Creating The Ethereal LibraryCreating The Ethereal Library
Creating The Ethereal Library
 
Codearabe1 100320185048-phpapp01
Codearabe1 100320185048-phpapp01Codearabe1 100320185048-phpapp01
Codearabe1 100320185048-phpapp01
 
Multimedia Learning PPT
Multimedia Learning PPTMultimedia Learning PPT
Multimedia Learning PPT
 
Primary ed
Primary edPrimary ed
Primary ed
 
Leadership in global & multi cultural orgtns - power points
Leadership in global & multi cultural orgtns - power pointsLeadership in global & multi cultural orgtns - power points
Leadership in global & multi cultural orgtns - power points
 
Equity ed
Equity edEquity ed
Equity ed
 
Medical value travel to kerala
Medical value travel to keralaMedical value travel to kerala
Medical value travel to kerala
 
Lingerie shopping
Lingerie shoppingLingerie shopping
Lingerie shopping
 

Similar to Converstation

Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptNaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptpurush203
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Hurd, lindse slide share presentation
Hurd, lindse slide share presentationHurd, lindse slide share presentation
Hurd, lindse slide share presentationlhurd01
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshareLoreto Normanurst
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversationlippertnicole
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GArissa Ablao
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingStemGrade
 
aw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenaw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenJanet Weninger
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenHomeGuides
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sitesner1eje
 
The good, bad & ugly of social media
The good, bad  & ugly of social media The good, bad  & ugly of social media
The good, bad & ugly of social media Tuiki George
 
Social media on child development ppt.pptx
Social media on child development ppt.pptxSocial media on child development ppt.pptx
Social media on child development ppt.pptxsarahfauzna
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaAndri Priyatna
 
Social Media for Parents
Social Media for ParentsSocial Media for Parents
Social Media for Parentsagoldberghvs
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet SafetyMark Deming
 

Similar to Converstation (20)

Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Online safety
Online safetyOnline safety
Online safety
 
Hurd, lindse slide share presentation
Hurd, lindse slide share presentationHurd, lindse slide share presentation
Hurd, lindse slide share presentation
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshare
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversation
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
aw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenaw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-children
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Social networking leaflet
Social networking leafletSocial networking leaflet
Social networking leaflet
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sites
 
The good, bad & ugly of social media
The good, bad  & ugly of social media The good, bad  & ugly of social media
The good, bad & ugly of social media
 
Social media on child development ppt.pptx
Social media on child development ppt.pptxSocial media on child development ppt.pptx
Social media on child development ppt.pptx
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
Social Media for Parents
Social Media for ParentsSocial Media for Parents
Social Media for Parents
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Converstation

  • 2. + Cyberbullying  Cyberbullying is the bullying (an unwanted, aggressive behavior among school aged children that involves a real or perceived power imbalance.) through electronic devices such as cell phones, computers, tablets with communication tools like social networks, text messages, email, chat, and websites
  • 3. +  The National Crime Prevention Association lists tactics often used by teen cyberbullies.[16]  Pretend they are other people online to trick others  Spread lies and rumors about victims  Trick people into revealing personal information  Send or forward mean text messages  Post pictures of victims without their consent  Cyberbullying can happen 24 hour 7 days a week, it can happen any time.
  • 4. +  Kids that are cyberbullied may :  Use alcohol and drugs  Skip school  Experience in-person bullying  Be unwilling to attend school  Receive poor grades  Have lower self-esteem  Have more health problems
  • 5. +  They are many ways to prevent parents and kids pass through cyberbullying:  Parents may be aware of what their kids are doing online  Know the sites they are visiting  Parents know how to use the sites they like  Ask their password, only to use them in case of emergency  Ask to “friend” or “follow” your kids on social media sites or ask another trusted adult to do so.  Establised Rules about technology use  be clear about what sites they can visit and what they are permitted to do when they’re online  Tell them not to share anything that could hurt or embarrass themselves or others  Encourage kids to think about who they want to
  • 6. + THE USE OF SOCIAL NETWORKS FOR CHILDREN UNDER 13 YEARS OLD by:Ana Cristina Tames
  • 7. +  The use of social networks for children under 13 years old is not llegally permitted however kids under 13 years old use social networks to communicate, play, work etc.
  • 8. +  This ways can parents protect their kids being on social networks: Social networking sites can have many benefits for children, such as allowing them to explore new interests. Help your children use them more safely by going over the following tips and discussion starters.  Check your child’s friend lists to see who has access to his or her profile. Make sure your child knows all friends in person.  Teach your child to set profiles to private–but be aware that privacy settings do not guarantee complete privacy.  Have your child remove any inappropriate content and photos and delete any personal information.  Check the profiles of your child’s friends to see if there is revealing information or photos about your child.
  • 9. +  Pros Cons Kids learn since Little how to use or be part of social networks The kids are exposed to many risks They have many ways to be communicated with their friends Sometimes the kids while playing can be exposed to many risks because the dont know how to use social network They can express themselves and talk about their interests Cyber-bullying could be more prevalent learn about new things and find communities that encourage a hobby or passion. Most social networking sites put all user-submitted information on public view by default. So people with malicious intentions can access their profile
  • 10. +
  • 11. + References  www.stopcyberbullying.org  denissejimenez.com -  http://kidshealth.org/parent/positive/talk/cy berbullying.html  http://en.wikipedia.org/wiki/Red
  • 12. +