SlideShare a Scribd company logo
1 of 1
Cyberbullying is the use of social networks to repeatedly harm or harass other people in a
deliberate manner.[1]
According to U.S. Legal Definitions, "cyber-bullying could be limited to
posting rumors or gossips about a person in the internet bringing about hatred in other’s minds;
or it may go to the extent of personally identifying victims and publishing materials severely
defaming and humiliating them"
A majority of states have laws that explicitly include electronic forms of communication within
stalking or harassment laws.[28][29]
Most law enforcement agencies have cyber-crime units and often Internet stalking is treated with
more seriousness than reports of physical stalking.[30]
Help and resources can be searched by
state or area.
- Law inforcement
- Intimidation, emotional damage, suicide
-
- According to the Cyberbullying Research Center, "there have been several high‐profile
cases involving teenagers taking their own lives in part because of being harassed and
mistreated over the Internet, a phenomenon we have termed cyberbullicide – suicide
indirectly or directly influenced by experiences with online aggression."
- Cyberbullying is an intense form of psychological abuse, whose victims are more than
twice as likely to suffer from mental disorders compared to traditional bullying

More Related Content

What's hot

Luke Mawbey, Head of Technology, ComplyAdvantage - Fighting corruption with t...
Luke Mawbey, Head of Technology, ComplyAdvantage - Fighting corruption with t...Luke Mawbey, Head of Technology, ComplyAdvantage - Fighting corruption with t...
Luke Mawbey, Head of Technology, ComplyAdvantage - Fighting corruption with t...
Techsylvania
 
Panic theory slideshare
Panic theory slidesharePanic theory slideshare
Panic theory slideshare
Precious King
 
English presentation
English presentationEnglish presentation
English presentation
GinaSoler10
 

What's hot (10)

Cyberbullying and the law
Cyberbullying and the lawCyberbullying and the law
Cyberbullying and the law
 
Detecting Moral Foundations With Twitter
Detecting Moral Foundations With TwitterDetecting Moral Foundations With Twitter
Detecting Moral Foundations With Twitter
 
Poverty and crime cause final
Poverty and crime cause finalPoverty and crime cause final
Poverty and crime cause final
 
Luke Mawbey, Head of Technology, ComplyAdvantage - Fighting corruption with t...
Luke Mawbey, Head of Technology, ComplyAdvantage - Fighting corruption with t...Luke Mawbey, Head of Technology, ComplyAdvantage - Fighting corruption with t...
Luke Mawbey, Head of Technology, ComplyAdvantage - Fighting corruption with t...
 
6 motivations of cybercriminals
6 motivations of cybercriminals   6 motivations of cybercriminals
6 motivations of cybercriminals
 
Mass media and communication
Mass media and communication Mass media and communication
Mass media and communication
 
Panic theory slideshare
Panic theory slidesharePanic theory slideshare
Panic theory slideshare
 
English presentation
English presentationEnglish presentation
English presentation
 
Distributed Control for Inclusion - Matilda Wysocki, Refactor Camp 2018
Distributed Control for Inclusion - Matilda Wysocki, Refactor Camp 2018Distributed Control for Inclusion - Matilda Wysocki, Refactor Camp 2018
Distributed Control for Inclusion - Matilda Wysocki, Refactor Camp 2018
 
Cyber Bullying and Internet Addiction
Cyber Bullying and Internet AddictionCyber Bullying and Internet Addiction
Cyber Bullying and Internet Addiction
 

Viewers also liked (17)

Hekhek
HekhekHekhek
Hekhek
 
Arroyo
ArroyoArroyo
Arroyo
 
Chin
ChinChin
Chin
 
Doc1
Doc1Doc1
Doc1
 
Skolkovo Robotics Projects
Skolkovo Robotics ProjectsSkolkovo Robotics Projects
Skolkovo Robotics Projects
 
Chin111133333
Chin111133333Chin111133333
Chin111133333
 
4Ciri Cinta Sejati
 4Ciri   Cinta Sejati 4Ciri   Cinta Sejati
4Ciri Cinta Sejati
 
Pac Buzz - August 2015
Pac Buzz - August 2015Pac Buzz - August 2015
Pac Buzz - August 2015
 
Судебная практика по применению МНС в России
Судебная практика по применению МНС в РоссииСудебная практика по применению МНС в России
Судебная практика по применению МНС в России
 
Los sentidos
Los sentidosLos sentidos
Los sentidos
 
Psp n
Psp nPsp n
Psp n
 
Dx observacional indicadores
Dx observacional indicadoresDx observacional indicadores
Dx observacional indicadores
 
03
0303
03
 
¿ QUO VADIS, PATRIA?
¿ QUO VADIS, PATRIA?¿ QUO VADIS, PATRIA?
¿ QUO VADIS, PATRIA?
 
Pda 25 r
Pda 25 rPda 25 r
Pda 25 r
 
Fina lerbloque1ro a
Fina lerbloque1ro aFina lerbloque1ro a
Fina lerbloque1ro a
 
Sm02 tc
Sm02 tcSm02 tc
Sm02 tc
 

Similar to Cyberbullying

Cyber Bullying and Internet Addiction
Cyber Bullying and Internet AddictionCyber Bullying and Internet Addiction
Cyber Bullying and Internet Addiction
mabahongutot
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
ijtsrd
 
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxWHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
philipnelson29183
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Universitas Pembangunan Panca Budi
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
James Bollen
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
rayarren06
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
Enrique J Cordero
 

Similar to Cyberbullying (20)

Stalking2
Stalking2Stalking2
Stalking2
 
Cyber Bullying and Internet Addiction
Cyber Bullying and Internet AddictionCyber Bullying and Internet Addiction
Cyber Bullying and Internet Addiction
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxWHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
 
Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues
 
ASA style sample
ASA style sampleASA style sample
ASA style sample
 
Oula 9 a
Oula   9 aOula   9 a
Oula 9 a
 
Cyber crime (2)
Cyber crime (2)Cyber crime (2)
Cyber crime (2)
 
LEGAL PROTECTION OF WOMEN AS VICTIM OF THE CRIME OF PORNOGRAPHY (REVENGE PORN)
LEGAL PROTECTION OF WOMEN AS VICTIM OF THE CRIME OF PORNOGRAPHY (REVENGE PORN)LEGAL PROTECTION OF WOMEN AS VICTIM OF THE CRIME OF PORNOGRAPHY (REVENGE PORN)
LEGAL PROTECTION OF WOMEN AS VICTIM OF THE CRIME OF PORNOGRAPHY (REVENGE PORN)
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
Violent crime.pptx
Violent crime.pptxViolent crime.pptx
Violent crime.pptx
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
 

Cyberbullying

  • 1. Cyberbullying is the use of social networks to repeatedly harm or harass other people in a deliberate manner.[1] According to U.S. Legal Definitions, "cyber-bullying could be limited to posting rumors or gossips about a person in the internet bringing about hatred in other’s minds; or it may go to the extent of personally identifying victims and publishing materials severely defaming and humiliating them" A majority of states have laws that explicitly include electronic forms of communication within stalking or harassment laws.[28][29] Most law enforcement agencies have cyber-crime units and often Internet stalking is treated with more seriousness than reports of physical stalking.[30] Help and resources can be searched by state or area. - Law inforcement - Intimidation, emotional damage, suicide - - According to the Cyberbullying Research Center, "there have been several high‐profile cases involving teenagers taking their own lives in part because of being harassed and mistreated over the Internet, a phenomenon we have termed cyberbullicide – suicide indirectly or directly influenced by experiences with online aggression." - Cyberbullying is an intense form of psychological abuse, whose victims are more than twice as likely to suffer from mental disorders compared to traditional bullying