SlideShare a Scribd company logo
1 of 10
Cyberbullying is the use of technology to harass, threaten, embarrass, or target
another person. By definition, it occurs among young people. When an adult is
involved, it may meet the definition of cyber-harassment or cyber-stalking, a
crime that can have legal consequences and involve jail time.
Sometimes cyberbullying can be easy to spot — for example, if your child shows
you a text message, tweet, or response to a status update on Facebook that is
harsh, mean, or cruel. Other acts are less obvious, like impersonating a victim
online or posting personal information, photos, or videos designed to hurt or
embarrass another person. Some kids report that a fake account, web page, or
online persona has been created with the sole intention to harass and bully.
Cyberbullying also can happen accidentally. The impersonal nature of text
messages, IMs, and emails make it very hard to detect the sender's tone — one
person's joke could be another's hurtful insult. Nevertheless, a repeated pattern
of emails, text messages, and online posts is rarely accidental.
Efects of cyberbullying


No longer limited to schoolyards or street corners, modern-day bullying can
happen at home as well as at school — essentially 24 hours a day. As long as
kids have access to a phone, computer, or other device (such as an I
Touch), they are at risk.
Severe or chronic cyberbullying can leave victims at greater risk for
anxiety, depression, and other stress-related disorders. In some rare but
highly publicized cases, some kids have turned to suicide.
The punishment for cyberbullies can include being suspended from school or
kicked off of sports teams. Certain types of cyberbullying also may violate
school codes or even anti-discrimination or sexual harassment laws.
How Parents Can Help
If you discover that your child is being cyberbullied, talk to him or her about any experiences you have
had in your childhood. This can help your child feel less alone. Let your child know that it's not his or
her fault, and that bullying says more about the bully than the victim. Talking to teachers or school
administrators also may help, but take cues from your child.
Many schools, school districts, and after-school clubs have established protocols for responding to
cyberbullying; these vary by district and state. But before reporting the problem, let your child know
that you plan to do so, as he or she could have concerns about "tattling" and might prefer that the
problem be handled privately.
Other measures to try:
Block the bully. Most devices have settings that allow you to electronically block emails, IMs, or text
messages from specific people.
Limit access to technology. Although it's hurtful, many kids who are bullied can't resist the temptation
to check websites or phones to see if there are new messages. Keep the computer in a public place in
the house (no laptops in children's bedrooms, for example) and limit the use of cell phones and games.
Some companies allow you to turn off text messaging services during certain hours. And, most
websites and phones provide the option for parental controls, which provide parents with access to
their children’s messages and online life.
Know your kids' online world. Check their postings and the sites kids visit, and be aware of how they
spend their time online. Talk to them about the importance of privacy and why it's a bad idea to share
personal information online, even with friends. Encourage them to safeguard passwords. Write up cell
phone and social media contracts that you are willing to enforce.
Look to the web for resource and support information about cyberbullying.
If your son or daughter agrees, you may also arrange for mediation with a therapist or counselor at
school who can work with your child and/or the bully.
When Your Child Is the Bully
Finding out that your kid is the one who is behaving inappropriately can be upsetting and
heartbreaking. It's important to address the problem head on and not wait for it to go away.
Talk to your child firmly about his or her actions and explain the negative impact it has on others.
Joking and teasing might seem OK, but it can hurt people's feelings and lead to getting in trouble.
Bullying — in any form — is unacceptable; there can be serious (and sometimes irrevocable)
consequences at home, school, and in the community if it continues.
Remind your child that the use of cell phones and computers is a privilege. Sometimes it helps to
restrict the use of these devices until behavior improves. If you feel your child should have a cell
phone for safety reasons, make sure it is a phone that can only be used for emergency purposes.
Insist on strict parental controls on all devices if there is any history of your child making impulsive
decisions when they are online.
To get to the heart of the matter, sometimes talking to teachers, guidance counselors, and other
school officials can help identify situations that lead a kid to bully others. If your child has trouble
managing anger, talk to a therapist about helping your son or daughter learn to cope with anger,
hurt, frustration, and other strong emotions in a healthy way.
Professional counseling often helps kids learn to deal with their feelings and improve their
confidence and social skills, which in turn can reduce the risk of bullying. If you're tech-savvy
yourself, model good online habits to help your kids understand the benefits and the dangers of life
in the digital world.
How Are Teens Cyberbullied?
Being a victim of cyberbullying can be a common and painful experience. Some
youth who cyberbully
Pretend they are other people online to trick others
Spread lies and rumors about victims
Trick people into revealing personal information
Send or forward mean text messages
Post pictures of victims without their consent
When teens were asked why they think others cyberbully, 81 percent said
that cyberbullies think it’s funny. Other teens believe that youth who cyberbully
Don’t think it’s a big deal
Don’t think about the consequences
Are encouraged by friends
Think everybody cyberbullies
Think they won’t get caught
How Do Victims React?
Contrary to what cyberbullies may believe, cyberbullying is a big deal, and can cause a
variety of reactions in teens. Some teens have reacted in positive ways to try to
prevent cyberbullying by
Blocking communication with the cyberbully
Deleting messages without reading them
Talking to a friend about the bullying
Reporting the problem to an Internet service provider or website moderator
Many youth experience a variety of emotions when they are cyberbullied. Youth who
are cyberbullied report feeling angry, hurt, embarrassed, or scared. These emotions
can cause victims to react in ways such as
Seeking revenge on the bully
Avoiding friends and activities
Cyberbullying back
Some teens feel threatened because they may not know who is cyberbullying them.
Although cyberbullies may think they are anonymous, they can be found. If you
are cyberbullied or harassed and need help, save all communication with
the cyberbully and talk to a parent, teacher, law enforcement officer, or other adult
you trust.
How Can I Prevent Cyber bullying?
Teens have figured out ways to prevent cyber bullying. Follow in the footsteps of other
quick-thinking teens and
Refuse to pass along cyber bullying messages
Tell friends to stop cyber bullying
Block communication with cyber bullies
Report cyber bullying to a trusted adult
You can also help prevent cyber bullying by
Speaking with other students, as well as teachers and school administrators, to develop
rules against cyber bullying
Raising awareness of the cyber bullying problem in your community by holding an
assembly and creating fliers to give to younger kids or parents
Sharing NCPC’s anti-cyber bullying message with friends
Don’t forget that even though you can’t see a cyber bully or the bully’s victim, cyber
bullying causes real problems. If you wouldn’t say it in person, don’t say it online.
Delete cyber bullying. Don’t write it. Don’t forward it.
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa

More Related Content

What's hot

Cyberbullying assignment
Cyberbullying assignmentCyberbullying assignment
Cyberbullying assignment
Michelle Urdiales
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying Presentation
Megan Townes
 
Cyber Bullying Questionnaire Results
Cyber Bullying Questionnaire ResultsCyber Bullying Questionnaire Results
Cyber Bullying Questionnaire Results
a2columnd12
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
shannonmf
 
savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)
Chris Jagger
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
TeamBanana
 
PPT Year 9 Parent Presentation Evening Feb 2011
PPT Year 9 Parent Presentation Evening Feb 2011PPT Year 9 Parent Presentation Evening Feb 2011
PPT Year 9 Parent Presentation Evening Feb 2011
Loreto Normanurst
 

What's hot (17)

Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Parents must know about cyber bullying 2
Parents must know about cyber bullying  2Parents must know about cyber bullying  2
Parents must know about cyber bullying 2
 
Cyberbullying assignment
Cyberbullying assignmentCyberbullying assignment
Cyberbullying assignment
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying Presentation
 
Cyber Bullying Questionnaire Results
Cyber Bullying Questionnaire ResultsCyber Bullying Questionnaire Results
Cyber Bullying Questionnaire Results
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
NetSmart [English]
NetSmart [English]NetSmart [English]
NetSmart [English]
 
savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
PPT Year 9 Parent Presentation Evening Feb 2011
PPT Year 9 Parent Presentation Evening Feb 2011PPT Year 9 Parent Presentation Evening Feb 2011
PPT Year 9 Parent Presentation Evening Feb 2011
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 

Viewers also liked (6)

Navi Site Managed Cloud Services Case Study Connect Edu
Navi Site Managed Cloud Services Case Study Connect EduNavi Site Managed Cloud Services Case Study Connect Edu
Navi Site Managed Cloud Services Case Study Connect Edu
 
200903 웹인간론 요약본
200903 웹인간론 요약본200903 웹인간론 요약본
200903 웹인간론 요약본
 
Accounting
AccountingAccounting
Accounting
 
Mobile optimization 5.3.2011
Mobile optimization 5.3.2011Mobile optimization 5.3.2011
Mobile optimization 5.3.2011
 
Resume Kubota
Resume KubotaResume Kubota
Resume Kubota
 
Gold mine myanmar 0830-0845 mitchell
Gold mine myanmar 0830-0845 mitchellGold mine myanmar 0830-0845 mitchell
Gold mine myanmar 0830-0845 mitchell
 

Similar to Mili giuly cyberbullying este a a a a a a a aaaa

Bullying
BullyingBullying
Bullying
slinky1287
 

Similar to Mili giuly cyberbullying este a a a a a a a aaaa (20)

C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Bullying
BullyingBullying
Bullying
 
Bullying vs cyber bullying italy
Bullying vs cyber bullying italyBullying vs cyber bullying italy
Bullying vs cyber bullying italy
 
Cyber bullying-and-internet-addiction
Cyber bullying-and-internet-addictionCyber bullying-and-internet-addiction
Cyber bullying-and-internet-addiction
 
Cyber bullying-and-internet-addiction
Cyber bullying-and-internet-addictionCyber bullying-and-internet-addiction
Cyber bullying-and-internet-addiction
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Digital abuse
Digital abuseDigital abuse
Digital abuse
 
Preventing Cyberbullying
Preventing CyberbullyingPreventing Cyberbullying
Preventing Cyberbullying
 
Cyberbullying and internent addiction
Cyberbullying  and internent addictionCyberbullying  and internent addiction
Cyberbullying and internent addiction
 
Cyberbullying and Internet Addiction
Cyberbullying and Internet AddictionCyberbullying and Internet Addiction
Cyberbullying and Internet Addiction
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican Guard
 
Bullying In School Essay
Bullying In School EssayBullying In School Essay
Bullying In School Essay
 

More from miliarguelles

Info mili giuly tp10 esteeeeeeeeeeeeeeeeeeeeeeeee uykuyj
Info mili giuly tp10 esteeeeeeeeeeeeeeeeeeeeeeeee uykuyjInfo mili giuly tp10 esteeeeeeeeeeeeeeeeeeeeeeeee uykuyj
Info mili giuly tp10 esteeeeeeeeeeeeeeeeeeeeeeeee uykuyj
miliarguelles
 
Pedofilia sofi , giuly , mili
Pedofilia sofi , giuly , mili Pedofilia sofi , giuly , mili
Pedofilia sofi , giuly , mili
miliarguelles
 
Mili smartphone, trabajo practico numero 4
Mili smartphone, trabajo practico numero 4Mili smartphone, trabajo practico numero 4
Mili smartphone, trabajo practico numero 4
miliarguelles
 
Trabajopractico 9 mili giulyyyyyyyyyyyyyyy
Trabajopractico 9 mili giulyyyyyyyyyyyyyyyTrabajopractico 9 mili giulyyyyyyyyyyyyyyy
Trabajopractico 9 mili giulyyyyyyyyyyyyyyy
miliarguelles
 
Mili, muerte a las lenguas
Mili, muerte a las lenguasMili, muerte a las lenguas
Mili, muerte a las lenguas
miliarguelles
 
Mili giuly. trabajo numero 3
Mili giuly. trabajo numero 3Mili giuly. trabajo numero 3
Mili giuly. trabajo numero 3
miliarguelles
 
Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!
miliarguelles
 
Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!
miliarguelles
 
Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!
miliarguelles
 
Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!
miliarguelles
 
Trabajo practico 7 mili y giuly..
Trabajo practico 7 mili y giuly..Trabajo practico 7 mili y giuly..
Trabajo practico 7 mili y giuly..
miliarguelles
 
Trabajo practico 7 mili y giuly..
Trabajo practico 7 mili y giuly..Trabajo practico 7 mili y giuly..
Trabajo practico 7 mili y giuly..
miliarguelles
 
Trabajo practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeee11
Trabajo  practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeee11Trabajo  practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeee11
Trabajo practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeee11
miliarguelles
 
Trabajo practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeee
Trabajo  practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeeeTrabajo  practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeee
Trabajo practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeee
miliarguelles
 
Trabajo practico 6_ giuli y mili esteeeeeeeee.
Trabajo practico 6_ giuli y mili esteeeeeeeee.Trabajo practico 6_ giuli y mili esteeeeeeeee.
Trabajo practico 6_ giuli y mili esteeeeeeeee.
miliarguelles
 
Trabajo practico n°4 mili arguelles...........
Trabajo practico n°4 mili arguelles...........Trabajo practico n°4 mili arguelles...........
Trabajo practico n°4 mili arguelles...........
miliarguelles
 
Trabajo practico n°4 mili arguelles
Trabajo practico n°4 mili arguellesTrabajo practico n°4 mili arguelles
Trabajo practico n°4 mili arguelles
miliarguelles
 
Trabajo practico n°4 mili arguelles
Trabajo practico n°4 mili arguellesTrabajo practico n°4 mili arguelles
Trabajo practico n°4 mili arguelles
miliarguelles
 

More from miliarguelles (20)

Info mili giuly tp10 esteeeeeeeeeeeeeeeeeeeeeeeee uykuyj
Info mili giuly tp10 esteeeeeeeeeeeeeeeeeeeeeeeee uykuyjInfo mili giuly tp10 esteeeeeeeeeeeeeeeeeeeeeeeee uykuyj
Info mili giuly tp10 esteeeeeeeeeeeeeeeeeeeeeeeee uykuyj
 
Pedofilia sofi , giuly , mili
Pedofilia sofi , giuly , mili Pedofilia sofi , giuly , mili
Pedofilia sofi , giuly , mili
 
Mili smartphone, trabajo practico numero 4
Mili smartphone, trabajo practico numero 4Mili smartphone, trabajo practico numero 4
Mili smartphone, trabajo practico numero 4
 
Mili tpn5
Mili tpn5Mili tpn5
Mili tpn5
 
Trabajopractico 9 mili giulyyyyyyyyyyyyyyy
Trabajopractico 9 mili giulyyyyyyyyyyyyyyyTrabajopractico 9 mili giulyyyyyyyyyyyyyyy
Trabajopractico 9 mili giulyyyyyyyyyyyyyyy
 
Mili, muerte a las lenguas
Mili, muerte a las lenguasMili, muerte a las lenguas
Mili, muerte a las lenguas
 
Mili giuly. trabajo numero 3
Mili giuly. trabajo numero 3Mili giuly. trabajo numero 3
Mili giuly. trabajo numero 3
 
Ptlfs status
Ptlfs statusPtlfs status
Ptlfs status
 
Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!
 
Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!
 
Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!
 
Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!Milii giuly informatica trabajo 8!!!!!
Milii giuly informatica trabajo 8!!!!!
 
Trabajo practico 7 mili y giuly..
Trabajo practico 7 mili y giuly..Trabajo practico 7 mili y giuly..
Trabajo practico 7 mili y giuly..
 
Trabajo practico 7 mili y giuly..
Trabajo practico 7 mili y giuly..Trabajo practico 7 mili y giuly..
Trabajo practico 7 mili y giuly..
 
Trabajo practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeee11
Trabajo  practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeee11Trabajo  practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeee11
Trabajo practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeee11
 
Trabajo practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeee
Trabajo  practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeeeTrabajo  practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeee
Trabajo practico 6 giuly y mili esteeeeeeeeeeeeeeeeeeeeeeeee
 
Trabajo practico 6_ giuli y mili esteeeeeeeee.
Trabajo practico 6_ giuli y mili esteeeeeeeee.Trabajo practico 6_ giuli y mili esteeeeeeeee.
Trabajo practico 6_ giuli y mili esteeeeeeeee.
 
Trabajo practico n°4 mili arguelles...........
Trabajo practico n°4 mili arguelles...........Trabajo practico n°4 mili arguelles...........
Trabajo practico n°4 mili arguelles...........
 
Trabajo practico n°4 mili arguelles
Trabajo practico n°4 mili arguellesTrabajo practico n°4 mili arguelles
Trabajo practico n°4 mili arguelles
 
Trabajo practico n°4 mili arguelles
Trabajo practico n°4 mili arguellesTrabajo practico n°4 mili arguelles
Trabajo practico n°4 mili arguelles
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
Christopher Logan Kennedy
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Mili giuly cyberbullying este a a a a a a a aaaa

  • 1.
  • 2. Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. By definition, it occurs among young people. When an adult is involved, it may meet the definition of cyber-harassment or cyber-stalking, a crime that can have legal consequences and involve jail time. Sometimes cyberbullying can be easy to spot — for example, if your child shows you a text message, tweet, or response to a status update on Facebook that is harsh, mean, or cruel. Other acts are less obvious, like impersonating a victim online or posting personal information, photos, or videos designed to hurt or embarrass another person. Some kids report that a fake account, web page, or online persona has been created with the sole intention to harass and bully. Cyberbullying also can happen accidentally. The impersonal nature of text messages, IMs, and emails make it very hard to detect the sender's tone — one person's joke could be another's hurtful insult. Nevertheless, a repeated pattern of emails, text messages, and online posts is rarely accidental.
  • 3. Efects of cyberbullying No longer limited to schoolyards or street corners, modern-day bullying can happen at home as well as at school — essentially 24 hours a day. As long as kids have access to a phone, computer, or other device (such as an I Touch), they are at risk. Severe or chronic cyberbullying can leave victims at greater risk for anxiety, depression, and other stress-related disorders. In some rare but highly publicized cases, some kids have turned to suicide. The punishment for cyberbullies can include being suspended from school or kicked off of sports teams. Certain types of cyberbullying also may violate school codes or even anti-discrimination or sexual harassment laws.
  • 4. How Parents Can Help If you discover that your child is being cyberbullied, talk to him or her about any experiences you have had in your childhood. This can help your child feel less alone. Let your child know that it's not his or her fault, and that bullying says more about the bully than the victim. Talking to teachers or school administrators also may help, but take cues from your child. Many schools, school districts, and after-school clubs have established protocols for responding to cyberbullying; these vary by district and state. But before reporting the problem, let your child know that you plan to do so, as he or she could have concerns about "tattling" and might prefer that the problem be handled privately. Other measures to try: Block the bully. Most devices have settings that allow you to electronically block emails, IMs, or text messages from specific people. Limit access to technology. Although it's hurtful, many kids who are bullied can't resist the temptation to check websites or phones to see if there are new messages. Keep the computer in a public place in the house (no laptops in children's bedrooms, for example) and limit the use of cell phones and games. Some companies allow you to turn off text messaging services during certain hours. And, most websites and phones provide the option for parental controls, which provide parents with access to their children’s messages and online life. Know your kids' online world. Check their postings and the sites kids visit, and be aware of how they spend their time online. Talk to them about the importance of privacy and why it's a bad idea to share personal information online, even with friends. Encourage them to safeguard passwords. Write up cell phone and social media contracts that you are willing to enforce. Look to the web for resource and support information about cyberbullying. If your son or daughter agrees, you may also arrange for mediation with a therapist or counselor at school who can work with your child and/or the bully.
  • 5. When Your Child Is the Bully Finding out that your kid is the one who is behaving inappropriately can be upsetting and heartbreaking. It's important to address the problem head on and not wait for it to go away. Talk to your child firmly about his or her actions and explain the negative impact it has on others. Joking and teasing might seem OK, but it can hurt people's feelings and lead to getting in trouble. Bullying — in any form — is unacceptable; there can be serious (and sometimes irrevocable) consequences at home, school, and in the community if it continues. Remind your child that the use of cell phones and computers is a privilege. Sometimes it helps to restrict the use of these devices until behavior improves. If you feel your child should have a cell phone for safety reasons, make sure it is a phone that can only be used for emergency purposes. Insist on strict parental controls on all devices if there is any history of your child making impulsive decisions when they are online. To get to the heart of the matter, sometimes talking to teachers, guidance counselors, and other school officials can help identify situations that lead a kid to bully others. If your child has trouble managing anger, talk to a therapist about helping your son or daughter learn to cope with anger, hurt, frustration, and other strong emotions in a healthy way. Professional counseling often helps kids learn to deal with their feelings and improve their confidence and social skills, which in turn can reduce the risk of bullying. If you're tech-savvy yourself, model good online habits to help your kids understand the benefits and the dangers of life in the digital world.
  • 6. How Are Teens Cyberbullied? Being a victim of cyberbullying can be a common and painful experience. Some youth who cyberbully Pretend they are other people online to trick others Spread lies and rumors about victims Trick people into revealing personal information Send or forward mean text messages Post pictures of victims without their consent When teens were asked why they think others cyberbully, 81 percent said that cyberbullies think it’s funny. Other teens believe that youth who cyberbully Don’t think it’s a big deal Don’t think about the consequences Are encouraged by friends Think everybody cyberbullies Think they won’t get caught
  • 7. How Do Victims React? Contrary to what cyberbullies may believe, cyberbullying is a big deal, and can cause a variety of reactions in teens. Some teens have reacted in positive ways to try to prevent cyberbullying by Blocking communication with the cyberbully Deleting messages without reading them Talking to a friend about the bullying Reporting the problem to an Internet service provider or website moderator Many youth experience a variety of emotions when they are cyberbullied. Youth who are cyberbullied report feeling angry, hurt, embarrassed, or scared. These emotions can cause victims to react in ways such as Seeking revenge on the bully Avoiding friends and activities Cyberbullying back Some teens feel threatened because they may not know who is cyberbullying them. Although cyberbullies may think they are anonymous, they can be found. If you are cyberbullied or harassed and need help, save all communication with the cyberbully and talk to a parent, teacher, law enforcement officer, or other adult you trust.
  • 8. How Can I Prevent Cyber bullying? Teens have figured out ways to prevent cyber bullying. Follow in the footsteps of other quick-thinking teens and Refuse to pass along cyber bullying messages Tell friends to stop cyber bullying Block communication with cyber bullies Report cyber bullying to a trusted adult You can also help prevent cyber bullying by Speaking with other students, as well as teachers and school administrators, to develop rules against cyber bullying Raising awareness of the cyber bullying problem in your community by holding an assembly and creating fliers to give to younger kids or parents Sharing NCPC’s anti-cyber bullying message with friends Don’t forget that even though you can’t see a cyber bully or the bully’s victim, cyber bullying causes real problems. If you wouldn’t say it in person, don’t say it online. Delete cyber bullying. Don’t write it. Don’t forward it.