Presented by: Agita Pasaribu, S.H.,M.A
Live webinar with Faculty of Law and Faculty of Psychology, Universitas Merdeka Malang.
Webinar: https://youtu.be/NOJhUMEAcO4
Get to know more about Bullyid Indonesia: http://bullyid.org/
contact@bullyid.org
Agita Pasaribu - Bullyid Indonesia - Jakarta Smart City Presentation, 2020Agita Pasaribu
Presented by: Agita Pasaribu, SH., M.A
Live at Future City Jakarta's Webinar series
https://futurecity.jakarta.go.id/
More about Bullyid Indonesia: http://bullyid.org/
contact@bullyid.org
This document discusses cyber bullying, providing examples of different types including betrayal, breach of privacy, and unwanted posts. It notes that cyber bullying is illegal and can be investigated by police. Advice is given on how to stop and prevent cyber bullying by being private online, saving evidence, and reporting issues. The importance of bystanders speaking up is also highlighted.
Bullyid Indonesia Organization Profile 2022.pdfAgita Pasaribu
Bullyid is an organization that provides online counseling, legal support, and empowerment resources to victims of harassment and abuse in Indonesia. It offers confidential psychological and legal support through text, audio, and video to help victims anonymously. Its goals by 2030 are to empower women, provide access to justice, and increase access to mental healthcare to reduce harassment and suicide.
Students had unpleasant experiences meeting cyber contacts in person after chatting online. They wrongly trusted the strangers and thought meeting was safe. The document provides tips to stay safe such as ignoring messages from strangers, not sharing personal information, verifying cyber contacts' information, and not meeting strangers in person without a trusted adult. Block and tell an adult about any uncomfortable online interactions.
Cyberbullying involves the use of electronic devices and communication tools to bully or harass others. The document outlines some common tactics used by cyberbullies such as pretending to be other people online, spreading lies and rumors, and posting embarrassing pictures without consent. Kids who experience cyberbullying may engage in risky behaviors and have lower self-esteem. The document provides tips for parents to help prevent cyberbullying, such as being aware of their kids' online activities, using privacy settings appropriately, and establishing clear rules for technology use.
Cyber bullying involves using hurtful language online without considering others' feelings. The document provides tips for behaving respectfully online such as thinking carefully before posting, being courteous like in real life, speaking up against cyber bullying by asking bullies to remove hurtful content and saving evidence to tell trusted adults, and supporting peers who have been bullied. The overall message is about being an "upstander" by standing up for what is right online.
The document discusses various topics related to cybercrime including cyberbullying, online piracy, copyright, plagiarism, phishing, and protecting personal data. It defines these terms and provides information on what they are and how to prevent them. It also lists some online resources for further information on plagiarism, phishing, data protection, copyright, and piracy.
A 2009 Pew Research Center report found that over 90% of teens use the Internet, with 73% using social media sites and 54% reading blogs. The report also found that 70% of teens have digital cameras and 60% post photos online, with 40% having video cameras and 25% uploading videos. Additionally, 84% of 8-18 year olds have internet access at home, with 31% of 8-10 year olds owning cell phones and 65% owning handheld gaming devices. The document provides resources for internet safety including websites for kids and information on cyberbullying, online predators, and maintaining a balanced online and offline life.
Agita Pasaribu - Bullyid Indonesia - Jakarta Smart City Presentation, 2020Agita Pasaribu
Presented by: Agita Pasaribu, SH., M.A
Live at Future City Jakarta's Webinar series
https://futurecity.jakarta.go.id/
More about Bullyid Indonesia: http://bullyid.org/
contact@bullyid.org
This document discusses cyber bullying, providing examples of different types including betrayal, breach of privacy, and unwanted posts. It notes that cyber bullying is illegal and can be investigated by police. Advice is given on how to stop and prevent cyber bullying by being private online, saving evidence, and reporting issues. The importance of bystanders speaking up is also highlighted.
Bullyid Indonesia Organization Profile 2022.pdfAgita Pasaribu
Bullyid is an organization that provides online counseling, legal support, and empowerment resources to victims of harassment and abuse in Indonesia. It offers confidential psychological and legal support through text, audio, and video to help victims anonymously. Its goals by 2030 are to empower women, provide access to justice, and increase access to mental healthcare to reduce harassment and suicide.
Students had unpleasant experiences meeting cyber contacts in person after chatting online. They wrongly trusted the strangers and thought meeting was safe. The document provides tips to stay safe such as ignoring messages from strangers, not sharing personal information, verifying cyber contacts' information, and not meeting strangers in person without a trusted adult. Block and tell an adult about any uncomfortable online interactions.
Cyberbullying involves the use of electronic devices and communication tools to bully or harass others. The document outlines some common tactics used by cyberbullies such as pretending to be other people online, spreading lies and rumors, and posting embarrassing pictures without consent. Kids who experience cyberbullying may engage in risky behaviors and have lower self-esteem. The document provides tips for parents to help prevent cyberbullying, such as being aware of their kids' online activities, using privacy settings appropriately, and establishing clear rules for technology use.
Cyber bullying involves using hurtful language online without considering others' feelings. The document provides tips for behaving respectfully online such as thinking carefully before posting, being courteous like in real life, speaking up against cyber bullying by asking bullies to remove hurtful content and saving evidence to tell trusted adults, and supporting peers who have been bullied. The overall message is about being an "upstander" by standing up for what is right online.
The document discusses various topics related to cybercrime including cyberbullying, online piracy, copyright, plagiarism, phishing, and protecting personal data. It defines these terms and provides information on what they are and how to prevent them. It also lists some online resources for further information on plagiarism, phishing, data protection, copyright, and piracy.
A 2009 Pew Research Center report found that over 90% of teens use the Internet, with 73% using social media sites and 54% reading blogs. The report also found that 70% of teens have digital cameras and 60% post photos online, with 40% having video cameras and 25% uploading videos. Additionally, 84% of 8-18 year olds have internet access at home, with 31% of 8-10 year olds owning cell phones and 65% owning handheld gaming devices. The document provides resources for internet safety including websites for kids and information on cyberbullying, online predators, and maintaining a balanced online and offline life.
This document discusses cyberbullying, including definitions, types, perpetrators, victims, and prevention strategies. It defines cyberbullying as intentional and repeated harmful behavior through digital means, involving an imbalance of power. Two main types are direct attacks through messages and proxy bullying using others. Perpetrators commonly bully due to anger, revenge or entertainment, while victims are often younger than bullies. Consequences for victims include anxiety, depression, low self-esteem and in some cases suicide. The document recommends blocking and reporting bullies, as well as saving evidence and discussing issues with trusted adults. It emphasizes the importance of privacy online and developing realistic expectations of relationships.
Cyber safety: internet safety presentation for middle school studentsEllie Simons
Middle schoolers should take steps to stay safe online for both current and future protection. They should avoid sharing personal information or passwords, use secure passwords that are different for each account, and make sure social media settings are private. It's important not to share photos or personal details with unknown people online as anything posted can remain visible forever. If someone is bullying or threatening online, save evidence and tell a trusted adult for help. Overall, be careful what you post or share since things online can have lasting consequences.
This document discusses internet safety tips for kids. It warns that predators can learn a lot of personal information about kids in only 20 minutes online. The biggest mistakes kids make are accepting strangers into their social groups and sharing too much personal information. Kids should be careful about what photos and information they post online and avoid sexting or cyberbullying others, as both are illegal and can get them into serious trouble. The overall message is for kids to be cautious about who they interact with online and not share private details in order to stay safe on the internet.
This document provides tips for staying safe online, including when using social media. It advises guarding personal information from being shared publicly. When communicating online, children should avoid chatting with unknown adults and only share photos and information with trusted friends and family. The document also defines cyberbullying and how predators use manipulation tactics online. It concludes by offering strategies for protecting yourself such as being wary of suspicious emails and only sharing sensitive information on secure websites.
Cyberbullying involves the use of electronic communication tools like social media and text messaging to harass or bully an individual or group. It is considered willful and involves repeated harmful behavior online. Common acts of cyberbullying include offensive posts, messages, images, stealing passwords, and sending viruses. The document provides 10 tips to protect against cyberbullying, such as not responding to provocations, using proper online etiquette, saving evidence of harassment, and asking for help from authorities if feeling seriously threatened. It emphasizes thinking before posting online and protecting private information.
Cyber bullying takes many forms such as harassment, threats, denigration, impersonation, and exclusion carried out online. Statistics show that over 40% of kids have experienced cyber bullying at least once with the majority not telling their parents. Both boys and girls can be cyber bullies with older teens being more likely. Teachers, parents, and teens all have roles to play in addressing cyber bullying through school policies, monitoring online activities, encouraging victims to speak up, and protecting personal information. The key is a preventative response through education and open communication.
The document discusses various topics around censorship and censorship debates. It presents arguments for and against censorship of different media such as films, video games, books, and news/government information. It also discusses who should decide what content is censored, the influence of advertising including on children, and whether people should be granted gagging orders to prevent certain information about them being reported by the press.
A good digital citizen gives accurate and reliable information and is genuine and helpful when online. It is the responsibility of all students to collaborate in a friendly and courteous manner to develop and share online.
This document discusses cyber bullying, including defining it as bullying using electronic devices and communication tools. It outlines goals of understanding cyber bullying practices and effects, identifying victims, and proper response steps. Examples of cyber bullying provided are mean texts, emails, rumors on social media, and embarrassing photos/videos. The effects on those bullied and bullying others are described, such as depression, anxiety, and engagement in risky behaviors. The document concludes with recommendations to block or delete bullies, keep evidence, tell trusted adults, report abuse to authorities, ignore bullying, and delete messages.
This document provides information on cyber bullying, including how to identify it, its harmful effects, and ways to prevent and address it. Cyber bullying is defined as using technology to deliberately embarrass or hurt someone repeatedly. Signs someone is being cyber bullied include emotional distress, withdrawing from activities, and changes in mood or behavior. Cyber bullying can have serious psychological effects like low self-esteem and increased suicidal thoughts. To address it, one should not respond to bullies, collect evidence, identify the source, and report incidents to authorities. Students and schools can help by raising awareness and taking a stand against cyber bullying.
Pratiksha Rai presented on the psychological impact of trolls on social media. Trolling aims to provoke and upset others for reactions. While social media connects people, it also enables trolling which can cause depression, suicidal thoughts, sleep deprivation and poor self-esteem. Different types of trolls exist like grammar trolls and insult trolls. Laws address privacy violations and harassment from trolling. People speak up against trolls, but more action is needed as trolling is a new form of cybercrime.
This document discusses cyberbullying, including definitions, types of cyberbullies and victims, statistics, and advice. It defines cyberbullying as using technology to harass, threaten or intimidate others. Common forms include phones, IM, websites, and social media. Cyberbullies can remain anonymous and their messages spread quickly. The document provides scenarios to discuss appropriate responses and prevention strategies.
Cyberbullying involves using electronic technology like cell phones and social media to bully others. It can include threats, harassment, impersonation, and sharing private information without consent. To prevent cyberbullying, people should avoid sharing personal information online, only meet online friends in person with parents, and talk to parents about their online activities. Several websites provide resources for dealing with and preventing cyberbullying.
This document provides information and advice for teens regarding social networking, cyberbullying, sexting, and interacting online with sexual predators. It defines these terms and offers tips for safe online behavior. Specific advice includes not sharing private information online, using privacy settings, avoiding sharing compromising photos, and reporting any inappropriate contact from others. It also provides contact information for organizations that help with online safety issues.
Cyber-wellness involves being safe and responsible online. It teaches people to be careful sharing information online and how to respond if bullied. Cyber-bullying hurts people by spreading rumors online. While the internet offers advantages like research and games, there are also disadvantages like viruses and cyber-bullying. When emailing, chatting, or using social media, people should avoid sharing private information with strangers and be polite to prevent conflicts online.
A cyberbully uses the internet, cell phone, or other devices to send or post text or images to hurt or embarrass others. To help stop cyberbullying, keep passwords and personal information safe online, tell bullies that their behavior is unacceptable, and don't respond to or forward mean messages. If cyberbullying is an issue, block the bully, save evidence, and tell a trusted adult for help.
Cyberwellness talk by mdm saedah 2011 160211Saedah
The document outlines the details of a school's cyberwellness campaign that took place over several days and included various activities:
- An assembly talk on cyberwellness topics like netiquette and cyberbullying.
- Cyberwellness worksheets completed by students in form teacher guidance periods.
- A cyberwellness roving bus that visited the school over two days, where students participated in learning activities through different stations on the bus.
- Plans for student ambassadors to participate in a seminar on cyberwellness.
Cyberbullying Final Project by Group Anonymousccastronovo
This document discusses cyberbullying and provides information on its prevalence, effects, and potential solutions. It notes that 3 million children miss school each month due to bullying, 20% of cyberbullied kids think about suicide, and 4,500 kids commit suicide annually, mostly due to cyberbullying. The document explores how cyberbullying occurs, who it affects, why people do it, and potential solutions like monitoring kids' technology use and teaching kindness. Creative solutions presented include filling the internet with positive comments to outweigh negative ones and using an app to detect and report bullying.
1) The document discusses cyber bullying among adolescents and examines factors that influence their vulnerability to being cyber bullied or becoming cyber bullies.
2) It analyzes different motives for cyber bullying, including anonymity, entertainment, revenge, social status, and discusses how anonymity in particular gives adolescents confidence and makes punishment difficult.
3) The conclusion is that anonymity is a key reason adolescents cyber bully, and reducing anonymous use of technology could help decrease cyber bullying. Further research is still needed as technology continues advancing.
Tie digital citizenship project cyberbullyingseswear9388
The document defines cyberbullying as tormenting, threatening, harassing, humiliating or embarrassing a minor using the internet, mobile phones or other technology. There are two types: direct attacks sending messages to victims, and cyberbullying by proxy where bullies get others to cyberbully without their knowledge. Cyberbullying by proxy is more dangerous as it can involve adults. To prevent cyberbullying, education must build empathy, identify escalation, and create environments where negative attention seeking is not validated. The root causes of cyberbullying stem from offline social conditions, not technology itself.
This document discusses cyberbullying and its prevalence among youth. It notes that technology usage among school children continues to rise, with over 90% using the internet and 80% using cell phones regularly. While technology has benefits, it can also enable cyberbullying. Cyberbullying is defined as intentionally harming someone through electronic means to the point they feel harassed or unsafe. It discusses the different forms cyberbullying can take and why some youth engage in it, noting a lack of consideration for consequences. The document also outlines four types of cyberbullies and why cyberbullying remains common.
This document discusses cyberbullying, including definitions, types, perpetrators, victims, and prevention strategies. It defines cyberbullying as intentional and repeated harmful behavior through digital means, involving an imbalance of power. Two main types are direct attacks through messages and proxy bullying using others. Perpetrators commonly bully due to anger, revenge or entertainment, while victims are often younger than bullies. Consequences for victims include anxiety, depression, low self-esteem and in some cases suicide. The document recommends blocking and reporting bullies, as well as saving evidence and discussing issues with trusted adults. It emphasizes the importance of privacy online and developing realistic expectations of relationships.
Cyber safety: internet safety presentation for middle school studentsEllie Simons
Middle schoolers should take steps to stay safe online for both current and future protection. They should avoid sharing personal information or passwords, use secure passwords that are different for each account, and make sure social media settings are private. It's important not to share photos or personal details with unknown people online as anything posted can remain visible forever. If someone is bullying or threatening online, save evidence and tell a trusted adult for help. Overall, be careful what you post or share since things online can have lasting consequences.
This document discusses internet safety tips for kids. It warns that predators can learn a lot of personal information about kids in only 20 minutes online. The biggest mistakes kids make are accepting strangers into their social groups and sharing too much personal information. Kids should be careful about what photos and information they post online and avoid sexting or cyberbullying others, as both are illegal and can get them into serious trouble. The overall message is for kids to be cautious about who they interact with online and not share private details in order to stay safe on the internet.
This document provides tips for staying safe online, including when using social media. It advises guarding personal information from being shared publicly. When communicating online, children should avoid chatting with unknown adults and only share photos and information with trusted friends and family. The document also defines cyberbullying and how predators use manipulation tactics online. It concludes by offering strategies for protecting yourself such as being wary of suspicious emails and only sharing sensitive information on secure websites.
Cyberbullying involves the use of electronic communication tools like social media and text messaging to harass or bully an individual or group. It is considered willful and involves repeated harmful behavior online. Common acts of cyberbullying include offensive posts, messages, images, stealing passwords, and sending viruses. The document provides 10 tips to protect against cyberbullying, such as not responding to provocations, using proper online etiquette, saving evidence of harassment, and asking for help from authorities if feeling seriously threatened. It emphasizes thinking before posting online and protecting private information.
Cyber bullying takes many forms such as harassment, threats, denigration, impersonation, and exclusion carried out online. Statistics show that over 40% of kids have experienced cyber bullying at least once with the majority not telling their parents. Both boys and girls can be cyber bullies with older teens being more likely. Teachers, parents, and teens all have roles to play in addressing cyber bullying through school policies, monitoring online activities, encouraging victims to speak up, and protecting personal information. The key is a preventative response through education and open communication.
The document discusses various topics around censorship and censorship debates. It presents arguments for and against censorship of different media such as films, video games, books, and news/government information. It also discusses who should decide what content is censored, the influence of advertising including on children, and whether people should be granted gagging orders to prevent certain information about them being reported by the press.
A good digital citizen gives accurate and reliable information and is genuine and helpful when online. It is the responsibility of all students to collaborate in a friendly and courteous manner to develop and share online.
This document discusses cyber bullying, including defining it as bullying using electronic devices and communication tools. It outlines goals of understanding cyber bullying practices and effects, identifying victims, and proper response steps. Examples of cyber bullying provided are mean texts, emails, rumors on social media, and embarrassing photos/videos. The effects on those bullied and bullying others are described, such as depression, anxiety, and engagement in risky behaviors. The document concludes with recommendations to block or delete bullies, keep evidence, tell trusted adults, report abuse to authorities, ignore bullying, and delete messages.
This document provides information on cyber bullying, including how to identify it, its harmful effects, and ways to prevent and address it. Cyber bullying is defined as using technology to deliberately embarrass or hurt someone repeatedly. Signs someone is being cyber bullied include emotional distress, withdrawing from activities, and changes in mood or behavior. Cyber bullying can have serious psychological effects like low self-esteem and increased suicidal thoughts. To address it, one should not respond to bullies, collect evidence, identify the source, and report incidents to authorities. Students and schools can help by raising awareness and taking a stand against cyber bullying.
Pratiksha Rai presented on the psychological impact of trolls on social media. Trolling aims to provoke and upset others for reactions. While social media connects people, it also enables trolling which can cause depression, suicidal thoughts, sleep deprivation and poor self-esteem. Different types of trolls exist like grammar trolls and insult trolls. Laws address privacy violations and harassment from trolling. People speak up against trolls, but more action is needed as trolling is a new form of cybercrime.
This document discusses cyberbullying, including definitions, types of cyberbullies and victims, statistics, and advice. It defines cyberbullying as using technology to harass, threaten or intimidate others. Common forms include phones, IM, websites, and social media. Cyberbullies can remain anonymous and their messages spread quickly. The document provides scenarios to discuss appropriate responses and prevention strategies.
Cyberbullying involves using electronic technology like cell phones and social media to bully others. It can include threats, harassment, impersonation, and sharing private information without consent. To prevent cyberbullying, people should avoid sharing personal information online, only meet online friends in person with parents, and talk to parents about their online activities. Several websites provide resources for dealing with and preventing cyberbullying.
This document provides information and advice for teens regarding social networking, cyberbullying, sexting, and interacting online with sexual predators. It defines these terms and offers tips for safe online behavior. Specific advice includes not sharing private information online, using privacy settings, avoiding sharing compromising photos, and reporting any inappropriate contact from others. It also provides contact information for organizations that help with online safety issues.
Cyber-wellness involves being safe and responsible online. It teaches people to be careful sharing information online and how to respond if bullied. Cyber-bullying hurts people by spreading rumors online. While the internet offers advantages like research and games, there are also disadvantages like viruses and cyber-bullying. When emailing, chatting, or using social media, people should avoid sharing private information with strangers and be polite to prevent conflicts online.
A cyberbully uses the internet, cell phone, or other devices to send or post text or images to hurt or embarrass others. To help stop cyberbullying, keep passwords and personal information safe online, tell bullies that their behavior is unacceptable, and don't respond to or forward mean messages. If cyberbullying is an issue, block the bully, save evidence, and tell a trusted adult for help.
Cyberwellness talk by mdm saedah 2011 160211Saedah
The document outlines the details of a school's cyberwellness campaign that took place over several days and included various activities:
- An assembly talk on cyberwellness topics like netiquette and cyberbullying.
- Cyberwellness worksheets completed by students in form teacher guidance periods.
- A cyberwellness roving bus that visited the school over two days, where students participated in learning activities through different stations on the bus.
- Plans for student ambassadors to participate in a seminar on cyberwellness.
Cyberbullying Final Project by Group Anonymousccastronovo
This document discusses cyberbullying and provides information on its prevalence, effects, and potential solutions. It notes that 3 million children miss school each month due to bullying, 20% of cyberbullied kids think about suicide, and 4,500 kids commit suicide annually, mostly due to cyberbullying. The document explores how cyberbullying occurs, who it affects, why people do it, and potential solutions like monitoring kids' technology use and teaching kindness. Creative solutions presented include filling the internet with positive comments to outweigh negative ones and using an app to detect and report bullying.
1) The document discusses cyber bullying among adolescents and examines factors that influence their vulnerability to being cyber bullied or becoming cyber bullies.
2) It analyzes different motives for cyber bullying, including anonymity, entertainment, revenge, social status, and discusses how anonymity in particular gives adolescents confidence and makes punishment difficult.
3) The conclusion is that anonymity is a key reason adolescents cyber bully, and reducing anonymous use of technology could help decrease cyber bullying. Further research is still needed as technology continues advancing.
Tie digital citizenship project cyberbullyingseswear9388
The document defines cyberbullying as tormenting, threatening, harassing, humiliating or embarrassing a minor using the internet, mobile phones or other technology. There are two types: direct attacks sending messages to victims, and cyberbullying by proxy where bullies get others to cyberbully without their knowledge. Cyberbullying by proxy is more dangerous as it can involve adults. To prevent cyberbullying, education must build empathy, identify escalation, and create environments where negative attention seeking is not validated. The root causes of cyberbullying stem from offline social conditions, not technology itself.
This document discusses cyberbullying and its prevalence among youth. It notes that technology usage among school children continues to rise, with over 90% using the internet and 80% using cell phones regularly. While technology has benefits, it can also enable cyberbullying. Cyberbullying is defined as intentionally harming someone through electronic means to the point they feel harassed or unsafe. It discusses the different forms cyberbullying can take and why some youth engage in it, noting a lack of consideration for consequences. The document also outlines four types of cyberbullies and why cyberbullying remains common.
This document defines cyber-bullying and discusses its prevalence, forms, effects, and ways to address it. Cyber-bullying involves using technology to ridicule, threaten, harass or embarrass children and teens. It can occur directly through messages or indirectly by manipulating others. Effects on victims can include anxiety, depression, and in rare cases suicide. Parents, schools, and children can work to prevent cyber-bullying through open communication, monitoring technology use, and addressing underlying issues that may lead to bullying behavior.
Cyberbullyng: Causes, Effects, and Possible SolutionsJericoDiola
Cyberbullying or cyberharassment is a form of bullying or harassment using electronic means. Cyberbullying and Cyberharassment are also known as online bullying.
This document provides information about bullying from the California Department of Education. It defines bullying as unwanted aggressive behavior involving a real or perceived power imbalance with the intent to cause harm. It discusses the different types of bullying (verbal, social, and physical) and roles students can play (bully, target, bystander). It also covers cyberbullying and where bullying occurs, including at school, online, and in the student's community. The document provides resources for preventing and addressing bullying.
The document discusses cyber bullying, including its definition, causes, impacts, and approaches to addressing it. Cyber bullying involves using technology to harass or embarrass others repeatedly. It occurs for various reasons like revenge or attention-seeking. Studies show 12-26% of parents report their children being cyber bullied on social media sites. Impacts on victims include poor school performance, drug use, and even suicide. The document discusses the role of social media sites in monitoring users and laws around cyber bullying in different countries. There is debate around how involved government and technology companies should be in monitoring users and enforcing anti-bullying policies.
Cyberbullying involves the use of digital devices and social media to harass, threaten, embarrass or intimidate others. It has become a growing problem as technology has advanced. There are many factors that can influence cyberbullying, including gender, personality traits, internet use habits, life satisfaction and digital citizenship skills. Both the bullies and victims can experience negative emotional effects. Prevention efforts include education, legislation, social media guidelines, reporting incidents and seeking help from others.
This document discusses cyberbullying, including its forms, reasons behind it, statistics, means used, consequences, prevention, and laws in India. Cyberbullying commonly affects children and teens through social media, gaming, and online relationships. It can have serious emotional and physical impacts like depression and suicide. Laws in India prohibit cyberbullying under sections of IPC and IT Act. Reporting cyberbullying and supporting victims are recommended.
Internet safety and cyber bulling finalKaren Brooks
This document discusses internet safety and cyberbullying. It defines cyberbullying as using technology like email, phones, social media to repeatedly send cruel or harmful messages. Cyberbullying can cause great emotional harm. The document provides statistics on cyberbullying and outlines ways to prevent and respond to it, including keeping devices in public places, monitoring online activity, and taking screenshots as evidence to share with parents or authorities if needed. New York receives a "B+" grade for its anti-bullying laws from one organization.
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxchristiandean12115
Is Cyberbullying a Serious Cause of Suicide in Students and Should Those Culpable Be Charged as Murderers?
Almost every individual has some online presence today. Online presence has, with no doubt, made life easier and more entertaining than ever before. However, amidst all the benefits lie some of the worst dangers. One of such dangers is cyber bullying among school going students. Cyberbullying is essentially the use of electronic communication technology to bully another person, usually by sending intimidating or threatening messages. According to the article Cyberbullying Stats Show Massive Occurrence Rate, cyberbullying happens to at least 42 percent of school going teenagers ("Cyberbullying Stats Show Massive Occurrence Rate"). Those are students in middle and high school, aged between 13 years and 19 years. The consequences of cyberbullying are far reaching, and statistics indicate that at least 20 percent of students in middle school who become victims of cyberbullying think about suicide, with half of those attempting to take their lives ("Cyberbullying Stats Show Massive Occurrence Rate"). For example, cyberbullying caused the suicide of teen Brandy Vela, who killed herself in front of her family. Brandy suicided after months of cyberbullying, stalking and harassment. The police arrested Andres Arturo Villagomez and Karinthya Sanchez Romero 4 months after her death. They made up fake Facebook accounts and posted about her weight and look. Similarly, in Florida, 12-year-old Rebecca killed herself after being bullied for months by jumping off a cement factory tower. Before her death, she had been terrorized by more than 15 girls who picked on her through online messages for long. Two girls were arrested when they claimed on their Facebook page that they bullied the victim, Rebecca and they didn’t care that she died. Considering those repercussions, it is imperative that deliberate efforts are made to address the issue, and that should include possible prosecution of perpetrators, and at the extreme charging them with murder, or similar crimes. Although it is a complex issue, and many legal scholars argue on the contrary that such crimes should not attract stiff penalties, heavy punishments should be allowed to warn people and thus eliminate this behavior. In the following context, this research paper addresses the effects of the vice, what triggers the behavior and last the measures that should be taken.
Effects of Cyberbullying
Students often commit cyberbullying using mobile phones, computers, tablets and other such gadgets. However, those gadgets cannot be solely blamed for cyber bullying, in the same way that platforms like social media, blogs and such cannot be blamed for the same vice. Electronic communication tools have been highly useful to everyone, and social media, chats and other platforms have been used to bring positive changes at different levels in student environments. Online learning highly utilizes chat rooms; stud.
Cyberbullying involves using technology like email, social media, or cell phones to deliberately harass or threaten others. It differs from traditional bullying in that the bully can remain anonymous and the harassment has no limits of time or place. Common types of cyberbullying include flaming, harassment, denigration, impersonation, outing and trickery, exclusion, and cyberstalking. Cyberbullies may bully to feel powerful, for revenge, to entertain themselves, or without meaning to cause harm. Schools must recognize cyberbullying and enforce policies to protect students both online and offline.
This document summarizes a case study on cyberbullying. It conducted interviews and a survey to study instances of cyberbullying in India. The study found that 50% of respondents had faced cyberbullying, most often in schools. 68% thought girls were most vulnerable online. Common symptoms of cyberbullying included anxiety, depression, and suicidal thoughts. The study recommends counseling, reporting issues, and being cautious sharing personal information online to address cyberbullying. Overall, the document examines the prevalence and effects of cyberbullying in India and suggests ways to prevent and handle instances of online harassment.
Describe How to stop cyber bullying including what is cyber bullying, ways of cyber bullying, recognize cyber bullies and understand your role in prevention of cyber bullying. Also how you can raise you voice with Viraj Puri.
This document discusses cyberbullying and provides information and resources for parents. It defines cyberbullying as willful and repeated harm through electronic means. Some key points made include that about 37% of youth ages 12-17 experience cyberbullying, with girls being cyberbullied more than boys. Signs a child may be cyberbullied or cyberbullying others are discussed. Tips are provided for parents on preventing and addressing cyberbullying, including monitoring online use, building trust, and talking regularly. Resources for further information and support are also referenced.
This document discusses cyberbullying, defining it as using technology to deliberately and repeatedly harm others. It outlines who can bully whom (students, teachers, employers, etc.) and vehicles for cyberbullying like social media and texts. Characteristics include anonymity and accessibility anywhere. Motivations include anger, entertainment and boosting ego. The document provides examples and discusses roles of different parties. It offers advice for educators, schools, students and legal issues related to cyberbullying in Canada.
This document discusses social networking and cyberbullying. It provides statistics on popular social media sites like Facebook and Twitter, noting their large user bases and frequent logins. It also discusses how social media presence can affect employment and gives examples of campaigns and organizations working to address cyberbullying. Two stories are described of individuals who experienced cyberbullying: Amanda Todd, who died by suicide, and Justine, whose bully was caught and faced legal consequences. The document advocates taking action against cyberbullying.
Social Networiking & Cyber Bullying Presentationteganjoy97
This document discusses social networking and cyberbullying. It provides statistics on popular social media sites like Facebook and Twitter, noting their large user bases and frequent logins. It also discusses how social media presence can affect employment and gives examples of campaigns and organizations working to address cyberbullying. Two personal stories are described: Amanda Todd, who died by suicide after being cyberbullied, and Justine, who was cyberbullied by a former friend but found resolution through legal action.
Social Networking & Cyberbullying presentationlucycowell
This document discusses social networking and cyberbullying. It provides statistics on popular social media sites like Facebook and Twitter and their large user bases. It also discusses how social media presence can affect employment opportunities. The document outlines various campaigns and organizations working to address cyberbullying. It shares two personal stories about individuals who experienced cyberbullying and the impact it had on their lives.
Bullying: A Case Study
Essay On Cyberbullying
Cyber Bullying Essay example
Essay about Cyber Bullying
Cyber Bullying Essay
Essay about Dealing with Cyberbullying
Similar to Agita Pasaribu - Bullyid Indonesia - Bullying & Cyberbullying at University: Indonesia (20)
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Agita Pasaribu - Bullyid Indonesia - Bullying & Cyberbullying at University: Indonesia
1. Ways to cope with being bullied and
cyberbullied at University
CYBERBULLYING
stop normalizing Agita Pasaribu, S.H., M.A
Founder & Chairwoman
Bullyid Indonesia
http://bully.id/
*Konten dalam presentasi ini adalah murni untuk bahan edukasi
5. Round 1
Type of
Cyberbullying
Flaming
P
Pertengkaran dengan melibatkan kemarahan &
bahasa vulgar yang dilakukan via pesan elektronik.
Harassment
Melontarkan pesan buruk, ancaman, hinaan yang kejam
secara berulang-ulang
Agita Pasaribu - http://bully.id/
Denigration
Tindakan membenci/menghina seseorang di ranah siber
dengan cara mengirim/memuat rumor tertentu untuk
merusak reputasi seseorang
Impersonation
Memalsukan akun atau berpura-pura menjadi orang lain,
kemudian bertindak seperti orang tersebut dengan
menyebarluaskan informasi sensitif yang mengakibatkan
rusaknya reputasi Sorce: @tirta_hudhi's twitter
6. Tindakan seseorang yang meminta
anak untuk di cekik, dipukul, dianiaya
dan ditelanjangi atau diminta untuk
melakukan kegiatan seksual yang
disiarkan online. Umumnya predators
akan meminta salah satu dari keluarga
anak sebagai mediator/penganiaya.
Hal ini umumnya diiming-iming dengan
pemberian uang yang berujung
perdagangan anak.
Atau ancaman menyebar konten
pribadi ke publik, kerap dilakukan
orang terdekat. Pelaku revenge porn
adalah orang yg memiliki hubungan
dekat dengan korban, ancaman
dengan mengumbar informasi sensitif
ini umumnya dilakukan karena
perasaan balas dendam akibat putus
cinta, ingin menjatuhkan reputasi dan
martabat korban
Sorce: Tribunnews, 2019
Livestreaming Child
Sexual Abuse
Agita Pasaribu - http://bully.id/
Revenge Porn
"The impact on the children
can be for a lifetime. Some
of these children will never
fully recover"
Detective Sergeant Marshall to ABC News, 2020
7. Sorce: Out of the shadow report, 2019
Child Grooming
Upaya yang dilakukan seseorang untuk membangun hubungan,
kepercayaan, dan hubungan emosional dengan seorang anak atau remaja
sehingga mereka dapat memanipulasi, mengeksploitasi, dan melecehkan
mereka
Agita Pasaribu - http://bully.id/
8. Indicating a relationship with cyberbullying
cited interpersonal conflict and tension
(the person is, or their posts are, annoying, inappropriate,
negative, hurtful, revenge porn or they had a falling-out or a
breakup)
Cases we receive
Agita Pasaribu - http://bully.id/
9. Indicating a relationship with cyberbullying
cited interpersonal conflict and tension
(the person is, or their posts are, annoying, inappropriate,
negative, hurtful, revenge porn or they had a falling-out or a
breakup)
Indicating self-protection
(the person had harassed, stalked, or bullied them; they found
the person’s posts offensive;
or they did not want to give them access to their personal
information)
they are no longer in contact with that person
the person is not part of their life offline
Agita Pasaribu - http://bully.id/
Cases we receive
10. Sorce: ANI News, 2019
Decreased Self-Esteem Bullying of all kinds is often detrimental to the victim’s
self-esteem. Victims may believe that all of their peers dislike them and
develop issues with trust and confidence.
Emotional Distress Cyberbullying can lead to a shift in mood or emotion in the
victim. The constant stress of the attacks can make victims prone to outbursts
of frustration, sadness, or anger as they try to cope with the bullying.
Physical Symptoms Victims may begin to develop frequent headaches,
stomach aches, and have trouble sleeping. Though they are not attacked
physically by the bully, the ongoing stress of the harassment may still take a
physical toll as the victim grows increasingly stressed and anxious.
Depression Cyberbullying can cause victims to develop depression. The
constant stress and lowered self-esteem can cause them to feel hopeless,
unloved, and sadness.
Suicidal Thoughts About 20 percent of cyberbullying victims seriously consider
suicide. Bullying does not directly cause victims to commit suicide, but it does
put them at a higher risk of doing so.
The Impact
Agita Pasaribu - http://bully.id/
Sorce: Maryville University
12. Relevant Laws
Undang-Undang No. 23 Tahun 2002
tentang Perlindungan Anak, dan
revisinya UU No. 35 Tahun 2014 dan
revisi UU No. 16 Tahun 2017
Undang-Undang Nomor 39 Tahun
2009 Tentang Hak Asasi Manusia
Pasal 30 dan Pasal 35
Kitab Undang-Undang Hukum Pidana
(KUHP) Pasal 282, Pasal 283, Pasal
532
Kitab Undang-Undang Hukum Pidana
(KUHP) Pasal 289 sampai dengan
Pasal 296
Undang-Undang Nomor 19 Tahun
2016 Tentang Informasi dan
Transaksi Elektronik (ITE) Pasal 27
Undang-Undang Nomor 44 Tahun
2008 Tentang Pornografi Pasal 4
ayat 1
Undang-Undang Nomor 13 Tahun
2006 Perlindungan Saksi dan Korban
Pasal 1 ayat (2)
Surat Edaran Kepala Kepolisian Negara
Republik Indonesia Nomor SE/6/X/2015
Tahun 2015 tentang Penanganan Ujaran
Kebencian (Hate Speech)
Kitab Undang-Undang Hukum Pidana
(KUHP) Pasal 310, 311, 315, 317 dan
Pasal 318
Agita Pasaribu - http://bully.id/
13. 1 Screenshot chat/photo/video dari cyberbullying,
untuk bisa menjadi barang bukti untuk pelaporan
What you can do?
2 Jangan balas apabila ada yang melakukan
cyberbullying
Jangan balas apabila ada yang meng-iming iming
uang, popularitas, dan menyuruh untuk melakukan
sesuatu. Example: membuka baju, memperlihatkan alat
kelamin, dll.
3 "Report" dan "Block" account yang bersangkutan
4 Talk to someone you trust, because human interaction
is a key. Don't keep this all alone
5 Report this to police, you're helping to create our online
community to be a better and safer place for everyone
Agita Pasaribu - http://bully.id/
Sorce: Time Magazine, 2019
14. 1
Set-up bullying & cyberbullying policies and
procedures to protect students. (E.g. suspend or
expel students who participate in cyberbullying)
What University can do?
2 Provide students with anonymous report platform
3
Focus on bystanders; awareness, empathy, and
action
4
Provide emotional support for students and educate
them with legal consequences knowledge
5 Take cyberbullying cases seriously, change requires
action from lectures, University officials, parents and
bystanders to create better environment for everyone
Agita Pasaribu - http://bully.id/
Bystander
They witness
They can support the victim
They can advice bullies to stop
They can mediate a fight
They can stop and take actions if they're protected
15. 1
Be an active listener, engage with your children's
activities, communicate with them and count their
opinions in.
What parents can do?
2 Find the right vocabulary.
When talking with your teenager about their
schoolwork, or other isolation issues, strive to avoid
the accusatory use of ‘you’ and reframe what you
want to say using ‘I’ instead. Try the concrete use of
‘when’ instead of ‘if’ to help with motivation.
3
Agita Pasaribu - http://bully.id/
Reserve judgement.
Withhold your own judgement and instead use
exploratory language to help them identify their own
solution.
19. EMOTIONAL SUPPORT
INTERNS MONTHLY
REPORT
Agita Pasaribu - http://bully.id/
LEGAL KNOWLEDGE
SUPPORT
TECHNICAL SUPPORT
INTERVENTION
PRACTICES
Bully.id for University
FREE SUPPORTS FOR
ALL & REPORT
VIRTUAL INTERNSHIP
20. "Hurt no one, and don't let
anyone hurt you"
bully.id
BULLY.ID in Indonesia is a charity registered in Indonesia (0377350102014) and incorporated as a non-profit organization
Contact:
agita@bully.id