SlideShare a Scribd company logo
+
Cyberbullying
By:Ana Cristina Tames
6B #28
Cyberbullying
+
Cyberbullying
 Cyberbullying is the bullying (an
unwanted, aggressive behavior among school
aged children that involves a real or perceived
power imbalance.) through electronic devices
such as cell phones, computers, tablets with
communication tools like social networks, text
messages, email, chat, and websites
+
 The National Crime Prevention Association
lists tactics often used by teen
cyberbullies.[16]
 Pretend they are other people online to trick
others
 Spread lies and rumors about victims
 Trick people into revealing personal
information
 Send or forward mean text messages
 Post pictures of victims without their consent
 Cyberbullying can happen 24 hour 7 days a
week, it can happen any time.
+
 Kids that are cyberbullied may :
 Use alcohol and drugs
 Skip school
 Experience in-person bullying
 Be unwilling to attend school
 Receive poor grades
 Have lower self-esteem
 Have more health problems
+  They are many ways to prevent parents and
kids pass through cyberbullying:
 Parents may be aware of what their kids are
doing online
 Know the sites they are visiting
 Parents know how to use the sites they like
 Ask their password, only to use them in
case of emergency
 Ask to “friend” or “follow” your kids on social
media sites or ask another trusted adult to
do so.
 Establised Rules about technology use
 be clear about what sites they can visit and
what they are permitted to do when they’re
online
 Tell them not to share anything that could hurt or
embarrass themselves or others
 Encourage kids to think about who they want to
+
THE USE OF SOCIAL
NETWORKS FOR CHILDREN
UNDER 13 YEARS OLD
by:Ana Cristina Tames
+
 The use of social networks for children
under 13 years old is not llegally
permitted however kids under 13 years
old use social networks to
communicate, play, work etc.
+
 This ways can parents protect their kids being on social
networks:
Social networking sites can have many benefits for
children, such as allowing them to explore new interests. Help
your children use them more safely by going over the following
tips and discussion starters.
 Check your child’s friend lists to see who has access to his
or her profile. Make sure your child knows all friends in
person.
 Teach your child to set profiles to private–but be aware that
privacy settings do not guarantee complete privacy.
 Have your child remove any inappropriate content and
photos and delete any personal information.
 Check the profiles of your child’s friends to see if there is
revealing information or photos about your child.
+

Pros Cons
Kids learn since Little how to use
or be part of social networks
The kids are exposed to many
risks
They have many ways to be
communicated with their friends
Sometimes the kids while playing
can be exposed to many risks
because the dont know how to
use social network
They can express themselves
and talk about their interests
Cyber-bullying could be more
prevalent
learn about new things and find
communities that encourage a
hobby or passion.
Most social networking sites put
all user-submitted information on
public view by default. So people
with malicious intentions can
access their profile
+
+
References
 www.stopcyberbullying.org
 denissejimenez.com -
 http://kidshealth.org/parent/positive/talk/cy
berbullying.html
 http://en.wikipedia.org/wiki/Red
+

More Related Content

What's hot

NetSmart [English]
NetSmart [English]NetSmart [English]
NetSmart [English]
truyenthong_vng
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
Jennifer Holena
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
tdsparks3
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
LuciusonSecurity
 
Social media contract for parents and teens
Social media contract for parents and teensSocial media contract for parents and teens
Social media contract for parents and teens
Jill Celeste
 
Social Media and Teenagers
Social Media and TeenagersSocial Media and Teenagers
Social Media and Teenagers
Jennifer Holena
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital Citizens
Jason Rushing
 
Social Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineSocial Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineHolly Solomon
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safetyrehmannb
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
Marian Merritt
 
Family Internet Safety - Cyber Bullying
Family Internet Safety - Cyber BullyingFamily Internet Safety - Cyber Bullying
Family Internet Safety - Cyber Bullying
Damon Taylor
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
malissa_1041
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentation
grp4.ed451
 
Social Media & Children's Safety 101
Social Media & Children's Safety 101Social Media & Children's Safety 101
Social Media & Children's Safety 101
Chad Richards
 
Cyberbullying tips from connect safely
Cyberbullying tips from connect safelyCyberbullying tips from connect safely
Cyberbullying tips from connect safely
Curso RRSS
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 

What's hot (20)

NetSmart [English]
NetSmart [English]NetSmart [English]
NetSmart [English]
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Lotrecchiano grace
Lotrecchiano graceLotrecchiano grace
Lotrecchiano grace
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Social media contract for parents and teens
Social media contract for parents and teensSocial media contract for parents and teens
Social media contract for parents and teens
 
Social Media and Teenagers
Social Media and TeenagersSocial Media and Teenagers
Social Media and Teenagers
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital Citizens
 
Social Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineSocial Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe Online
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safety
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Family Internet Safety - Cyber Bullying
Family Internet Safety - Cyber BullyingFamily Internet Safety - Cyber Bullying
Family Internet Safety - Cyber Bullying
 
Protecting Your Child
Protecting Your ChildProtecting Your Child
Protecting Your Child
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Conversation
ConversationConversation
Conversation
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentation
 
Social Media & Children's Safety 101
Social Media & Children's Safety 101Social Media & Children's Safety 101
Social Media & Children's Safety 101
 
Cyberbullying tips from connect safely
Cyberbullying tips from connect safelyCyberbullying tips from connect safely
Cyberbullying tips from connect safely
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 

Viewers also liked

Recycled Reads
Recycled ReadsRecycled Reads
Marketing Via Twitter: Fast & Furious 6
Marketing Via Twitter: Fast & Furious 6Marketing Via Twitter: Fast & Furious 6
Marketing Via Twitter: Fast & Furious 6
Jasmine Leong
 
5 günde ingilizce
5 günde ingilizce5 günde ingilizce
5 günde ingilizce
5 Günde İngilizce
 
BCEE uses BizTalk for more efficient information exchange and conversions
BCEE uses BizTalk for more efficient information exchange and conversionsBCEE uses BizTalk for more efficient information exchange and conversions
BCEE uses BizTalk for more efficient information exchange and conversions
Quadrant Communications
 
Citrine소개서
Citrine소개서Citrine소개서
Citrine소개서
logeo
 
Google programmes and internships for students
Google programmes and internships for studentsGoogle programmes and internships for students
Google programmes and internships for students
Andrii Gorbenko
 
GroupFinder
GroupFinderGroupFinder
Libraries as Entrepreneurial Booksellers: pt 2
Libraries as Entrepreneurial Booksellers: pt 2Libraries as Entrepreneurial Booksellers: pt 2
Libraries as Entrepreneurial Booksellers: pt 2
The Conference for Entrepreneurial Librarians
 
Creating The Ethereal Library
Creating The Ethereal LibraryCreating The Ethereal Library
Creating The Ethereal Library
The Conference for Entrepreneurial Librarians
 
Multimedia Learning PPT
Multimedia Learning PPTMultimedia Learning PPT
Multimedia Learning PPTSteven Vu Tran
 
Leadership in global & multi cultural orgtns - power points
Leadership in global & multi cultural orgtns - power pointsLeadership in global & multi cultural orgtns - power points
Leadership in global & multi cultural orgtns - power pointsTheo OC Okunna
 
Medical value travel to kerala
Medical value travel to keralaMedical value travel to kerala
Medical value travel to kerala
Mohanakrishnan Perumpilavil
 

Viewers also liked (17)

Recycled Reads
Recycled ReadsRecycled Reads
Recycled Reads
 
Marketing Via Twitter: Fast & Furious 6
Marketing Via Twitter: Fast & Furious 6Marketing Via Twitter: Fast & Furious 6
Marketing Via Twitter: Fast & Furious 6
 
5 günde ingilizce
5 günde ingilizce5 günde ingilizce
5 günde ingilizce
 
BCEE uses BizTalk for more efficient information exchange and conversions
BCEE uses BizTalk for more efficient information exchange and conversionsBCEE uses BizTalk for more efficient information exchange and conversions
BCEE uses BizTalk for more efficient information exchange and conversions
 
Citrine소개서
Citrine소개서Citrine소개서
Citrine소개서
 
Google programmes and internships for students
Google programmes and internships for studentsGoogle programmes and internships for students
Google programmes and internships for students
 
001 design idea
001 design idea001 design idea
001 design idea
 
GroupFinder
GroupFinderGroupFinder
GroupFinder
 
Libraries as Entrepreneurial Booksellers: pt 2
Libraries as Entrepreneurial Booksellers: pt 2Libraries as Entrepreneurial Booksellers: pt 2
Libraries as Entrepreneurial Booksellers: pt 2
 
Creating The Ethereal Library
Creating The Ethereal LibraryCreating The Ethereal Library
Creating The Ethereal Library
 
Codearabe1 100320185048-phpapp01
Codearabe1 100320185048-phpapp01Codearabe1 100320185048-phpapp01
Codearabe1 100320185048-phpapp01
 
Multimedia Learning PPT
Multimedia Learning PPTMultimedia Learning PPT
Multimedia Learning PPT
 
Primary ed
Primary edPrimary ed
Primary ed
 
Leadership in global & multi cultural orgtns - power points
Leadership in global & multi cultural orgtns - power pointsLeadership in global & multi cultural orgtns - power points
Leadership in global & multi cultural orgtns - power points
 
Equity ed
Equity edEquity ed
Equity ed
 
Medical value travel to kerala
Medical value travel to keralaMedical value travel to kerala
Medical value travel to kerala
 
Lingerie shopping
Lingerie shoppingLingerie shopping
Lingerie shopping
 

Similar to Converstation

Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
NaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
purush203
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
NiravD3
 
Online safety
Online safetyOnline safety
Online safety
Dr. Pravin Yadav
 
Hurd, lindse slide share presentation
Hurd, lindse slide share presentationHurd, lindse slide share presentation
Hurd, lindse slide share presentation
lhurd01
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
Al Rowell
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshareLoreto Normanurst
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversationlippertnicole
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
Arissa Ablao
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
StemGrade
 
aw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenaw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenJanet Weninger
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
HomeGuides
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Yumna Ali
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sites
ner1eje
 
The good, bad & ugly of social media
The good, bad  & ugly of social media The good, bad  & ugly of social media
The good, bad & ugly of social media
Tuiki George
 
Social media on child development ppt.pptx
Social media on child development ppt.pptxSocial media on child development ppt.pptx
Social media on child development ppt.pptx
sarahfauzna
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
Andri Priyatna
 
Social Media for Parents
Social Media for ParentsSocial Media for Parents
Social Media for Parentsagoldberghvs
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
Mark Deming
 

Similar to Converstation (20)

Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Online safety
Online safetyOnline safety
Online safety
 
Hurd, lindse slide share presentation
Hurd, lindse slide share presentationHurd, lindse slide share presentation
Hurd, lindse slide share presentation
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshare
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversation
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
aw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenaw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-children
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Social networking leaflet
Social networking leafletSocial networking leaflet
Social networking leaflet
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sites
 
The good, bad & ugly of social media
The good, bad  & ugly of social media The good, bad  & ugly of social media
The good, bad & ugly of social media
 
Social media on child development ppt.pptx
Social media on child development ppt.pptxSocial media on child development ppt.pptx
Social media on child development ppt.pptx
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
Social Media for Parents
Social Media for ParentsSocial Media for Parents
Social Media for Parents
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 

Recently uploaded

Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

Converstation

  • 2. + Cyberbullying  Cyberbullying is the bullying (an unwanted, aggressive behavior among school aged children that involves a real or perceived power imbalance.) through electronic devices such as cell phones, computers, tablets with communication tools like social networks, text messages, email, chat, and websites
  • 3. +  The National Crime Prevention Association lists tactics often used by teen cyberbullies.[16]  Pretend they are other people online to trick others  Spread lies and rumors about victims  Trick people into revealing personal information  Send or forward mean text messages  Post pictures of victims without their consent  Cyberbullying can happen 24 hour 7 days a week, it can happen any time.
  • 4. +  Kids that are cyberbullied may :  Use alcohol and drugs  Skip school  Experience in-person bullying  Be unwilling to attend school  Receive poor grades  Have lower self-esteem  Have more health problems
  • 5. +  They are many ways to prevent parents and kids pass through cyberbullying:  Parents may be aware of what their kids are doing online  Know the sites they are visiting  Parents know how to use the sites they like  Ask their password, only to use them in case of emergency  Ask to “friend” or “follow” your kids on social media sites or ask another trusted adult to do so.  Establised Rules about technology use  be clear about what sites they can visit and what they are permitted to do when they’re online  Tell them not to share anything that could hurt or embarrass themselves or others  Encourage kids to think about who they want to
  • 6. + THE USE OF SOCIAL NETWORKS FOR CHILDREN UNDER 13 YEARS OLD by:Ana Cristina Tames
  • 7. +  The use of social networks for children under 13 years old is not llegally permitted however kids under 13 years old use social networks to communicate, play, work etc.
  • 8. +  This ways can parents protect their kids being on social networks: Social networking sites can have many benefits for children, such as allowing them to explore new interests. Help your children use them more safely by going over the following tips and discussion starters.  Check your child’s friend lists to see who has access to his or her profile. Make sure your child knows all friends in person.  Teach your child to set profiles to private–but be aware that privacy settings do not guarantee complete privacy.  Have your child remove any inappropriate content and photos and delete any personal information.  Check the profiles of your child’s friends to see if there is revealing information or photos about your child.
  • 9. +  Pros Cons Kids learn since Little how to use or be part of social networks The kids are exposed to many risks They have many ways to be communicated with their friends Sometimes the kids while playing can be exposed to many risks because the dont know how to use social network They can express themselves and talk about their interests Cyber-bullying could be more prevalent learn about new things and find communities that encourage a hobby or passion. Most social networking sites put all user-submitted information on public view by default. So people with malicious intentions can access their profile
  • 10. +
  • 11. + References  www.stopcyberbullying.org  denissejimenez.com -  http://kidshealth.org/parent/positive/talk/cy berbullying.html  http://en.wikipedia.org/wiki/Red
  • 12. +