SlideShare a Scribd company logo
1 of 3
Download to read offline
Cyber Bullying
Laura Nicolai
What is Cyber Bullying?
• Bullying is no longer limited to the playground and can take away the
sense of safety that a child feels while at home.
• Stopbullying.gov defines cyber-bullying as, "...Bullying that takes place
using electronic technology. Electronic technology includes devices and
equipment such as cell phones, computers, and tablets as well as
communication tools including social media sites, text messages, chat, and
websites." Cyber-bullying behaviour can include, but is not limited to:
• Posting nasty pictures or messages about others on blogs, websites, or
social media
• Pretending to be someone else/fake profiles
• Spreading rumors on social networks
• Harassing text messages or emails
Forms of Cyber Bullying
• Sending Spyware and/or Hacking Programs: Using technology to
jeopardize or gain unauthorized access to someone else’s computer.
• Sending Pictures: Sending, posting, or altering compromising pictures of
others whether the images were taken with or without consent.

More Related Content

What's hot

Project 3 2 ismaeel mashi
Project 3 2 ismaeel mashiProject 3 2 ismaeel mashi
Project 3 2 ismaeel mashiIsmaeelMashi
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 
Internet Awareness October 2013
Internet Awareness October 2013Internet Awareness October 2013
Internet Awareness October 2013Julie Esanu
 
Responsible use presentation
Responsible use presentationResponsible use presentation
Responsible use presentationCarl Hooker
 
Cyber crime simon
Cyber crime simonCyber crime simon
Cyber crime simonudhaya jeni
 
Case study on general awareness of Social ethics in ICT on Indian Youths
Case study on general awareness of Social ethics in ICT on Indian YouthsCase study on general awareness of Social ethics in ICT on Indian Youths
Case study on general awareness of Social ethics in ICT on Indian YouthsRitika Kumari
 
Digital Natives
Digital NativesDigital Natives
Digital NativesChauTran09
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesMichael Zimmer
 
Cyber interaction and collaboration
Cyber interaction and collaborationCyber interaction and collaboration
Cyber interaction and collaborationalhooti11
 
Cyber Psychology & Cyberbullying
Cyber Psychology & CyberbullyingCyber Psychology & Cyberbullying
Cyber Psychology & CyberbullyingWarren Blumenfeld
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networkingBryan Tran
 
Technology and Social Isolation
Technology and Social Isolation Technology and Social Isolation
Technology and Social Isolation sashantz
 
Delcine of communication Due to technology
Delcine of communication Due to technologyDelcine of communication Due to technology
Delcine of communication Due to technologyshahzaib suleman
 
Legal & ethical issues when implementing technology
Legal & ethical issues when implementing technologyLegal & ethical issues when implementing technology
Legal & ethical issues when implementing technologypeav1n0
 

What's hot (20)

Project 3 2 ismaeel mashi
Project 3 2 ismaeel mashiProject 3 2 ismaeel mashi
Project 3 2 ismaeel mashi
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Internet Awareness October 2013
Internet Awareness October 2013Internet Awareness October 2013
Internet Awareness October 2013
 
Responsible use presentation
Responsible use presentationResponsible use presentation
Responsible use presentation
 
Cyber crime simon
Cyber crime simonCyber crime simon
Cyber crime simon
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Social networking and security
Social networking and securitySocial networking and security
Social networking and security
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Case study on general awareness of Social ethics in ICT on Indian Youths
Case study on general awareness of Social ethics in ICT on Indian YouthsCase study on general awareness of Social ethics in ICT on Indian Youths
Case study on general awareness of Social ethics in ICT on Indian Youths
 
Digital Natives
Digital NativesDigital Natives
Digital Natives
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United States
 
Cyber interaction and collaboration
Cyber interaction and collaborationCyber interaction and collaboration
Cyber interaction and collaboration
 
Cyber Psychology & Cyberbullying
Cyber Psychology & CyberbullyingCyber Psychology & Cyberbullying
Cyber Psychology & Cyberbullying
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networking
 
Technology and Social Isolation
Technology and Social Isolation Technology and Social Isolation
Technology and Social Isolation
 
Delcine of communication Due to technology
Delcine of communication Due to technologyDelcine of communication Due to technology
Delcine of communication Due to technology
 
Legal & ethical issues when implementing technology
Legal & ethical issues when implementing technologyLegal & ethical issues when implementing technology
Legal & ethical issues when implementing technology
 

Viewers also liked

Cac ham tinh trong excel
Cac ham tinh trong excelCac ham tinh trong excel
Cac ham tinh trong excelHoang Trang
 
ADFUNN
ADFUNNADFUNN
ADFUNNadfunn
 
All Apple photo shoot
All Apple photo shootAll Apple photo shoot
All Apple photo shootKushalMS
 
Mr. Silvo's newspaper stall
Mr. Silvo's newspaper stallMr. Silvo's newspaper stall
Mr. Silvo's newspaper stallKushalMS
 
Electrical Engineer -Nabeel Cv (1)
Electrical Engineer -Nabeel Cv (1)Electrical Engineer -Nabeel Cv (1)
Electrical Engineer -Nabeel Cv (1)Nabeel Aslam
 
LeanPat presentation
LeanPat presentation LeanPat presentation
LeanPat presentation impopescu
 
Catalogo ZUO 2014 - Modern
Catalogo ZUO 2014 - ModernCatalogo ZUO 2014 - Modern
Catalogo ZUO 2014 - ModernBeontop
 
Good For Nothing UXD Update - General Assembly Project
Good For Nothing UXD Update - General Assembly ProjectGood For Nothing UXD Update - General Assembly Project
Good For Nothing UXD Update - General Assembly ProjectCraig Adams
 
Uu nomor-2-tahun-2014-ttg-perubahan-uu-no-30-tahun-2004-ttg-jabatan-notaris
Uu nomor-2-tahun-2014-ttg-perubahan-uu-no-30-tahun-2004-ttg-jabatan-notarisUu nomor-2-tahun-2014-ttg-perubahan-uu-no-30-tahun-2004-ttg-jabatan-notaris
Uu nomor-2-tahun-2014-ttg-perubahan-uu-no-30-tahun-2004-ttg-jabatan-notariswanmarsella
 
Phase II Plan and Status of the Global Human Body Models Consortium (GHBMC) S...
Phase II Plan and Status of the Global Human Body Models Consortium (GHBMC) S...Phase II Plan and Status of the Global Human Body Models Consortium (GHBMC) S...
Phase II Plan and Status of the Global Human Body Models Consortium (GHBMC) S...jstitzel
 
Bai van hay cho hs lop 3
Bai van hay cho hs lop 3Bai van hay cho hs lop 3
Bai van hay cho hs lop 3Hoang Trang
 
An Advertising Design Problem
An Advertising Design ProblemAn Advertising Design Problem
An Advertising Design ProblemCraig Adams
 

Viewers also liked (13)

Cac ham tinh trong excel
Cac ham tinh trong excelCac ham tinh trong excel
Cac ham tinh trong excel
 
ADFUNN
ADFUNNADFUNN
ADFUNN
 
All Apple photo shoot
All Apple photo shootAll Apple photo shoot
All Apple photo shoot
 
Mr. Silvo's newspaper stall
Mr. Silvo's newspaper stallMr. Silvo's newspaper stall
Mr. Silvo's newspaper stall
 
Electrical Engineer -Nabeel Cv (1)
Electrical Engineer -Nabeel Cv (1)Electrical Engineer -Nabeel Cv (1)
Electrical Engineer -Nabeel Cv (1)
 
LeanPat presentation
LeanPat presentation LeanPat presentation
LeanPat presentation
 
Catalogo ZUO 2014 - Modern
Catalogo ZUO 2014 - ModernCatalogo ZUO 2014 - Modern
Catalogo ZUO 2014 - Modern
 
Good For Nothing UXD Update - General Assembly Project
Good For Nothing UXD Update - General Assembly ProjectGood For Nothing UXD Update - General Assembly Project
Good For Nothing UXD Update - General Assembly Project
 
Uu nomor-2-tahun-2014-ttg-perubahan-uu-no-30-tahun-2004-ttg-jabatan-notaris
Uu nomor-2-tahun-2014-ttg-perubahan-uu-no-30-tahun-2004-ttg-jabatan-notarisUu nomor-2-tahun-2014-ttg-perubahan-uu-no-30-tahun-2004-ttg-jabatan-notaris
Uu nomor-2-tahun-2014-ttg-perubahan-uu-no-30-tahun-2004-ttg-jabatan-notaris
 
Quiz
QuizQuiz
Quiz
 
Phase II Plan and Status of the Global Human Body Models Consortium (GHBMC) S...
Phase II Plan and Status of the Global Human Body Models Consortium (GHBMC) S...Phase II Plan and Status of the Global Human Body Models Consortium (GHBMC) S...
Phase II Plan and Status of the Global Human Body Models Consortium (GHBMC) S...
 
Bai van hay cho hs lop 3
Bai van hay cho hs lop 3Bai van hay cho hs lop 3
Bai van hay cho hs lop 3
 
An Advertising Design Problem
An Advertising Design ProblemAn Advertising Design Problem
An Advertising Design Problem
 

Similar to Cyber bullying

Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentationclifforddyyy
 
Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1remerosearcenal
 
Cyberbullying by Manuel Negrito
Cyberbullying by Manuel NegritoCyberbullying by Manuel Negrito
Cyberbullying by Manuel NegritoManuelNegrito
 
Cyber bullying arcenal and ayco (1)
Cyber bullying arcenal and ayco (1)Cyber bullying arcenal and ayco (1)
Cyber bullying arcenal and ayco (1)triciaayco
 
Tackling Cyberbullying: Know the Tactics, Protect Yourself
Tackling Cyberbullying: Know the Tactics, Protect YourselfTackling Cyberbullying: Know the Tactics, Protect Yourself
Tackling Cyberbullying: Know the Tactics, Protect YourselfBrian Markle
 
Geek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingGeek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingMelissa McDonald
 
Tech for teacher cyber
Tech for teacher cyberTech for teacher cyber
Tech for teacher cyberkenyahill2
 
Cyberbullying by david siaborret
Cyberbullying by david siaborretCyberbullying by david siaborret
Cyberbullying by david siaborretdavid terrobias
 
Cyberbullying (A little information)
Cyberbullying (A little information)Cyberbullying (A little information)
Cyberbullying (A little information)Fernanda Díaz
 
Camouflage and Safety in the Virtual World
Camouflage and Safety in the Virtual WorldCamouflage and Safety in the Virtual World
Camouflage and Safety in the Virtual WorldInterMediaKT
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullyingZiar Khan
 

Similar to Cyber bullying (20)

Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying by Manuel Negrito
Cyberbullying by Manuel NegritoCyberbullying by Manuel Negrito
Cyberbullying by Manuel Negrito
 
Cyber bullying arcenal and ayco (1)
Cyber bullying arcenal and ayco (1)Cyber bullying arcenal and ayco (1)
Cyber bullying arcenal and ayco (1)
 
Tackling Cyberbullying: Know the Tactics, Protect Yourself
Tackling Cyberbullying: Know the Tactics, Protect YourselfTackling Cyberbullying: Know the Tactics, Protect Yourself
Tackling Cyberbullying: Know the Tactics, Protect Yourself
 
Geek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingGeek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® Cyberbullying
 
Stephanie nichole ho
Stephanie nichole hoStephanie nichole ho
Stephanie nichole ho
 
Tech for teacher cyber
Tech for teacher cyberTech for teacher cyber
Tech for teacher cyber
 
Cyberbullying by david siaborret
Cyberbullying by david siaborretCyberbullying by david siaborret
Cyberbullying by david siaborret
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying (A little information)
Cyberbullying (A little information)Cyberbullying (A little information)
Cyberbullying (A little information)
 
Camouflage and Safety in the Virtual World
Camouflage and Safety in the Virtual WorldCamouflage and Safety in the Virtual World
Camouflage and Safety in the Virtual World
 
Stephanie nichole ho
Stephanie nichole hoStephanie nichole ho
Stephanie nichole ho
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Bullying
BullyingBullying
Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
 

Recently uploaded

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 

Recently uploaded (20)

ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 

Cyber bullying

  • 2. What is Cyber Bullying? • Bullying is no longer limited to the playground and can take away the sense of safety that a child feels while at home. • Stopbullying.gov defines cyber-bullying as, "...Bullying that takes place using electronic technology. Electronic technology includes devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat, and websites." Cyber-bullying behaviour can include, but is not limited to: • Posting nasty pictures or messages about others on blogs, websites, or social media • Pretending to be someone else/fake profiles • Spreading rumors on social networks • Harassing text messages or emails
  • 3. Forms of Cyber Bullying • Sending Spyware and/or Hacking Programs: Using technology to jeopardize or gain unauthorized access to someone else’s computer. • Sending Pictures: Sending, posting, or altering compromising pictures of others whether the images were taken with or without consent.