SlideShare a Scribd company logo
Yumna Ali
 Bullying is used to humiliate, threaten, oppress,
torment, and tyrannize someone. It can be
defined as a continuous misuse of power or
authority against a person or a group of people
that causes physical, emotional, and social harm
to that person or group. If this kind of attitude
and behavior happens online, it is called
cyberbullying.
 With over 100 million
users of smart phones in
Pakistan, Pakistan has been
included in the list of the
fastest growing countries
that are using internet
which only open the doors
for the fact that cyber
bullying is increasing as
well, yet there isn’t any
legislation for cyber crimes
in Pakistan.
 Harassment: Repeatedly sending offensive, rude, and insulting
messages
 Denigration: Distributing information about another that is
derogatory and untrue through posting it on a Web page,
sending it to others through email or instant messaging, or
posting or sending digitally altered photos of someone
 Flaming: Online "fighting" using electronic messages with
angry, vulgar language
 Impersonation: Breaking into an email or social networking
account and using that person's online identity to send or
post vicious or embarrassing material to/about others.
 Outing and Trickery: Sharing someone's secrets or
embarrassing information, or tricking someone into revealing
secrets or embarrassing information and forwarding it to
others
 Cyber Stalking: Repeatedly sending messages that include
threats of harm or are highly intimidating, or engaging in
other online activities that make a person afraid for his or
her safety (depending on the content of the message, it
may be illegal)
Common Forms of Cyber Bullying
 In Pakistan it seems that women are the easiest targets to be
bullied online, because the National Response Center for Cyber Crimes
(NR3C) does not have any legislation for cyber crimes such as hacking
and online stalking, there were several incidents that faced women
regarding these issues.
 Whoever with malicious intent gains unauthorized access to
any information system or data shall be punished with
imprisonment for a term which may extend to six months or
with fine which may extend to one hundred thousand rupees
or with both
• Cyber terrorism:
(a) the use or threat is designed to
coerce, intimidate, overawe or create
a sense of fear, panic or insecurity in
the Government or the public or a
section of the public or community or
sect or create a sense of fear or
insecurity in society; or
• (b) the use or threat is made for
the purpose or motive of advancing a
religious, ethnic or sectarian
cause; shall be punished with
imprisonment of either description for
a term which may extend to fourteen
years or with fine which may extend
to fifty million rupees or with both.
 You Can be Randomly Picked Up by LEAs
LEAs Can Come and Confiscate Your Laptop/Mobile or
anything They Want
Your Website Can Get Blocked, if Someone
Thinks its immoral
Spamming Can Cause You a Fine of Rs. 1 Million
Publishing a Meme on Facebook can Fine you With Rs. 1
Million
 How to prevent cyberbullying:
 Teenagers should take the effort to educate themselves on proper
“Internet etiquette.” This includes the proper use of emails, texts
and other forms of electronic messaging. Many negative posts or
messages sent online may simply have been sent accidentally or
misinterpreted, leaving either the sender, the receiver, or both
embarrassed, humiliated, hurt, or harassed.
 1. Use Computer Courtesy:
 Whether sending an email, chatting in a chat room, or speaking in a
forum, it is important to be courteous and respectful of others
onlineone should treat others the way he or she would like to be
treated. Likewise, just as you treat others with respect in the real
world, it is important that you apply these same basic rules online
as well.
 4. Keep Personal Information Private:
 Posting private and personal information
in the wrong locations can have serious
consequences. Identity theft is a rapidly
growing concern and divulging too much
information could give predators and
those with bad intentions valuable
information about yourself. When you
post your personal information on sites
such as Facebook, Twitter, and other
social networking sites, it is best to
restrict your privacy settings so that
only your friends can view personal
information. If private information is
posted in a group setting, read the
guidelines prior to posting to ensure that
such information will not be disclosed to
others.
 2. Think Before Posting:
 . Remember that once entered into the
Internet, online messages, posts, pictures,
or videos, will remain there forever, and
can be viewed by a massive, unknown
online audience. With cyberbullying, one
cannot just turn off the computer and
expect everything to return back to
normal. Even if the victim disconnects
himself from the Internet or other
electronic devices, cyberbullying can weave
itself back into the victim’s school,
workplace, or home environment.
 Password Safety
 1. Never, ever give your password on Facebook, MySpace, Aim, network, email, or
any similar service or cell phone unlock code to a friend. Friendships sometimes don’t
last, and that password or PIN can be used against you.
 2. Remember your secret answer. When you create an online account, and it asks
you to provide an accurate answer to a question you should know ‐ don’t treat it
lightly or as a joke. Make sure it’s something you will remember months and years
from now in case you have a problem at that time.
 3. Do not use passwords based on personal information (your login name, birthdate,
address, phone number, middle name, pet’s name, etc.).
 4. Use a mixture of upper and lowercase letters, numbers, and nonalphabetic
characters (symbols) if possible.
 . Help New Internet Users:
 Everyone was an Internet “newbie” at one
time. Many children and teen users that
gain access to social networking sites,
electronic devices, or the Internet for the
first time are unaware about how dangerous
these devices can be if abused or used
inappropriately. Although it is normal to be
excited about connecting with all of your
friends and classmates online, please be
mindful of the fact that there are others
on the Internet that abuse their privileges.
 You’ve been told “don’t talk to strangers.”
Well, people you meet on the Internet are
strangers. Other than friends you know in
“real life,” people online are not classified as
friends.
 Never agree to meet an online friend in
person. If someone asks to meet you, talk
to your parents about it.
 Do not lie about your age so you can go
somewhere on the Internet that is for
adults only.
 Do not spend excessive time on the
computer. You should partake in other
activities, exercise, and set aside time for
leisure.
 Something you see on the Internet might
make you uncomfortable or confused. Tell
your teacher or parent right away.
 Be Aware of What Your Kids are Doing Online
 Talk with your kids about cyberbullying and
other online issues regularly.
 Know the sites your kids visit and their
online activities. Ask where they’re going,
what they’re doing, and who they’re doing it
with.
 Tell your kids that as a responsible parent
you may review their online communications
if you think there is reason for concern.
Installing parental control filtering software
or monitoring programs are one option for
monitoring your child’s online behavior, but
do not rely solely on these tools.
 Have a sense of what they do online and in
texts. Learn about the sites they like. Try
out the devices they use.
 Ask for their passwords, but tell them you’ll
only use them in case of emergency.
 Ask to “friend” or “follow” your kids on
social media sites or ask another trusted
adult to do so.
 Encourage your kids to tell you immediately
if they, or someone they know, is being
cyberbullied. Explain that you will not take
away their computers or cell phones if they
confide in you about a problem they are
having.
 8. Be An Active Bystander:
 Bystanders play a key role in stopping and preventing cyberbullying. Cyberbullies depend on
bystanders to support them or do nothing to stop them. The real leaders are those who choose to
take an active role when they witness bullying and decide not go along with the crowd.
 If you witness cyberbullying, do not join in, nor stand by idly.
 Document if you see cyberbullying online, and when
 Don’t encourage the behavior, it is easy to fall under the peer pressure, but stand up for yourself!
 Don’t forward hurtful messages
 Don’t laugh at inappropriate jokes
 Tell an adult they trust
 Do not support cyberbullies, stand up for what is right and report cyberbullying cases to reliable
sources – “report center”.
 Educate yourself on effective preventative measures you can take
 What to do if you are a cyberbullying victim:
 . You CANNOT Just Turn Off the Computer:
 Those who do not completely understand the
phenomenon often wonder, “What’s the big deal?
Why don’t kids just turn off their computers?”
However, those who make this statement do not
realize that the process is not so simple. There
are a number of reasons why “clicking the exit
button” or “turning off the computer” simply
aren’t viable options for those being cyberbullied.
 First, why should a victim be required to
interrupt an online experience because of someone
else’s maliciousness? It is not appropriate to
blame the victim for another’s aggressive actions.
No one should have to turn off his or her
computer due to harassment received online, just
like no one should avoid going to school because
of school bullying.
 Cyberbullying can continue regardless of whether
the target is online. For example, a bully could
set up a defamatory Web page or spread rumors
via social networking sites. Unfortunately,
mistreatment still continues and the bully
perpetuates his assaults and cruelty, even when
the victim is offline.
 Ignore CyberBullies:
 Do not reply to his or her posts,
texts, etc. Along these same lines,
teens that experience cyberbullying
online are encouraged to keep a log
of journal of all their experiences.
Note specific incidents with as much
detail as possible, including who was
involved, where and when it
happened, how they responded, who
witnessed the incident, and what
was done to prevent its
reoccurrence. If the cyberbullying is
supplemented with bullying offline,
be sure to record all of these
activities as well.
3. Protect Yourself:
Block the cyberbully on social
networking sites, emails, electronic
devices, and so on. The less contact
you have with the cyberbully, the less
damage he or she can do
Change your emails, screen names, or
other usernames that the cyberbully is
contacting you via. Take care in giving
them out to family and friends whom
you know you can trust, so that you
will not need to worry about receiving
additional antagonizing messages from
those who are cyberbullying you.
Keep your social networking profiles on
private: make sure not to add anyone
you do not know or do not trust to
your profile
 . Educate Yourself About Cyberbullying
 It is important, and in some cases required, that schools educates their
students and staff on a regular basis regarding the nature, and
consequences of, and prohibitions and penalties associated with, all forms
of cyberbullying, and bullying, so that constant and updated awareness of
the problem is promoted. Education should occur through the attendance
of training workshops and seminars, as well as formalized continuing
education initiatives for all members of the school community. Educate
yourself on cyberbullying prevention strategies!
Cyber bullying

More Related Content

What's hot

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
CoachElrod
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying caitlynx48
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
HDCH
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Andreareyeshdz
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Marc Kuhn
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
pscl
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
br03wood
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigable
Khy Amigable
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
mcmullan
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
Apostolos Syropoulos
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power pointmb29thom
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*Amber Dee
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointHannahMorrell
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointshannonmf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
kgoldberg01
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
kscheidy
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
josiebrookeday
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Aayushi Singh
 
Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYING
Rene Ge
 

What's hot (20)

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigable
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power point
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYING
 

Viewers also liked

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Quirky Kid
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointtburdzy1
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parents
damarissepulveda
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingzackkay
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
ringw1sl
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
bl03cook
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
Mary Alice Osborne
 
Gracious Jesus 21 Do not Judge
Gracious Jesus 21 Do not JudgeGracious Jesus 21 Do not Judge
Gracious Jesus 21 Do not Judge
Dr. Bella Pillai
 
Zaštita-na-internetu
Zaštita-na-internetuZaštita-na-internetu
Zaštita-na-internetu
Mirjana Kokerić
 
Stage 6 fraction
Stage 6  fractionStage 6  fraction
Stage 6 fraction
Deklay Nainggolan
 
Aet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingAet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullying
cschoeneman
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullying
Melissa
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?
AJ Tivol
 
Cyber Bullying Presentation
Cyber Bullying PresentationCyber Bullying Presentation
Cyber Bullying Presentationamate1cl
 

Viewers also liked (19)

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parents
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
CyberBullying
CyberBullyingCyberBullying
CyberBullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Olmv cyberbullying
Olmv cyberbullyingOlmv cyberbullying
Olmv cyberbullying
 
Gracious Jesus 21 Do not Judge
Gracious Jesus 21 Do not JudgeGracious Jesus 21 Do not Judge
Gracious Jesus 21 Do not Judge
 
Zaštita-na-internetu
Zaštita-na-internetuZaštita-na-internetu
Zaštita-na-internetu
 
Elektronsko nasilje
Elektronsko nasiljeElektronsko nasilje
Elektronsko nasilje
 
Stage 6 fraction
Stage 6  fractionStage 6  fraction
Stage 6 fraction
 
Aet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingAet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullying
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullying
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?
 
Cyber Bullying Presentation
Cyber Bullying PresentationCyber Bullying Presentation
Cyber Bullying Presentation
 

Similar to Cyber bullying

Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
PantegoChristian
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
Mark Deming
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
Neville Maluleke
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
NaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
purush203
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
Arissa Ablao
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
DominicCaling
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Staci Trekles
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
Karen Brooks
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
SuphaphonP
 
Week7 assgn2suphaphonp
Week7 assgn2suphaphonpWeek7 assgn2suphaphonp
Week7 assgn2suphaphonp
JingboWang9
 
Week7assgn2KwanHoY
Week7assgn2KwanHoYWeek7assgn2KwanHoY
Week7assgn2KwanHoY
YipKwanHo
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
TeacherNicaPrintable
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentation
renumann
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
Sanil Shrivastava
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
R Smith
 
Parents must know about cyber bullying 2
Parents must know about cyber bullying  2Parents must know about cyber bullying  2
Parents must know about cyber bullying 2
Pratima Nayak ,Kendriya Vidyalaya Sangathan
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
DonikaLici
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
Rahuljain40418
 

Similar to Cyber bullying (20)

Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Week7 assgn2suphaphonp
Week7 assgn2suphaphonpWeek7 assgn2suphaphonp
Week7 assgn2suphaphonp
 
Week7assgn2KwanHoY
Week7assgn2KwanHoYWeek7assgn2KwanHoY
Week7assgn2KwanHoY
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentation
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Parents must know about cyber bullying 2
Parents must know about cyber bullying  2Parents must know about cyber bullying  2
Parents must know about cyber bullying 2
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 

More from Yumna Ali

Multiple sclerosis
Multiple sclerosisMultiple sclerosis
Multiple sclerosis
Yumna Ali
 
Reproductive Endocrinology
Reproductive EndocrinologyReproductive Endocrinology
Reproductive Endocrinology
Yumna Ali
 
The role of HDL cholesterol in preventing atherosclerotic disease
The role of HDL cholesterol in preventing atherosclerotic diseaseThe role of HDL cholesterol in preventing atherosclerotic disease
The role of HDL cholesterol in preventing atherosclerotic disease
Yumna Ali
 
Diet and physical activity application
Diet and physical activity applicationDiet and physical activity application
Diet and physical activity application
Yumna Ali
 
Targeting white, brown and perivascular adipose tissue in Atherosclerosis
Targeting white, brown and perivascular adipose tissue in AtherosclerosisTargeting white, brown and perivascular adipose tissue in Atherosclerosis
Targeting white, brown and perivascular adipose tissue in Atherosclerosis
Yumna Ali
 
Gait biomechanics
Gait biomechanicsGait biomechanics
Gait biomechanics
Yumna Ali
 

More from Yumna Ali (6)

Multiple sclerosis
Multiple sclerosisMultiple sclerosis
Multiple sclerosis
 
Reproductive Endocrinology
Reproductive EndocrinologyReproductive Endocrinology
Reproductive Endocrinology
 
The role of HDL cholesterol in preventing atherosclerotic disease
The role of HDL cholesterol in preventing atherosclerotic diseaseThe role of HDL cholesterol in preventing atherosclerotic disease
The role of HDL cholesterol in preventing atherosclerotic disease
 
Diet and physical activity application
Diet and physical activity applicationDiet and physical activity application
Diet and physical activity application
 
Targeting white, brown and perivascular adipose tissue in Atherosclerosis
Targeting white, brown and perivascular adipose tissue in AtherosclerosisTargeting white, brown and perivascular adipose tissue in Atherosclerosis
Targeting white, brown and perivascular adipose tissue in Atherosclerosis
 
Gait biomechanics
Gait biomechanicsGait biomechanics
Gait biomechanics
 

Recently uploaded

Your Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts HereYour Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts Here
SocioCosmos
 
Social Media Marketing Strategies .
Social Media Marketing Strategies                     .Social Media Marketing Strategies                     .
Social Media Marketing Strategies .
Virtual Real Design
 
Exploring Factors Affecting the Success of TVET-Industry Partnership: A Case ...
Exploring Factors Affecting the Success of TVET-Industry Partnership: A Case ...Exploring Factors Affecting the Success of TVET-Industry Partnership: A Case ...
Exploring Factors Affecting the Success of TVET-Industry Partnership: A Case ...
AJHSSR Journal
 
Social Media kdjhadhnjbdsjbdff fjkjasfkl
Social Media kdjhadhnjbdsjbdff fjkjasfklSocial Media kdjhadhnjbdsjbdff fjkjasfkl
Social Media kdjhadhnjbdsjbdff fjkjasfkl
mdigitalmarketing001
 
SluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final ProposalSluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final Proposal
grogshiregames
 
The Challenges of Good Governance and Project Implementation in Nigeria: A Re...
The Challenges of Good Governance and Project Implementation in Nigeria: A Re...The Challenges of Good Governance and Project Implementation in Nigeria: A Re...
The Challenges of Good Governance and Project Implementation in Nigeria: A Re...
AJHSSR Journal
 
How social media marketing helps businesses in 2024.pdf
How social media marketing helps businesses in 2024.pdfHow social media marketing helps businesses in 2024.pdf
How social media marketing helps businesses in 2024.pdf
pramodkumar2310
 
7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy
Digital Marketing Lab
 
SluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor ProposalSluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor Proposal
grogshiregames
 
Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..
SocioCosmos
 
Get Ahead with YouTube Growth Services....
Get Ahead with YouTube Growth Services....Get Ahead with YouTube Growth Services....
Get Ahead with YouTube Growth Services....
SocioCosmos
 
Multilingual SEO Services | Multilingual Keyword Research | Filose
Multilingual SEO Services |  Multilingual Keyword Research | FiloseMultilingual SEO Services |  Multilingual Keyword Research | Filose
Multilingual SEO Services | Multilingual Keyword Research | Filose
madisonsmith478075
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLOLORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO
lorraineandreiamcidl
 
Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........
SocioCosmos
 
Non-Financial Information and Firm Risk Non-Financial Information and Firm Risk
Non-Financial Information and Firm Risk Non-Financial Information and Firm RiskNon-Financial Information and Firm Risk Non-Financial Information and Firm Risk
Non-Financial Information and Firm Risk Non-Financial Information and Firm Risk
AJHSSR Journal
 
“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...
AJHSSR Journal
 

Recently uploaded (16)

Your Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts HereYour Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts Here
 
Social Media Marketing Strategies .
Social Media Marketing Strategies                     .Social Media Marketing Strategies                     .
Social Media Marketing Strategies .
 
Exploring Factors Affecting the Success of TVET-Industry Partnership: A Case ...
Exploring Factors Affecting the Success of TVET-Industry Partnership: A Case ...Exploring Factors Affecting the Success of TVET-Industry Partnership: A Case ...
Exploring Factors Affecting the Success of TVET-Industry Partnership: A Case ...
 
Social Media kdjhadhnjbdsjbdff fjkjasfkl
Social Media kdjhadhnjbdsjbdff fjkjasfklSocial Media kdjhadhnjbdsjbdff fjkjasfkl
Social Media kdjhadhnjbdsjbdff fjkjasfkl
 
SluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final ProposalSluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final Proposal
 
The Challenges of Good Governance and Project Implementation in Nigeria: A Re...
The Challenges of Good Governance and Project Implementation in Nigeria: A Re...The Challenges of Good Governance and Project Implementation in Nigeria: A Re...
The Challenges of Good Governance and Project Implementation in Nigeria: A Re...
 
How social media marketing helps businesses in 2024.pdf
How social media marketing helps businesses in 2024.pdfHow social media marketing helps businesses in 2024.pdf
How social media marketing helps businesses in 2024.pdf
 
7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy
 
SluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor ProposalSluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor Proposal
 
Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..
 
Get Ahead with YouTube Growth Services....
Get Ahead with YouTube Growth Services....Get Ahead with YouTube Growth Services....
Get Ahead with YouTube Growth Services....
 
Multilingual SEO Services | Multilingual Keyword Research | Filose
Multilingual SEO Services |  Multilingual Keyword Research | FiloseMultilingual SEO Services |  Multilingual Keyword Research | Filose
Multilingual SEO Services | Multilingual Keyword Research | Filose
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLOLORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO
 
Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........
 
Non-Financial Information and Firm Risk Non-Financial Information and Firm Risk
Non-Financial Information and Firm Risk Non-Financial Information and Firm RiskNon-Financial Information and Firm Risk Non-Financial Information and Firm Risk
Non-Financial Information and Firm Risk Non-Financial Information and Firm Risk
 
“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...
 

Cyber bullying

  • 2.  Bullying is used to humiliate, threaten, oppress, torment, and tyrannize someone. It can be defined as a continuous misuse of power or authority against a person or a group of people that causes physical, emotional, and social harm to that person or group. If this kind of attitude and behavior happens online, it is called cyberbullying.
  • 3.  With over 100 million users of smart phones in Pakistan, Pakistan has been included in the list of the fastest growing countries that are using internet which only open the doors for the fact that cyber bullying is increasing as well, yet there isn’t any legislation for cyber crimes in Pakistan.
  • 4.  Harassment: Repeatedly sending offensive, rude, and insulting messages  Denigration: Distributing information about another that is derogatory and untrue through posting it on a Web page, sending it to others through email or instant messaging, or posting or sending digitally altered photos of someone  Flaming: Online "fighting" using electronic messages with angry, vulgar language  Impersonation: Breaking into an email or social networking account and using that person's online identity to send or post vicious or embarrassing material to/about others.  Outing and Trickery: Sharing someone's secrets or embarrassing information, or tricking someone into revealing secrets or embarrassing information and forwarding it to others  Cyber Stalking: Repeatedly sending messages that include threats of harm or are highly intimidating, or engaging in other online activities that make a person afraid for his or her safety (depending on the content of the message, it may be illegal) Common Forms of Cyber Bullying
  • 5.  In Pakistan it seems that women are the easiest targets to be bullied online, because the National Response Center for Cyber Crimes (NR3C) does not have any legislation for cyber crimes such as hacking and online stalking, there were several incidents that faced women regarding these issues.
  • 6.
  • 7.  Whoever with malicious intent gains unauthorized access to any information system or data shall be punished with imprisonment for a term which may extend to six months or with fine which may extend to one hundred thousand rupees or with both • Cyber terrorism: (a) the use or threat is designed to coerce, intimidate, overawe or create a sense of fear, panic or insecurity in the Government or the public or a section of the public or community or sect or create a sense of fear or insecurity in society; or • (b) the use or threat is made for the purpose or motive of advancing a religious, ethnic or sectarian cause; shall be punished with imprisonment of either description for a term which may extend to fourteen years or with fine which may extend to fifty million rupees or with both.
  • 8.  You Can be Randomly Picked Up by LEAs LEAs Can Come and Confiscate Your Laptop/Mobile or anything They Want Your Website Can Get Blocked, if Someone Thinks its immoral Spamming Can Cause You a Fine of Rs. 1 Million Publishing a Meme on Facebook can Fine you With Rs. 1 Million
  • 9.  How to prevent cyberbullying:  Teenagers should take the effort to educate themselves on proper “Internet etiquette.” This includes the proper use of emails, texts and other forms of electronic messaging. Many negative posts or messages sent online may simply have been sent accidentally or misinterpreted, leaving either the sender, the receiver, or both embarrassed, humiliated, hurt, or harassed.  1. Use Computer Courtesy:  Whether sending an email, chatting in a chat room, or speaking in a forum, it is important to be courteous and respectful of others onlineone should treat others the way he or she would like to be treated. Likewise, just as you treat others with respect in the real world, it is important that you apply these same basic rules online as well.
  • 10.  4. Keep Personal Information Private:  Posting private and personal information in the wrong locations can have serious consequences. Identity theft is a rapidly growing concern and divulging too much information could give predators and those with bad intentions valuable information about yourself. When you post your personal information on sites such as Facebook, Twitter, and other social networking sites, it is best to restrict your privacy settings so that only your friends can view personal information. If private information is posted in a group setting, read the guidelines prior to posting to ensure that such information will not be disclosed to others.  2. Think Before Posting:  . Remember that once entered into the Internet, online messages, posts, pictures, or videos, will remain there forever, and can be viewed by a massive, unknown online audience. With cyberbullying, one cannot just turn off the computer and expect everything to return back to normal. Even if the victim disconnects himself from the Internet or other electronic devices, cyberbullying can weave itself back into the victim’s school, workplace, or home environment.
  • 11.  Password Safety  1. Never, ever give your password on Facebook, MySpace, Aim, network, email, or any similar service or cell phone unlock code to a friend. Friendships sometimes don’t last, and that password or PIN can be used against you.  2. Remember your secret answer. When you create an online account, and it asks you to provide an accurate answer to a question you should know ‐ don’t treat it lightly or as a joke. Make sure it’s something you will remember months and years from now in case you have a problem at that time.  3. Do not use passwords based on personal information (your login name, birthdate, address, phone number, middle name, pet’s name, etc.).  4. Use a mixture of upper and lowercase letters, numbers, and nonalphabetic characters (symbols) if possible.
  • 12.  . Help New Internet Users:  Everyone was an Internet “newbie” at one time. Many children and teen users that gain access to social networking sites, electronic devices, or the Internet for the first time are unaware about how dangerous these devices can be if abused or used inappropriately. Although it is normal to be excited about connecting with all of your friends and classmates online, please be mindful of the fact that there are others on the Internet that abuse their privileges.  You’ve been told “don’t talk to strangers.” Well, people you meet on the Internet are strangers. Other than friends you know in “real life,” people online are not classified as friends.  Never agree to meet an online friend in person. If someone asks to meet you, talk to your parents about it.  Do not lie about your age so you can go somewhere on the Internet that is for adults only.  Do not spend excessive time on the computer. You should partake in other activities, exercise, and set aside time for leisure.  Something you see on the Internet might make you uncomfortable or confused. Tell your teacher or parent right away.
  • 13.  Be Aware of What Your Kids are Doing Online  Talk with your kids about cyberbullying and other online issues regularly.  Know the sites your kids visit and their online activities. Ask where they’re going, what they’re doing, and who they’re doing it with.  Tell your kids that as a responsible parent you may review their online communications if you think there is reason for concern. Installing parental control filtering software or monitoring programs are one option for monitoring your child’s online behavior, but do not rely solely on these tools.  Have a sense of what they do online and in texts. Learn about the sites they like. Try out the devices they use.  Ask for their passwords, but tell them you’ll only use them in case of emergency.  Ask to “friend” or “follow” your kids on social media sites or ask another trusted adult to do so.  Encourage your kids to tell you immediately if they, or someone they know, is being cyberbullied. Explain that you will not take away their computers or cell phones if they confide in you about a problem they are having.
  • 14.  8. Be An Active Bystander:  Bystanders play a key role in stopping and preventing cyberbullying. Cyberbullies depend on bystanders to support them or do nothing to stop them. The real leaders are those who choose to take an active role when they witness bullying and decide not go along with the crowd.  If you witness cyberbullying, do not join in, nor stand by idly.  Document if you see cyberbullying online, and when  Don’t encourage the behavior, it is easy to fall under the peer pressure, but stand up for yourself!  Don’t forward hurtful messages  Don’t laugh at inappropriate jokes  Tell an adult they trust  Do not support cyberbullies, stand up for what is right and report cyberbullying cases to reliable sources – “report center”.  Educate yourself on effective preventative measures you can take
  • 15.  What to do if you are a cyberbullying victim:  . You CANNOT Just Turn Off the Computer:  Those who do not completely understand the phenomenon often wonder, “What’s the big deal? Why don’t kids just turn off their computers?” However, those who make this statement do not realize that the process is not so simple. There are a number of reasons why “clicking the exit button” or “turning off the computer” simply aren’t viable options for those being cyberbullied.  First, why should a victim be required to interrupt an online experience because of someone else’s maliciousness? It is not appropriate to blame the victim for another’s aggressive actions. No one should have to turn off his or her computer due to harassment received online, just like no one should avoid going to school because of school bullying.  Cyberbullying can continue regardless of whether the target is online. For example, a bully could set up a defamatory Web page or spread rumors via social networking sites. Unfortunately, mistreatment still continues and the bully perpetuates his assaults and cruelty, even when the victim is offline.
  • 16.  Ignore CyberBullies:  Do not reply to his or her posts, texts, etc. Along these same lines, teens that experience cyberbullying online are encouraged to keep a log of journal of all their experiences. Note specific incidents with as much detail as possible, including who was involved, where and when it happened, how they responded, who witnessed the incident, and what was done to prevent its reoccurrence. If the cyberbullying is supplemented with bullying offline, be sure to record all of these activities as well. 3. Protect Yourself: Block the cyberbully on social networking sites, emails, electronic devices, and so on. The less contact you have with the cyberbully, the less damage he or she can do Change your emails, screen names, or other usernames that the cyberbully is contacting you via. Take care in giving them out to family and friends whom you know you can trust, so that you will not need to worry about receiving additional antagonizing messages from those who are cyberbullying you. Keep your social networking profiles on private: make sure not to add anyone you do not know or do not trust to your profile
  • 17.  . Educate Yourself About Cyberbullying  It is important, and in some cases required, that schools educates their students and staff on a regular basis regarding the nature, and consequences of, and prohibitions and penalties associated with, all forms of cyberbullying, and bullying, so that constant and updated awareness of the problem is promoted. Education should occur through the attendance of training workshops and seminars, as well as formalized continuing education initiatives for all members of the school community. Educate yourself on cyberbullying prevention strategies!

Editor's Notes

  1. Cyber bullying can take many forms. However, there are six forms that are the most common.*
  2. Unauthorized access to critical infrastructure information system or data: Whoever with malicious intent gains unauthorized access to any critical infrastructure information system or data shall be punished with imprisonment upto three years or with fine which may extend to one million rupees or with both. If you are wondering what this “Critical Infrastructure” is, then here’s how it is defined in the bill: “critical infrastructure” includes the infrastructures so designated by any Government in Pakistan and such other assets, systems and networks, whether physical or virtual, so vital to the State or its organs including judicature that their incapacitation or destruction may have a debilitating effect on national security, economy, public health,safety or matters related thereto;
  3. Section 5: Unauthorized access to critical infrastructure information system or data: Whoever with malicious intent gains unauthorized access to any critical infrastructure information system or data shall be punished with imprisonment upto three years or with fine which may extend to one million rupees or with both. https://propakistani.pk/2015/04/17/see-what-cyber-crime-law-can-do-to-you-a-must-read-for-all-internet-users-in-pakistan Expedited Preservation of data. (1) If an investigating officer is satisfied that (a) data stored in any information system or by means of an information system, is reasonably required for the purposes of a criminal investigation; and (b) there is a risk or vulnerability that the data may be modified, lost, destroyed or rendered inaccessible, the investigating officer may, by written notice given to a person in control of the information system, require the person to ensure that the data specified in the notice be preserved and the integrity thereof is maintained for a period not exceeding ninety days as specified in the notice. Here are reason that PTA can give to block a website if its content is: Against Islam or its integrity, Against security or defence of Pakistan Against friendly relations with foreign states Against a public order If content is indecent or immoral Or if it incites an offenc (2) The period provided in sub-section (1) for preservation of data may be extended by the Magistrate if so deemed necessary upon receipt of an application from the investigating officer in this behalf. Section 7: Criminal Interference with critical infrastructure information system or data: Whoever with malicious intent and without authorization interferes with or damages, or causes to be inferred with or damaged, any critical information system or any part thereof, or critical infrastructure data or any part thereof, shall be punished with imprisonment which may extend to seven years or with fine which may extend to five million rupees or with both 1) No person whether a police officer, investigation officer or otherwise, other than an investigating officer of the special investigation agency shall investigate an offence under this Act: Provided that the Federal Government or the Provincial Government may, as the case may be, constitute joint investigation team comprising of the officers of special investigation agency and any other law enforcement agency including Police for investigation of events involving commission of offences under this Act and any other law for the time being in force. (2) No person other than a prosecutor designated as such by the special investigating agency shall prosecute any offence under this Act.
  4. . In any circumstance, no matter how simple, Internet users can observe the Golden rule: It is important to note that what is posted online today may come back and haunt the writer tomorrow or later in the future. That silly or funny photograph posted on a social networking site may preclude job acquisition for that person years later. Many colleges and employers are now searching social networking sites prior to hiring
  5. Never give out personal information about yourself, your family or your friends, no matter how well you think you know your cyberpals. This includes names, addresses, telephone numbers, school locations and names, and not even which city you live in. Be careful who you send pictures to, as well as monitor and ensure your password safety.
  6. 5. Change your password often. It takes time and is a bit of a chore, but do it anyway. It takes more time and is more of a chore to try to recover from a hacked account or from identity theft. 6. Never provide your password over email or in response to an email request. 7. Make your own acronym by creating a phrase that means something to you, and group together the first letter of each word. Use numbers and symbols when you can. Make sure the acronym you create has at least seven characters. For example: • “Last week I fell down thirty stairs” (Lw1fd30$) • “It’s 3 AM, I must be lonely” (I3amimbL) • “My boyfriend got me a dog for Christmas” (mBFgm@d4C) • Use short words separated by characters (d0g%d00r, c@ndystr1p). 8. Do not place a written copy of your password on the side of your monitor, under your keyboard, under your mouse pad, etc. Figure out a secure place where you can store the passwords you write down – or, if possible – never write down any passwords; it is best to commit them to memory.
  7. Do not do anything on the Internet that may cost money without your parent’s permission. Never give out credit card information. If you are upset or angry about something, do not use the Internet to vent your feelings. Go to a friend, a relative, or teacher you are comfortable talking to instead. Passwords must be kept secret from everyone but your parents.
  8. Many teens who are cyberbullied online are often overwhelmed by the emotional pain due to either the continuity, or intensity of the harassment. Therefore, responding to the cyberbully’s attacks in a productive manner often seems extraordinarily difficult. The anticipatory anxiety often prevents a teenager from reporting the bully. Since the distress seems unbearable, the victim cannot muster up the strength to confide in a trusted adult. Of course, there is always a fear that a victim may be labeled a “tattletale” or a “snitch.” However, if the victim attempts to cope with the bullying without external assistance, the intensity and frequency of the bullying online may increases, which usually exacerbates the pre-existing situation. Victimized adolescents first must realize that they are not to blame for the way they have been treated. NO ONE deserves to be harassed in any environment, whether it is on the Internet or in the real world. Effective strategies can be implemented to help fend off cyberbullies. 1
  9. An effective and simple response is to not respond, interact, or engage with cyberbullies. However, this is not as easy as it sounds. It’s natural to elicit a defensive response and attempt to deal some “well-deserved” payback on the cyberbully. Many cyberbullies simply crave attention; it does not matter what type of attention they receive, whether it be positive or negative, as long as they can provoke someone into paying them the attention they desire. It is similar to a 2-year-old child throwing a temper tantrum to get attention from a parent: once the child’s needs are catered to, he or she will continue to act in the same manner in the future. . Do not leave the bully un-blocked just so that you can get another response later or to inflict some source of payback on the cyberbully. This is only inviting the cyberbully to continue, and you do not have to stoop down to their level! Block the individual from having communications with you as best as you can. It is imperative that cyberbullying victims take swift action if the cyberbullying incidents continue or escalate in gravity. Teenagers must learn to exercise due diligence in reducing their vulnerability to online aggression.