SlideShare a Scribd company logo
Cyber bullying Yong Chen
Facts 1. Instant Messaging/Text Messaging Harassment [Learn More...]  2. Stealing Passwords [Learn More...] 3. Blogs [Learn More...] 4. Web Sites [Learn More...] 5. Sending Pictures through E-mail and Cell Phones [Learn More...] 6. Internet Polling [Learn More...] 7. Interactive Gaming [Learn More...] 8. Sending Malicious Code [Learn More...] 9. Sending Porn and Other Junk E-Mail and IMs [Learn More...] 10. Impersonation [Learn More...]
Facts Around half of teens have been the victims of cyber bullying  Only 1 in 10 teens tells a parent if they have been a cyber bully victim  Fewer than 1 in 5 cyber bullying incidents are reported to law enforcement  1 in 10 adolescents or teens have had embarrassing or damaging pictures taken of themselves without their permission, often using cell phone cameras  About 1 in 5 teens have posted or sent sexually suggestive or nude pictures of themselves to others  Girls are somewhat more likely than boys to be involved in cyber bullying
Facts While some of the traits of cyber bullies are similar to more traditional bullies, it is important to note that there are some differences. Some cyber bullies are victims of real word bullying, and go online and bully others to feel powerful. Others are bullies offline, and want to extend their sphere of influence and power to the online world. Other cyber bullies just want to show that they can do certain things online to show off. It is important to look for signs that your child is being bullied or is a cyber bully. In both cases, it is important to stop the problem by looking for causes of the bullying behavior. The motives for cyber bullying are rather wide ranging, so it is important to find out the reasons behind the behavior so that a solution can be found. Additionally, it may be necessary to help children and teenagers involved by getting them counseling and helping them understand how to overcome the problem.

More Related Content

What's hot

Onine dating
Onine datingOnine dating
Onine dating
Tahlia Nicholson
 
Cyber Contacts for pupils
Cyber Contacts for pupilsCyber Contacts for pupils
Cyber Contacts for pupils
MaimoonahKhan
 
Online dating presentation
Online dating presentationOnline dating presentation
Online dating presentation
Vijay Thapa
 
Dating and relationships
Dating and relationshipsDating and relationships
Dating and relationships
Chris Haller
 
Love on the web presentation
Love on the web presentationLove on the web presentation
Love on the web presentation
Valirie Morgan
 
Public service announcement
Public service announcementPublic service announcement
Public service announcement
keegan333
 
Cyber Bullying Questionnaire Results
Cyber Bullying Questionnaire ResultsCyber Bullying Questionnaire Results
Cyber Bullying Questionnaire Results
a2columnd12
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
Michael Heron
 
Powerpoint
PowerpointPowerpoint
Powerpoint
ctbagnieski
 
Powerpoint
PowerpointPowerpoint
Powerpoint
ctbagnieski
 
Mini assignment #4
Mini assignment #4Mini assignment #4
Mini assignment #4
lduval06
 
Powerpoint
PowerpointPowerpoint
Powerpoint
ctbagnieski
 
Linked in
Linked inLinked in
Linked in
JyRone
 
Cyber
CyberCyber
Cyber
morlik
 
How to Be Safe on Social Media
How to Be Safe on Social MediaHow to Be Safe on Social Media
How to Be Safe on Social Media
Latia Ward
 
Cyberbully
CyberbullyCyberbully
Cyberbully
Debra Murphy
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
Amber Dee
 
Cherokee int safety
Cherokee int safetyCherokee int safety
Cherokee int safety
Brenda Sargent
 
Dating
Dating Dating
Dating
AjaySoni97
 
Etech monterey panganiban
Etech monterey panganibanEtech monterey panganiban
Etech monterey panganiban
SherylPanganiban2
 

What's hot (20)

Onine dating
Onine datingOnine dating
Onine dating
 
Cyber Contacts for pupils
Cyber Contacts for pupilsCyber Contacts for pupils
Cyber Contacts for pupils
 
Online dating presentation
Online dating presentationOnline dating presentation
Online dating presentation
 
Dating and relationships
Dating and relationshipsDating and relationships
Dating and relationships
 
Love on the web presentation
Love on the web presentationLove on the web presentation
Love on the web presentation
 
Public service announcement
Public service announcementPublic service announcement
Public service announcement
 
Cyber Bullying Questionnaire Results
Cyber Bullying Questionnaire ResultsCyber Bullying Questionnaire Results
Cyber Bullying Questionnaire Results
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Mini assignment #4
Mini assignment #4Mini assignment #4
Mini assignment #4
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Linked in
Linked inLinked in
Linked in
 
Cyber
CyberCyber
Cyber
 
How to Be Safe on Social Media
How to Be Safe on Social MediaHow to Be Safe on Social Media
How to Be Safe on Social Media
 
Cyberbully
CyberbullyCyberbully
Cyberbully
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Cherokee int safety
Cherokee int safetyCherokee int safety
Cherokee int safety
 
Dating
Dating Dating
Dating
 
Etech monterey panganiban
Etech monterey panganibanEtech monterey panganiban
Etech monterey panganiban
 

Viewers also liked

Hur är språket uppbyggt?
Hur är språket uppbyggt?Hur är språket uppbyggt?
Hur är språket uppbyggt?sofia_c
 
Social media Presentatie VRK solutions
Social media Presentatie VRK solutionsSocial media Presentatie VRK solutions
Social media Presentatie VRK solutions
Martijn van Ramselaar
 
Social media bij VRK solutions
Social media bij VRK solutionsSocial media bij VRK solutions
Social media bij VRK solutions
Martijn van Ramselaar
 
Children’s rights
Children’s rightsChildren’s rights
Children’s rights
Carlos Javier Di Salvo
 
Namnhistoria
NamnhistoriaNamnhistoria
Namnhistoriasofia_c
 
Samtidslitteraturen
SamtidslitteraturenSamtidslitteraturen
Samtidslitteraturensofia_c
 
Språk och samhälle
Språk och samhälleSpråk och samhälle
Språk och samhällesofia_c
 
Cyber Bullying (ET)
Cyber Bullying (ET)Cyber Bullying (ET)
Cyber Bullying (ET)
cdlundberg
 
Uppbyggt
UppbyggtUppbyggt
Uppbyggtsofia_c
 
Children’s rights
Children’s rightsChildren’s rights
Children’s rights
Carlos Javier Di Salvo
 
LoadCentral SubDealer v20140306
LoadCentral SubDealer v20140306LoadCentral SubDealer v20140306
LoadCentral SubDealer v20140306Asenso Filipino™
 
LoadCentral Subdealer v20140412
LoadCentral Subdealer v20140412LoadCentral Subdealer v20140412
LoadCentral Subdealer v20140412
Asenso Filipino™
 
Jesica
JesicaJesica
Fran y pato - Monstruo 5B
Fran y pato - Monstruo 5BFran y pato - Monstruo 5B
Fran y pato - Monstruo 5B
Carlos Javier Di Salvo
 
LoadCentral Retailer v20140306
LoadCentral Retailer v20140306LoadCentral Retailer v20140306
LoadCentral Retailer v20140306
Asenso Filipino™
 
Load central retailer v20140526
Load central retailer v20140526Load central retailer v20140526
Load central retailer v20140526
Asenso Filipino™
 
How to use of moodle
How to use of moodleHow to use of moodle
How to use of moodle
hayate19996
 
Skrivprocessen
SkrivprocessenSkrivprocessen
Skrivprocessensofia_c
 

Viewers also liked (20)

Hur är språket uppbyggt?
Hur är språket uppbyggt?Hur är språket uppbyggt?
Hur är språket uppbyggt?
 
Social media Presentatie VRK solutions
Social media Presentatie VRK solutionsSocial media Presentatie VRK solutions
Social media Presentatie VRK solutions
 
Social media bij VRK solutions
Social media bij VRK solutionsSocial media bij VRK solutions
Social media bij VRK solutions
 
Children’s rights
Children’s rightsChildren’s rights
Children’s rights
 
Namnhistoria
NamnhistoriaNamnhistoria
Namnhistoria
 
Samtidslitteraturen
SamtidslitteraturenSamtidslitteraturen
Samtidslitteraturen
 
Språk och samhälle
Språk och samhälleSpråk och samhälle
Språk och samhälle
 
Cyber Bullying (ET)
Cyber Bullying (ET)Cyber Bullying (ET)
Cyber Bullying (ET)
 
Uppbyggt
UppbyggtUppbyggt
Uppbyggt
 
Children’s rights
Children’s rightsChildren’s rights
Children’s rights
 
LoadCentral SubDealer v20140306
LoadCentral SubDealer v20140306LoadCentral SubDealer v20140306
LoadCentral SubDealer v20140306
 
LoadCentral Subdealer v20140412
LoadCentral Subdealer v20140412LoadCentral Subdealer v20140412
LoadCentral Subdealer v20140412
 
Jesica
JesicaJesica
Jesica
 
Social media bij VRK solutions
Social media bij VRK solutionsSocial media bij VRK solutions
Social media bij VRK solutions
 
Fran y pato - Monstruo 5B
Fran y pato - Monstruo 5BFran y pato - Monstruo 5B
Fran y pato - Monstruo 5B
 
LoadCentral Retailer v20140306
LoadCentral Retailer v20140306LoadCentral Retailer v20140306
LoadCentral Retailer v20140306
 
Social media vrk solutions
Social media vrk solutionsSocial media vrk solutions
Social media vrk solutions
 
Load central retailer v20140526
Load central retailer v20140526Load central retailer v20140526
Load central retailer v20140526
 
How to use of moodle
How to use of moodleHow to use of moodle
How to use of moodle
 
Skrivprocessen
SkrivprocessenSkrivprocessen
Skrivprocessen
 

Similar to Cyber bullying

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Kim Wesson
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
miliarguelles1
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
miliarguelles
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
sofisalazar00
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying este
giulimazziotti96
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
miliarguelles1
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
FrenzyPurisima
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
Neville Maluleke
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
21rahul1999
 
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Kim Wesson
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
HomeGuides
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican Guard
Apostolos Syropoulos
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
Ziar Khan
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
pardolopez
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2
bigmike18
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
katnaylan
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
DonikaLici
 
Ciberbullying
CiberbullyingCiberbullying
Ciberbullying
Paola Saravia
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
derekdreak
 
Preventing Cyberbullying
Preventing CyberbullyingPreventing Cyberbullying
Preventing Cyberbullying
Ability Skills Knowledge Fraternity
 

Similar to Cyber bullying (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying este
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
 
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican Guard
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Ciberbullying
CiberbullyingCiberbullying
Ciberbullying
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
 
Preventing Cyberbullying
Preventing CyberbullyingPreventing Cyberbullying
Preventing Cyberbullying
 

Recently uploaded

Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 

Recently uploaded (20)

Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 

Cyber bullying

  • 2.
  • 3.
  • 4. Facts 1. Instant Messaging/Text Messaging Harassment [Learn More...] 2. Stealing Passwords [Learn More...] 3. Blogs [Learn More...] 4. Web Sites [Learn More...] 5. Sending Pictures through E-mail and Cell Phones [Learn More...] 6. Internet Polling [Learn More...] 7. Interactive Gaming [Learn More...] 8. Sending Malicious Code [Learn More...] 9. Sending Porn and Other Junk E-Mail and IMs [Learn More...] 10. Impersonation [Learn More...]
  • 5. Facts Around half of teens have been the victims of cyber bullying Only 1 in 10 teens tells a parent if they have been a cyber bully victim Fewer than 1 in 5 cyber bullying incidents are reported to law enforcement 1 in 10 adolescents or teens have had embarrassing or damaging pictures taken of themselves without their permission, often using cell phone cameras About 1 in 5 teens have posted or sent sexually suggestive or nude pictures of themselves to others Girls are somewhat more likely than boys to be involved in cyber bullying
  • 6. Facts While some of the traits of cyber bullies are similar to more traditional bullies, it is important to note that there are some differences. Some cyber bullies are victims of real word bullying, and go online and bully others to feel powerful. Others are bullies offline, and want to extend their sphere of influence and power to the online world. Other cyber bullies just want to show that they can do certain things online to show off. It is important to look for signs that your child is being bullied or is a cyber bully. In both cases, it is important to stop the problem by looking for causes of the bullying behavior. The motives for cyber bullying are rather wide ranging, so it is important to find out the reasons behind the behavior so that a solution can be found. Additionally, it may be necessary to help children and teenagers involved by getting them counseling and helping them understand how to overcome the problem.