SlideShare a Scribd company logo
1 of 12
Cyber-bullying  ydhsu Created by: Meg Griffis Tu/Thur Class 9:30 am
Definition Cyber-bullying – when one child/teen targets another child/teen using various forms of technology. Ex. Phones, internet, text messaging… samanthacelera
Importance Cyber-bullying can have a huge impact on a child’s life. Constantly being targeted, demeaned, and made fun of can lead to severe emotional trauma.
Facts  ,[object Object]
Children can no longer find sanctuary in their usual comfort zones – text messages and emails can be reached anywhere with phone service.
Modern day technology allows children to bully others 24 hours a day, 7 days a week,[object Object]
With new technology and easy access to the internet, it is easier for students to create websites about and target a student.
Cyber-bullying is about power and control. Because a cyber-bully does not directly see their victim’s reaction, they feel more powerful over their emotions. ,[object Object]
Internet Polling –Kids create an online poll or survey about another student, asking kids about how “ugly” or “fat” they are.
Impersonation –Students can create separate IM accounts whose screen names are very similar to one person’s. That child will then continue to send out hurtful messages to the people of the targeted victim, causing damage throughout their friends lists. ,[object Object]
The story of Megan Meier Guillermo Esteves November 6, 1992 – October 17, 2006
Addressing Cyber-Bullying ,[object Object]

More Related Content

What's hot

Ciberbullying alfio el mas raro
Ciberbullying alfio el mas raroCiberbullying alfio el mas raro
Ciberbullying alfio el mas raroAlfio Alfieri
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingStemGrade
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingQazi Anwar
 
Cyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItCyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItFeliciaDixon5
 
Cyberbullying: A Technology Issue Affecting Adolescents and What Needs to Be...
Cyberbullying:  A Technology Issue Affecting Adolescents and What Needs to Be...Cyberbullying:  A Technology Issue Affecting Adolescents and What Needs to Be...
Cyberbullying: A Technology Issue Affecting Adolescents and What Needs to Be...samhauck
 
Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2larsselect
 
Technology Presentation
Technology PresentationTechnology Presentation
Technology PresentationTatiDenai
 
Sarah doty cyber bullying
Sarah doty cyber bullyingSarah doty cyber bullying
Sarah doty cyber bullyingSarah Doty
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingsamhauck
 
Vickyy delfi ingles, cyberbullying
Vickyy delfi ingles, cyberbullyingVickyy delfi ingles, cyberbullying
Vickyy delfi ingles, cyberbullyingvictoriapp
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingringw1sl
 
21st Century Bullying Crueler Than Ever
21st Century Bullying   Crueler Than Ever21st Century Bullying   Crueler Than Ever
21st Century Bullying Crueler Than Evermbernstein
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullyingZiar Khan
 

What's hot (17)

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Ciberbullying alfio el mas raro
Ciberbullying alfio el mas raroCiberbullying alfio el mas raro
Ciberbullying alfio el mas raro
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItCyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent It
 
Cyberbullying: A Technology Issue Affecting Adolescents and What Needs to Be...
Cyberbullying:  A Technology Issue Affecting Adolescents and What Needs to Be...Cyberbullying:  A Technology Issue Affecting Adolescents and What Needs to Be...
Cyberbullying: A Technology Issue Affecting Adolescents and What Needs to Be...
 
Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2
 
Technology Presentation
Technology PresentationTechnology Presentation
Technology Presentation
 
Sarah doty cyber bullying
Sarah doty cyber bullyingSarah doty cyber bullying
Sarah doty cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Vickyy delfi ingles, cyberbullying
Vickyy delfi ingles, cyberbullyingVickyy delfi ingles, cyberbullying
Vickyy delfi ingles, cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
21st Century Bullying Crueler Than Ever
21st Century Bullying   Crueler Than Ever21st Century Bullying   Crueler Than Ever
21st Century Bullying Crueler Than Ever
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 

Viewers also liked

Selectividad 2010
Selectividad 2010Selectividad 2010
Selectividad 2010irodpur449
 
Funding For Foreign Language Courses
Funding For Foreign Language CoursesFunding For Foreign Language Courses
Funding For Foreign Language CoursesLexxRenee
 
2010 - Wat is SPOCS?
2010 - Wat is SPOCS?2010 - Wat is SPOCS?
2010 - Wat is SPOCS?evkas
 
2008- Federation And Dp Law V0.02
2008- Federation And Dp Law V0.022008- Federation And Dp Law V0.02
2008- Federation And Dp Law V0.02evkas
 

Viewers also liked (9)

Language Drill
Language DrillLanguage Drill
Language Drill
 
Nomina gener 2011
Nomina gener 2011Nomina gener 2011
Nomina gener 2011
 
Sight Words
Sight WordsSight Words
Sight Words
 
Selectividad 2010
Selectividad 2010Selectividad 2010
Selectividad 2010
 
Math Drill2
Math Drill2Math Drill2
Math Drill2
 
Funding For Foreign Language Courses
Funding For Foreign Language CoursesFunding For Foreign Language Courses
Funding For Foreign Language Courses
 
2010 - Wat is SPOCS?
2010 - Wat is SPOCS?2010 - Wat is SPOCS?
2010 - Wat is SPOCS?
 
Feliz cumpleaños
Feliz cumpleañosFeliz cumpleaños
Feliz cumpleaños
 
2008- Federation And Dp Law V0.02
2008- Federation And Dp Law V0.022008- Federation And Dp Law V0.02
2008- Federation And Dp Law V0.02
 

Similar to Cyber Bullying PwrPnt

Similar to Cyber Bullying PwrPnt (20)

Essays On Cyber Bullying
Essays On Cyber BullyingEssays On Cyber Bullying
Essays On Cyber Bullying
 
Nico santi y tomy
Nico santi y tomyNico santi y tomy
Nico santi y tomy
 
Nico santi y tomy
Nico santi y tomyNico santi y tomy
Nico santi y tomy
 
Cyberbulling - TIC
Cyberbulling - TICCyberbulling - TIC
Cyberbulling - TIC
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Cyberbullying: Advice for Schools
Cyberbullying: Advice for SchoolsCyberbullying: Advice for Schools
Cyberbullying: Advice for Schools
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxIs Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying
 
Genderissues-RakhiS.pptx
Genderissues-RakhiS.pptxGenderissues-RakhiS.pptx
Genderissues-RakhiS.pptx
 
Ciberbullying alfio el mas raro
Ciberbullying alfio el mas raroCiberbullying alfio el mas raro
Ciberbullying alfio el mas raro
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptx
 
cyber bulling
 cyber bulling cyber bulling
cyber bulling
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Bullying in schools pp 2011
Bullying in schools pp 2011Bullying in schools pp 2011
Bullying in schools pp 2011
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying
 
Olmv cyberbullying
Olmv cyberbullyingOlmv cyberbullying
Olmv cyberbullying
 

Recently uploaded

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 

Recently uploaded (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 

Cyber Bullying PwrPnt

  • 1. Cyber-bullying ydhsu Created by: Meg Griffis Tu/Thur Class 9:30 am
  • 2. Definition Cyber-bullying – when one child/teen targets another child/teen using various forms of technology. Ex. Phones, internet, text messaging… samanthacelera
  • 3. Importance Cyber-bullying can have a huge impact on a child’s life. Constantly being targeted, demeaned, and made fun of can lead to severe emotional trauma.
  • 4.
  • 5. Children can no longer find sanctuary in their usual comfort zones – text messages and emails can be reached anywhere with phone service.
  • 6.
  • 7. With new technology and easy access to the internet, it is easier for students to create websites about and target a student.
  • 8.
  • 9. Internet Polling –Kids create an online poll or survey about another student, asking kids about how “ugly” or “fat” they are.
  • 10.
  • 11. The story of Megan Meier Guillermo Esteves November 6, 1992 – October 17, 2006
  • 12.
  • 13. Parents –Because most of cyber-bullying occurs in the home, parents can recognize the signs of a child being bullied, or can reprimand a child that is being a bully.
  • 14.
  • 15.
  • 16. End

Editor's Notes

  1. My current issue is Cyber-bullying. I am Megan Griffis, and this is my presentation:
  2. Cyber-Bullying can be defined as a child or teen that targets another child or teen using various forms of technology, and verbally, mentally, or emotionally abuses the person. Cyber-Bullying can include all forms of technology such as phones, internet, emailing, blogs, websites, and many others.
  3. Why knowledge about Cyber-bullying is important:Cyber-bullying can have a huge impact on a child’s life. Constantly being targeted, demeaned, and made fun of can lead to severe emotional trauma. The child’s self esteem decreases, and the cyber-bullying can often lead to severe depression, withdrawal, and even suicide.
  4. Here are a few facts about Cyber-bullying:“Cyber-bullying is the fastest growing trend of bullying among teens” – (Stutzky) As technology grows, so does our children’s ability to abuse it and turn it against other children. Children can no longer find sanctuary in their usual comfort zones – text messages and emails can be reached anywhere with phone service. Modern day technology allows children to bully others 24 hours a day, 7 days a week
  5. There are many different ways children can effect others negatively through technology: Children can impersonate other students and send out hurtful messages to their friends. Teens are more likely to post negative and derogatory images, messages, and blogs about other people they don’t like. With new technology and easy access to the internet, it is easier for students to create websites about and target a student. Cyber-bullying is about power and control. Because a cyber-bully does not directly see their victim’s reactions, they feel more powerful over their emotions.
  6. Different ways students can abuse other children are through the following methods: Text Message/Phone call – Kids can send death threats, hurtful messages, and demeaning pictures as forms of blackmail and means of humiliation through text message. Internet Polling – Internet polling is probably one of the most degrading methods of cyber-bullying. Kids can create an online poll or survey about another student, asking kids about how “ugly” or “fat” they are. Impersonation – Impersonating another fellow student or child is one of the most difficult methods to trace. Students can create separate IM accounts whose screen names are very similar to a victims’. That child will then continue to send out hurtful messages to the people of the targeted victim, causing damage throughout their friends lists.
  7. Cyber-bullying effects children’s educationStudents that are victims of cyber-bullying often know their offender. More often than not, that offender is a member of the same school as the victim. If a student is being targeted by one or more members from the same school, it is likely that student will have a difficult time concentrating on his/her school work.The student will constantly be paranoid of another attack or form of abuse from an unseen offender.
  8. The story of Megan Meier:Megan was the average 14-year old girl. She lived in Missouri with her mother, father, and sister. Like every middle school girl, Megan had some difficulties with her self-confidence, and was diagnosed with depression and attention deficit disorder.Megan was a member of the online social site “Myspace”, and often talked to her friends. When a boy by the alias “Josh Evans” began talking to her, Megan was excited – the boy was cute, charming, and played Megan up by saying everything she wanted to hear.The dream was short lived, however. “Josh” soon began sending hurtful and cruel messages, calling Megan “a bad person” and telling her “the world would be a better place without you in it”. Rumors were soon spread throughout her school, and kids stopped being friends with her, and even joined in on the hurtful messages. Megan’s self esteem plummeted.After a fight with her mother over the use of her Myspace account, Megan became very distraught over the last few messages sent by “Josh”. She hung and killed herself on October 17, 2006. “Josh” turned out to be a fellow mother of the neighborhood Megan lived in, and a mother of a student Megan went to school with. The whole debacle was started over a supposed rumor between Megan, and the mother’s daughter. Because of the easy access to the internet, “Josh”’s impersonator was able to contact and abuse Megan via technology. What could have been solved in an appropriate and controlled school setting, turned into an emotionally scarring incident that will permanently effect many students, family, and friends.
  9. Addressing the issue of cyber-bullying: Schools – Schools often have a more difficulty controlling the cyber-bullying issue because the majority of cyber-bullying does occur out of schools. But an important method of prevention is to educate. The more schools educate their children on the danger and damages caused by cyber-bullying, the less likely it is to occur. Parents – Parents may be one of the most important influences on preventing their child from becoming a victim of cyber-bullying. Because most of cyber-bullying occurs in the home, parents can recognize the signs of a child being bullied, or can reprimand a child that is being a bully. Parents are the strongest influences in a child’s life. Legislation - In several states, laws have been passed to give the schools of the offender(s) more authority in punishing their students. If a child has been caught cyber-bullying, they face potential suspension or expulsion.
  10. In conclusion, cyber-bullying is extremely damaging.It can ruin self-esteem, confidence, and may cause severe mental and emotional issues. It must be caught, stopped, and the persons involved should have serious consequences.
  11. Though this may be the end to my presentation, it is hopefully not the end of children’s lives who are victims of cyber-bullying. With all the information and awareness, people can help stop this from occurring and help those affected.