SlideShare a Scribd company logo
CYBER BULLYING AND
INTERNET ADDICTION
 Cyberbullying is bullying that takes place over
digital devices like cell phones, computers, and
tablets. Cyberbullying can occur through SMS,
Text, and apps, or online in social media, forums,
or gaming where people can view, participate in,
or share content.
 Cyberbullying includes sending, posting, or
sharing negative, harmful, false, or mean content
about someone else. It can include sharing
personal or private information about someone
else causing embarrassment or humiliation.
Some cyberbullying crosses the line into unlawful
or criminal behavior.
The most common places where
cyberbullying occurs are:
 Social Media, such as Facebook, Instagram,
Snapchat, and Twitter
 SMS (Short Message Service) also known as
Text Message sent through devices
 Instant Message (via devices, email provider
services, apps, and social media messaging
features)
 Email
Special Concerns
With the prevalence of social media and
digital forums, comments, photos, posts, and
content shared by individuals can often be viewed
by strangers as well as acquaintances. The content
an individual shares online – both their personal
content as well as any negative, mean, or hurtful
content – creates a kind of permanent public record
of their views, activities, and behavior.
This public record can be thought of as an
online reputation, which may be accessible to
schools, employers, colleges, clubs, and others
who may be researching an individual now or in the
future. Cyberbullying can harm the online
reputations of everyone involved – not just the
person being bullied, but those doing the bullying or
participating in it. Cyberbullying has unique
concerns in that it can be:
 Persistent – Digital devices offer an ability to
immediately and continuously communicate 24
hours a day, so it can be difficult for children
experiencing cyberbullying to find relief.
 Permanent – Most information communicated
electronically is permanent and public, if not
reported and removed. A negative online
reputation, including for those who bully, can
impact college admissions, employment, and
other areas of life.
 Hard to Notice – Because teachers and parents
may not overhear or see cyberbullying taking
place, it is harder to recognize.
Laws and Sanctions
While all states have criminal laws that apply
to bullying, not all have special statutes that apply
to cyberbullying or bullying that takes place outside
of school. Schools may take action either as
required by law, or with local or school policies that
allow them to discipline or take other action. Some
states also have provisions to address bullying if it
affects school performance. You can learn about
the laws and policies in each state, including if they
cover cyberbullying.
Definitions
A frequently used definition of cyberbullying
is "an aggressive, intentional act or behavior that is
carried out by a group or an individual, using
electronic forms of contact, repeatedly and over
time against a victim who cannot easily defend him
or herself.
There are many variations of the definition,
such as the National Crime Prevention Council's
more specific definition: "the process of using the
Internet, cell phones or other devices to send or
post text or images intended to hurt or embarrass
another person."
Cyberbullying is often similar to traditional
bullying, with some notable distinctions. Victims of
cyberbullying may not know the identity of their
bully, or why the bully is targeting them. The
harassment can have wide-reaching effects on the
victim, as the content used to harass the victim can
be spread and shared easily among many people
and often remains accessible long after the initial
incident.
The terms "cyberharassment" and
"cyberbullying" are sometimes used synonymously,
though some people use the latter to refer
specifically to harassment among minors or in a
school setting.
Tips to Stop Cyberbullying
 Don’t respond. If someone bullies you,
remember that your reaction is usually exactly
what the bully wants. It gives him or her power
over you. Who wants to empower a bully?
 Don’t retaliate. Getting back at the bully turns
you into one and reinforces the bully’s behavior.
Help avoid a whole cycle of aggression.
 Save the evidence. The only good news about
digital bullying is that the harassing messages
can usually be captured, saved, and shown to
someone who can help. You need to do this even
if it’s minor stuff, in case things escalate.
 Talk to a trusted adult. You deserve backup. It’s
always good to involve a parent but – if you can’t – a
school counselor usually knows how to help.
Sometimes both are needed. If you’re really nervous
about saying something, see if there’s a way to report
the incident anonymously at school.
 Block the bully. If the harassment’s coming in the
form of instant messages, texts, or profile comments,
do yourself a favor: Use preferences or privacy tools
to block the person. If it’s in chat, leave the “room.”
 Be civil. Even if you don’t like someone, it’s a good
idea to be decent and not sink to the other person’s
level. Also, research shows that gossiping about and
trash talking others increases your risk of being
bullied. Treat people the way you want to be treated.
 Don’t be a bully. How would you feel if someone
harassed you? You know the old saying about
walking a mile in someone’s shoes; even a few
seconds of thinking about how another person
might feel can put a big damper on aggression.
That’s needed in this world.
 Be a friend, not a bystander. Watching or
forwarding mean messages empowers bullies
and hurts victims even more. If you can, tell
bullies to stop or let them know harassment
makes people look stupid and mean. It’s time to
let bullies know their behavior is unacceptable –
cruel abuse of fellow human beings. If you can’t
stop the bully, at least try to help the victim and
report the behavior.
Internet Addiction
Internet addiction is described as an impulse control
disorder, which does not involve use of an intoxicating drug
and is very similar to pathological gambling. Some Internet
users may develop an emotional attachment to on-line
friends and activities they create on their computer screens.
Internet users may enjoy aspects of the Internet that allow
them to meet, socialize, and exchange ideas through the use
of chat rooms, social networking websites, or "virtual
communities."
Other Internet users spend endless hours
researching topics of interest Online or
"blogging". Blogging is a contraction of the term
"Web log", in which an individual will post
commentaries and keep regular chronicle of
events. It can be viewed as journaling and the
entries are primarily textual.
Similar to other addictions, those suffering
from Internet addiction use the virtual fantasy world
to connect with real people through the Internet, as
a substitution for real-life human connection, which
they are unable to achieve normally.
What are the warning signs of
Internet addiction?
 Preoccupation with the Internet. (Thoughts about
previous on-line activity or anticipation of the next
on-line session.)
 Use of the Internet in increasing amounts of time
in order to achieve satisfaction.
 Repeated, unsuccessful efforts to control, cut
back or stop Internet use.
 Feelings of restlessness, moodiness, depression,
or irritability when attempting to cut down use of
the Internet.
 On-line longer than originally intended.
 Jeopardized or risked loss of significant
relationships, job, educational or career
opportunities because of Internet use.
 Lies to family members, therapists, or others to
conceal the extent of involvement with the
Internet.
 Use of the Internet is a way to escape from
problems or to relieve a dysphoric mood. (e.g.
Feelings of hopelessness, guilt, anxiety,
depression.)
What are the effects?
Internet addiction results in personal, family,
academic, financial, and occupational problems that are
characteristic of other addictions. Impairments of real
life relationships are disrupted as a result of excessive
use of the Internet. Individuals suffering from Internet
addiction spend more time in solitary seclusion, spend
less time with real people in their lives, and are often
viewed as socially awkward. Arguments may result due
to the volume of time spent on-line. Those suffering
from Internet addiction may attempt to conceal the
amount of time spent on-line, which results in distrust
and the disturbance of quality in once stable
relationships.
Some suffering from Internet addiction may
create on-line personas or profiles where they are
able to alter their identities and pretend to be
someone other than himself or herself. Those at
highest risk for creation of a secret life are those
who suffer from low-self esteem feelings of
inadequacy, and fear of disapproval. Such
negative self-concepts lead to clinical problems of
depression and anxiety.
Many persons who attempt to quit their
Internet use experience withdrawal including:
anger, depression, relief, mood swings, anxiety,
fear, irritability, sadness, loneliness, boredom,
restlessness, procrastination, and upset
stomach. Being addicted to the Internet can also
cause physical discomfort or medical problems
such as: Carpal Tunnel Syndrome, dry eyes,
backaches, severe headaches, eating irregularities,
(such as skipping meals), failure to attend to
personal hygiene, and sleep disturbance.
How can someone get help?
The first step is to determine if there is a
problem. A Certified Addictions Counselor trained in
identification and treatment of Internet addiction can
effectively perform an assessment to determine what
level of care is most appropriate. For a free confidential
assessment, call the Illinois Institute for Addiction
Recovery at (800) 522-3784. An assessment can be
completed 24 hours a day, 7 days a
week. Appointments are preferred, but walk-ins are
always welcome.
Sources: "Virtual Addiction" David N. Greenfield,
Ph.D., "Caught in the Net" Dr. Kimberly Young, Center
for Internet Addiction Recovery, American Psychiatric
Association.

More Related Content

What's hot

Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1
alicelagajino
 
Types of media
Types of mediaTypes of media
Types of media
Shane Dion
 
MIL - Similarities and Differences.pptx
MIL - Similarities and Differences.pptxMIL - Similarities and Differences.pptx
MIL - Similarities and Differences.pptx
GarwinRaramaOcampo
 
Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Empowerment Technologies - Module 6
Empowerment Technologies - Module 6
Jesus Rances
 
MIL LESSON 4.pptx
MIL LESSON 4.pptxMIL LESSON 4.pptx
MIL LESSON 4.pptx
NormanMisoles
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
Jesus Rances
 
MIL_Lesson 5_Responsible Use of Media and Information.pdf
MIL_Lesson 5_Responsible Use of Media and Information.pdfMIL_Lesson 5_Responsible Use of Media and Information.pdf
MIL_Lesson 5_Responsible Use of Media and Information.pdf
ranniejhon
 
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Arniel Ping
 
Media and Information Literacy (MIL) - 3. Information Literacy - Information ...
Media and Information Literacy (MIL) - 3. Information Literacy - Information ...Media and Information Literacy (MIL) - 3. Information Literacy - Information ...
Media and Information Literacy (MIL) - 3. Information Literacy - Information ...
Arniel Ping
 
Opportunities ,Challenges, and Power of Media and Information.pptx
Opportunities ,Challenges, and Power of Media and Information.pptxOpportunities ,Challenges, and Power of Media and Information.pptx
Opportunities ,Challenges, and Power of Media and Information.pptx
luvvprems5
 
Module 1 Lesson 1.pptx
Module 1 Lesson 1.pptxModule 1 Lesson 1.pptx
Module 1 Lesson 1.pptx
levipoi
 
Mil dlp w1
Mil dlp w1Mil dlp w1
Mil dlp w1
MaryJoyPagtakhan2
 
The Power of Media and Information
The Power of Media and InformationThe Power of Media and Information
The Power of Media and Information
EILLEN IVY PORTUGUEZ
 
Daily Lesson Log in MIL Week 5.docx
Daily Lesson Log in MIL Week 5.docxDaily Lesson Log in MIL Week 5.docx
Daily Lesson Log in MIL Week 5.docx
RoNTertainmentTV
 
Advanced Presentation Skills - Empowerment Technologies
Advanced Presentation Skills - Empowerment TechnologiesAdvanced Presentation Skills - Empowerment Technologies
Advanced Presentation Skills - Empowerment Technologies
Mark Jhon Oxillo
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3
Jesus Rances
 
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
RyanRojasRicablanca
 
ICT as a Platform for Change
ICT as a Platform for ChangeICT as a Platform for Change
ICT as a Platform for Change
George Silandote Jr.
 
6 Advance Presentation Skill
6 Advance Presentation Skill6 Advance Presentation Skill
6 Advance Presentation Skill
Teodoro Llanes II
 
Imaging and Design for Online Environment
Imaging and Design for Online EnvironmentImaging and Design for Online Environment
Imaging and Design for Online Environment
Angelito Quiambao
 

What's hot (20)

Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1
 
Types of media
Types of mediaTypes of media
Types of media
 
MIL - Similarities and Differences.pptx
MIL - Similarities and Differences.pptxMIL - Similarities and Differences.pptx
MIL - Similarities and Differences.pptx
 
Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Empowerment Technologies - Module 6
Empowerment Technologies - Module 6
 
MIL LESSON 4.pptx
MIL LESSON 4.pptxMIL LESSON 4.pptx
MIL LESSON 4.pptx
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
 
MIL_Lesson 5_Responsible Use of Media and Information.pdf
MIL_Lesson 5_Responsible Use of Media and Information.pdfMIL_Lesson 5_Responsible Use of Media and Information.pdf
MIL_Lesson 5_Responsible Use of Media and Information.pdf
 
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
 
Media and Information Literacy (MIL) - 3. Information Literacy - Information ...
Media and Information Literacy (MIL) - 3. Information Literacy - Information ...Media and Information Literacy (MIL) - 3. Information Literacy - Information ...
Media and Information Literacy (MIL) - 3. Information Literacy - Information ...
 
Opportunities ,Challenges, and Power of Media and Information.pptx
Opportunities ,Challenges, and Power of Media and Information.pptxOpportunities ,Challenges, and Power of Media and Information.pptx
Opportunities ,Challenges, and Power of Media and Information.pptx
 
Module 1 Lesson 1.pptx
Module 1 Lesson 1.pptxModule 1 Lesson 1.pptx
Module 1 Lesson 1.pptx
 
Mil dlp w1
Mil dlp w1Mil dlp w1
Mil dlp w1
 
The Power of Media and Information
The Power of Media and InformationThe Power of Media and Information
The Power of Media and Information
 
Daily Lesson Log in MIL Week 5.docx
Daily Lesson Log in MIL Week 5.docxDaily Lesson Log in MIL Week 5.docx
Daily Lesson Log in MIL Week 5.docx
 
Advanced Presentation Skills - Empowerment Technologies
Advanced Presentation Skills - Empowerment TechnologiesAdvanced Presentation Skills - Empowerment Technologies
Advanced Presentation Skills - Empowerment Technologies
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3
 
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
 
ICT as a Platform for Change
ICT as a Platform for ChangeICT as a Platform for Change
ICT as a Platform for Change
 
6 Advance Presentation Skill
6 Advance Presentation Skill6 Advance Presentation Skill
6 Advance Presentation Skill
 
Imaging and Design for Online Environment
Imaging and Design for Online EnvironmentImaging and Design for Online Environment
Imaging and Design for Online Environment
 

Similar to Cyber bullying-and-internet-addiction

Cyberbullying and Internet addiction by Jhoanne Erika Masaya
Cyberbullying and Internet addiction by Jhoanne Erika MasayaCyberbullying and Internet addiction by Jhoanne Erika Masaya
Cyberbullying and Internet addiction by Jhoanne Erika Masaya
Jhoanneerika
 
Act 9 nicole jae millare
Act 9 nicole jae millareAct 9 nicole jae millare
Act 9 nicole jae millare
Phoebe Millare - Taupo
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngmiliarguelles1
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaamiliarguelles
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaasofisalazar00
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying estegiulimazziotti96
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngmiliarguelles1
 
Cyberbullying and Internet Addiction
Cyberbullying and Internet AddictionCyberbullying and Internet Addiction
Cyberbullying and Internet Addiction
Rossehna Mari Magtoto
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
DonikaLici
 
Cyber bullying and internet addiction
Cyber bullying and internet addictionCyber bullying and internet addiction
Cyber bullying and internet addiction
JeromeIsturis
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
Arissa Ablao
 
Social networking by jarin
Social networking by jarinSocial networking by jarin
Social networking by jarinjarin651
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Mefratechnologies
 
Cyberbullying and internent addiction
Cyberbullying  and internent addictionCyberbullying  and internent addiction
Cyberbullying and internent addiction
Christopher Mejia
 
Activity 9
Activity 9Activity 9
Activity 9
Ged Amir Martinez
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
SuphaphonP
 
Week7 assgn2suphaphonp
Week7 assgn2suphaphonpWeek7 assgn2suphaphonp
Week7 assgn2suphaphonp
JingboWang9
 
Week7assgn2KwanHoY
Week7assgn2KwanHoYWeek7assgn2KwanHoY
Week7assgn2KwanHoY
YipKwanHo
 
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose ManlinconCYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
katrinarose14
 

Similar to Cyber bullying-and-internet-addiction (20)

Cyberbullying and Internet addiction by Jhoanne Erika Masaya
Cyberbullying and Internet addiction by Jhoanne Erika MasayaCyberbullying and Internet addiction by Jhoanne Erika Masaya
Cyberbullying and Internet addiction by Jhoanne Erika Masaya
 
Act 9 nicole jae millare
Act 9 nicole jae millareAct 9 nicole jae millare
Act 9 nicole jae millare
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying este
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Cyberbullying and Internet Addiction
Cyberbullying and Internet AddictionCyberbullying and Internet Addiction
Cyberbullying and Internet Addiction
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying and internet addiction
Cyber bullying and internet addictionCyber bullying and internet addiction
Cyber bullying and internet addiction
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
 
Social networking by jarin
Social networking by jarinSocial networking by jarin
Social networking by jarin
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying and internent addiction
Cyberbullying  and internent addictionCyberbullying  and internent addiction
Cyberbullying and internent addiction
 
Activity 9
Activity 9Activity 9
Activity 9
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Week7 assgn2suphaphonp
Week7 assgn2suphaphonpWeek7 assgn2suphaphonp
Week7 assgn2suphaphonp
 
Week7assgn2KwanHoY
Week7assgn2KwanHoYWeek7assgn2KwanHoY
Week7assgn2KwanHoY
 
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose ManlinconCYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
 
Edp 279 unit 2.4
Edp 279 unit 2.4Edp 279 unit 2.4
Edp 279 unit 2.4
 

Recently uploaded

"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 

Recently uploaded (20)

"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 

Cyber bullying-and-internet-addiction

  • 2.  Cyberbullying is bullying that takes place over digital devices like cell phones, computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content.
  • 3.  Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyberbullying crosses the line into unlawful or criminal behavior.
  • 4. The most common places where cyberbullying occurs are:  Social Media, such as Facebook, Instagram, Snapchat, and Twitter  SMS (Short Message Service) also known as Text Message sent through devices  Instant Message (via devices, email provider services, apps, and social media messaging features)  Email
  • 5. Special Concerns With the prevalence of social media and digital forums, comments, photos, posts, and content shared by individuals can often be viewed by strangers as well as acquaintances. The content an individual shares online – both their personal content as well as any negative, mean, or hurtful content – creates a kind of permanent public record of their views, activities, and behavior.
  • 6. This public record can be thought of as an online reputation, which may be accessible to schools, employers, colleges, clubs, and others who may be researching an individual now or in the future. Cyberbullying can harm the online reputations of everyone involved – not just the person being bullied, but those doing the bullying or participating in it. Cyberbullying has unique concerns in that it can be:
  • 7.  Persistent – Digital devices offer an ability to immediately and continuously communicate 24 hours a day, so it can be difficult for children experiencing cyberbullying to find relief.  Permanent – Most information communicated electronically is permanent and public, if not reported and removed. A negative online reputation, including for those who bully, can impact college admissions, employment, and other areas of life.  Hard to Notice – Because teachers and parents may not overhear or see cyberbullying taking place, it is harder to recognize.
  • 8. Laws and Sanctions While all states have criminal laws that apply to bullying, not all have special statutes that apply to cyberbullying or bullying that takes place outside of school. Schools may take action either as required by law, or with local or school policies that allow them to discipline or take other action. Some states also have provisions to address bullying if it affects school performance. You can learn about the laws and policies in each state, including if they cover cyberbullying.
  • 9. Definitions A frequently used definition of cyberbullying is "an aggressive, intentional act or behavior that is carried out by a group or an individual, using electronic forms of contact, repeatedly and over time against a victim who cannot easily defend him or herself.
  • 10. There are many variations of the definition, such as the National Crime Prevention Council's more specific definition: "the process of using the Internet, cell phones or other devices to send or post text or images intended to hurt or embarrass another person."
  • 11. Cyberbullying is often similar to traditional bullying, with some notable distinctions. Victims of cyberbullying may not know the identity of their bully, or why the bully is targeting them. The harassment can have wide-reaching effects on the victim, as the content used to harass the victim can be spread and shared easily among many people and often remains accessible long after the initial incident.
  • 12. The terms "cyberharassment" and "cyberbullying" are sometimes used synonymously, though some people use the latter to refer specifically to harassment among minors or in a school setting.
  • 13. Tips to Stop Cyberbullying  Don’t respond. If someone bullies you, remember that your reaction is usually exactly what the bully wants. It gives him or her power over you. Who wants to empower a bully?  Don’t retaliate. Getting back at the bully turns you into one and reinforces the bully’s behavior. Help avoid a whole cycle of aggression.  Save the evidence. The only good news about digital bullying is that the harassing messages can usually be captured, saved, and shown to someone who can help. You need to do this even if it’s minor stuff, in case things escalate.
  • 14.  Talk to a trusted adult. You deserve backup. It’s always good to involve a parent but – if you can’t – a school counselor usually knows how to help. Sometimes both are needed. If you’re really nervous about saying something, see if there’s a way to report the incident anonymously at school.  Block the bully. If the harassment’s coming in the form of instant messages, texts, or profile comments, do yourself a favor: Use preferences or privacy tools to block the person. If it’s in chat, leave the “room.”  Be civil. Even if you don’t like someone, it’s a good idea to be decent and not sink to the other person’s level. Also, research shows that gossiping about and trash talking others increases your risk of being bullied. Treat people the way you want to be treated.
  • 15.  Don’t be a bully. How would you feel if someone harassed you? You know the old saying about walking a mile in someone’s shoes; even a few seconds of thinking about how another person might feel can put a big damper on aggression. That’s needed in this world.  Be a friend, not a bystander. Watching or forwarding mean messages empowers bullies and hurts victims even more. If you can, tell bullies to stop or let them know harassment makes people look stupid and mean. It’s time to let bullies know their behavior is unacceptable – cruel abuse of fellow human beings. If you can’t stop the bully, at least try to help the victim and report the behavior.
  • 16. Internet Addiction Internet addiction is described as an impulse control disorder, which does not involve use of an intoxicating drug and is very similar to pathological gambling. Some Internet users may develop an emotional attachment to on-line friends and activities they create on their computer screens. Internet users may enjoy aspects of the Internet that allow them to meet, socialize, and exchange ideas through the use of chat rooms, social networking websites, or "virtual communities."
  • 17. Other Internet users spend endless hours researching topics of interest Online or "blogging". Blogging is a contraction of the term "Web log", in which an individual will post commentaries and keep regular chronicle of events. It can be viewed as journaling and the entries are primarily textual.
  • 18. Similar to other addictions, those suffering from Internet addiction use the virtual fantasy world to connect with real people through the Internet, as a substitution for real-life human connection, which they are unable to achieve normally.
  • 19. What are the warning signs of Internet addiction?  Preoccupation with the Internet. (Thoughts about previous on-line activity or anticipation of the next on-line session.)  Use of the Internet in increasing amounts of time in order to achieve satisfaction.  Repeated, unsuccessful efforts to control, cut back or stop Internet use.
  • 20.  Feelings of restlessness, moodiness, depression, or irritability when attempting to cut down use of the Internet.  On-line longer than originally intended.  Jeopardized or risked loss of significant relationships, job, educational or career opportunities because of Internet use.
  • 21.  Lies to family members, therapists, or others to conceal the extent of involvement with the Internet.  Use of the Internet is a way to escape from problems or to relieve a dysphoric mood. (e.g. Feelings of hopelessness, guilt, anxiety, depression.)
  • 22. What are the effects? Internet addiction results in personal, family, academic, financial, and occupational problems that are characteristic of other addictions. Impairments of real life relationships are disrupted as a result of excessive use of the Internet. Individuals suffering from Internet addiction spend more time in solitary seclusion, spend less time with real people in their lives, and are often viewed as socially awkward. Arguments may result due to the volume of time spent on-line. Those suffering from Internet addiction may attempt to conceal the amount of time spent on-line, which results in distrust and the disturbance of quality in once stable relationships.
  • 23. Some suffering from Internet addiction may create on-line personas or profiles where they are able to alter their identities and pretend to be someone other than himself or herself. Those at highest risk for creation of a secret life are those who suffer from low-self esteem feelings of inadequacy, and fear of disapproval. Such negative self-concepts lead to clinical problems of depression and anxiety.
  • 24. Many persons who attempt to quit their Internet use experience withdrawal including: anger, depression, relief, mood swings, anxiety, fear, irritability, sadness, loneliness, boredom, restlessness, procrastination, and upset stomach. Being addicted to the Internet can also cause physical discomfort or medical problems such as: Carpal Tunnel Syndrome, dry eyes, backaches, severe headaches, eating irregularities, (such as skipping meals), failure to attend to personal hygiene, and sleep disturbance.
  • 25. How can someone get help? The first step is to determine if there is a problem. A Certified Addictions Counselor trained in identification and treatment of Internet addiction can effectively perform an assessment to determine what level of care is most appropriate. For a free confidential assessment, call the Illinois Institute for Addiction Recovery at (800) 522-3784. An assessment can be completed 24 hours a day, 7 days a week. Appointments are preferred, but walk-ins are always welcome. Sources: "Virtual Addiction" David N. Greenfield, Ph.D., "Caught in the Net" Dr. Kimberly Young, Center for Internet Addiction Recovery, American Psychiatric Association.