SlideShare a Scribd company logo
‘‘A growing problem
among children’’
Bullying is a form of physical and psychological abuse which threatens
the well-being of young European citizens. In the long run young
people who have been victims of bullying are at risk of developing
health problems.

Cyber bullying is a public health problem and an issue of children's
human rights. In the worst cases cyber bullying has led to suicides
among children and young people. There is therefore an urgent need
for efficient methods to reduce the number of victims suffering
from cyber bullying.
* Degradation - Using cruel gossip or rumors to damage someone's reputation or friendship.
* Harassment - Repeatedly sending insulting, offensive and rude messages.
* Cyber Stalking - Repeatedly sending threatening messages to intimidate and threaten another. This
would include activities online that would make the victim concerned about their safety.
* Impersonation - Impersonating the victim and sending or posting material that will make the victim look
bad, damage their reputation, or get them in trouble.
* Flaming - The use of vulgar & angry language to start fights with the victim using electronic means.
* Text Messages - The bully gets friends together to send thousands of messages to the victim's cell
phone, running up the victim's phone bill and getting them into trouble with their parent.
* Password Theft - They gain access to the victim's password and use it to lock them out of their accounts
and to allow others to hack into the accounts.
* Web Sites - The Cyber-Bully creates pages filled with material to target the Cyber-Bullying Victim.
* PC Attack - Sending viruses, worms, Trojans and spyware to damage the victim's computer.
* Proxy Attack - The Cyber-Bully has others to do the dirty work for them.
* Images - The Cyber-Bully posts photos of the victim that are embarrassing in nature. Sometimes these
images are enhanced or altered using sophisticated graphic software programs.
*According to recent surveys it was found that 33% of our
children will be subjected to Cyber-Bullying. That is right, one
out of every three kids will fall victim!
*Even more alarming is that it was found that 41% of these kids
who were victims of Cyber-Bullying never told a
parent, teacher, relative, or authority figure about it.
This makes it very difficult for a parent to protect their children
in that there is a good chance that if their child is a Cyber-
Bullying victim that they will not even know it!
Education can help considerably in preventing and
  dealing with the consequences of cyberbullying. The
 first place to begin an education campaign is with the
 kids and teens themselves. We need to address ways
 they can become inadvertent cyberbullies, how to be
 accountable for their actions and not to stand by and
allow bullying (in any form) to be acceptable. We need
to They can even let others know that they won’t allow
  cyberbullying, supporting the victim, making it clear
   that they won’t be used to torment others and that
    they care about the feelings of others is key,teach
          them not to ignore the pain of others.
Cyberbulling - TIC

More Related Content

What's hot

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
ckeeling
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Qazi Anwar
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
Ziar Khan
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
jnicolas10
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
SuphaphonP
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
ringw1sl
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
Reynante Tagum
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Quirky Kid
 
Bullying vs cyber bullying italy
Bullying vs cyber bullying italyBullying vs cyber bullying italy
Bullying vs cyber bullying italy
Fight Against Discrimination And Racism
 
Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…
Pew Research Center's Internet & American Life Project
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
Amber Dee
 
Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2
larsselect
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
bernadethmarasigan
 
Cyberbullying: A Technology Issue Affecting Adolescents and What Needs to Be...
Cyberbullying:  A Technology Issue Affecting Adolescents and What Needs to Be...Cyberbullying:  A Technology Issue Affecting Adolescents and What Needs to Be...
Cyberbullying: A Technology Issue Affecting Adolescents and What Needs to Be...
samhauck
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Rozwadowski
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
wirsi
 

What's hot (16)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Bullying vs cyber bullying italy
Bullying vs cyber bullying italyBullying vs cyber bullying italy
Bullying vs cyber bullying italy
 
Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying: A Technology Issue Affecting Adolescents and What Needs to Be...
Cyberbullying:  A Technology Issue Affecting Adolescents and What Needs to Be...Cyberbullying:  A Technology Issue Affecting Adolescents and What Needs to Be...
Cyberbullying: A Technology Issue Affecting Adolescents and What Needs to Be...
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Viewers also liked

Inaugurarea Salii de Lectura Raisa Caldare
Inaugurarea Salii de Lectura Raisa CaldareInaugurarea Salii de Lectura Raisa Caldare
Inaugurarea Salii de Lectura Raisa CaldareAdela Negura
 
Biblioteca.2.0.seminar
Biblioteca.2.0.seminarBiblioteca.2.0.seminar
Biblioteca.2.0.seminarAdela Negura
 
Advisers as Advocates for Study Abroad
Advisers as Advocates for Study AbroadAdvisers as Advocates for Study Abroad
Advisers as Advocates for Study Abroad
Julie Larsen
 
Nico santi y tomy
Nico santi y tomyNico santi y tomy
Nico santi y tomy
Nicolas Montaldi
 
NACADA Tech Talk #3 2012
NACADA Tech Talk #3 2012NACADA Tech Talk #3 2012
NACADA Tech Talk #3 2012
Julie Larsen
 
Advising with a social justice lens
Advising with a social justice lensAdvising with a social justice lens
Advising with a social justice lens
Julie Larsen
 
Building the braintrust
Building the braintrustBuilding the braintrust
Building the braintrust
Julie Larsen
 
Using Social Media to Reach Your Advisees
Using Social Media to Reach Your AdviseesUsing Social Media to Reach Your Advisees
Using Social Media to Reach Your Advisees
Julie Larsen
 
Executive Search Medical Devices - Surgical, Renal, Peritoneal, Blood
Executive Search Medical Devices - Surgical, Renal, Peritoneal, BloodExecutive Search Medical Devices - Surgical, Renal, Peritoneal, Blood
Executive Search Medical Devices - Surgical, Renal, Peritoneal, Blood
NextGen Global Executive Search
 
Mitologie universala.7.Celtii
Mitologie universala.7.CeltiiMitologie universala.7.Celtii
Mitologie universala.7.Celtii
Adela Negura
 
Aerospace Defense Cyber Security Executive Search
Aerospace Defense Cyber Security Executive SearchAerospace Defense Cyber Security Executive Search
Aerospace Defense Cyber Security Executive Search
NextGen Global Executive Search
 
#Et6-At7-Réussir sa stratégie etourisme
#Et6-At7-Réussir sa stratégie etourisme#Et6-At7-Réussir sa stratégie etourisme
#Et6-At7-Réussir sa stratégie etourisme
Ludovic Dublanchet
 
Mise en place de la stratégie d'Animation Numérique de Territoire en Pays Vai...
Mise en place de la stratégie d'Animation Numérique de Territoire en Pays Vai...Mise en place de la stratégie d'Animation Numérique de Territoire en Pays Vai...
Mise en place de la stratégie d'Animation Numérique de Territoire en Pays Vai...
Lise Trincaretto
 
Webdesign sites web et mobiles-strategies et enjeux-ergonomie
Webdesign sites web et mobiles-strategies et enjeux-ergonomieWebdesign sites web et mobiles-strategies et enjeux-ergonomie
Webdesign sites web et mobiles-strategies et enjeux-ergonomie
Olivier Dommange
 
[Fr] omi presentation-contenu-digital-012013
[Fr] omi presentation-contenu-digital-012013[Fr] omi presentation-contenu-digital-012013
[Fr] omi presentation-contenu-digital-012013
Yann Gourvennec
 
Labord. evaluation-par-les-pairs -MOOC-pedagogie
Labord. evaluation-par-les-pairs -MOOC-pedagogieLabord. evaluation-par-les-pairs -MOOC-pedagogie
Labord. evaluation-par-les-pairs -MOOC-pedagogie
ExpertWeb
 

Viewers also liked (19)

Inaugurarea Salii de Lectura Raisa Caldare
Inaugurarea Salii de Lectura Raisa CaldareInaugurarea Salii de Lectura Raisa Caldare
Inaugurarea Salii de Lectura Raisa Caldare
 
Biblioteca.2.0.seminar
Biblioteca.2.0.seminarBiblioteca.2.0.seminar
Biblioteca.2.0.seminar
 
Advisers as Advocates for Study Abroad
Advisers as Advocates for Study AbroadAdvisers as Advocates for Study Abroad
Advisers as Advocates for Study Abroad
 
Nico santi y tomy
Nico santi y tomyNico santi y tomy
Nico santi y tomy
 
NACADA Tech Talk #3 2012
NACADA Tech Talk #3 2012NACADA Tech Talk #3 2012
NACADA Tech Talk #3 2012
 
Advising with a social justice lens
Advising with a social justice lensAdvising with a social justice lens
Advising with a social justice lens
 
Building the braintrust
Building the braintrustBuilding the braintrust
Building the braintrust
 
Using Social Media to Reach Your Advisees
Using Social Media to Reach Your AdviseesUsing Social Media to Reach Your Advisees
Using Social Media to Reach Your Advisees
 
Vedete de subiect
Vedete de subiectVedete de subiect
Vedete de subiect
 
Executive Search Medical Devices - Surgical, Renal, Peritoneal, Blood
Executive Search Medical Devices - Surgical, Renal, Peritoneal, BloodExecutive Search Medical Devices - Surgical, Renal, Peritoneal, Blood
Executive Search Medical Devices - Surgical, Renal, Peritoneal, Blood
 
Mitologie universala.7.Celtii
Mitologie universala.7.CeltiiMitologie universala.7.Celtii
Mitologie universala.7.Celtii
 
Comun.masa.rot
Comun.masa.rotComun.masa.rot
Comun.masa.rot
 
Aerospace Defense Cyber Security Executive Search
Aerospace Defense Cyber Security Executive SearchAerospace Defense Cyber Security Executive Search
Aerospace Defense Cyber Security Executive Search
 
Projet ROCARE 002
Projet ROCARE 002Projet ROCARE 002
Projet ROCARE 002
 
#Et6-At7-Réussir sa stratégie etourisme
#Et6-At7-Réussir sa stratégie etourisme#Et6-At7-Réussir sa stratégie etourisme
#Et6-At7-Réussir sa stratégie etourisme
 
Mise en place de la stratégie d'Animation Numérique de Territoire en Pays Vai...
Mise en place de la stratégie d'Animation Numérique de Territoire en Pays Vai...Mise en place de la stratégie d'Animation Numérique de Territoire en Pays Vai...
Mise en place de la stratégie d'Animation Numérique de Territoire en Pays Vai...
 
Webdesign sites web et mobiles-strategies et enjeux-ergonomie
Webdesign sites web et mobiles-strategies et enjeux-ergonomieWebdesign sites web et mobiles-strategies et enjeux-ergonomie
Webdesign sites web et mobiles-strategies et enjeux-ergonomie
 
[Fr] omi presentation-contenu-digital-012013
[Fr] omi presentation-contenu-digital-012013[Fr] omi presentation-contenu-digital-012013
[Fr] omi presentation-contenu-digital-012013
 
Labord. evaluation-par-les-pairs -MOOC-pedagogie
Labord. evaluation-par-les-pairs -MOOC-pedagogieLabord. evaluation-par-les-pairs -MOOC-pedagogie
Labord. evaluation-par-les-pairs -MOOC-pedagogie
 

Similar to Cyberbulling - TIC

Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
Karen Brooks
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Veronica Alejandro
 
Cyber Bullying PwrPnt
Cyber Bullying PwrPntCyber Bullying PwrPnt
Cyber Bullying PwrPnt
griff2mm
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Joe Gauder
 
Essays On Cyber Bullying
Essays On Cyber BullyingEssays On Cyber Bullying
Essays On Cyber Bullying
College Papers Writing Service
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
TeamBanana
 
Olmv cyberbullying
Olmv cyberbullyingOlmv cyberbullying
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
alanrgibson41217
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptx
liutommy1
 
cyber bulling
 cyber bulling cyber bulling
cyber bulling
superior law college
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
Apostolos Syropoulos
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
Ray Brannon
 
Cyberbullying: Advice for Schools
Cyberbullying: Advice for SchoolsCyberbullying: Advice for Schools
Cyberbullying: Advice for Schools
International Accreditation Organization
 
Sarah doty cyber bullying
Sarah doty cyber bullyingSarah doty cyber bullying
Sarah doty cyber bullying
Sarah Doty
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Marisol Herrera
 
Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02
Joyce Hirsh
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
kguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
kguerrazzi
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
Chris483410
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Zekhaya Sithole
 

Similar to Cyberbulling - TIC (20)

Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying PwrPnt
Cyber Bullying PwrPntCyber Bullying PwrPnt
Cyber Bullying PwrPnt
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Essays On Cyber Bullying
Essays On Cyber BullyingEssays On Cyber Bullying
Essays On Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Olmv cyberbullying
Olmv cyberbullyingOlmv cyberbullying
Olmv cyberbullying
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptx
 
cyber bulling
 cyber bulling cyber bulling
cyber bulling
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Cyberbullying: Advice for Schools
Cyberbullying: Advice for SchoolsCyberbullying: Advice for Schools
Cyberbullying: Advice for Schools
 
Sarah doty cyber bullying
Sarah doty cyber bullyingSarah doty cyber bullying
Sarah doty cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 

More from Nicolas Montaldi

Trabajo practico 2
Trabajo practico 2Trabajo practico 2
Trabajo practico 2
Nicolas Montaldi
 
Tp1 2014
Tp1 2014Tp1 2014
Trabajo Practico 11
Trabajo Practico 11Trabajo Practico 11
Trabajo Practico 11
Nicolas Montaldi
 
Trabajo practico 12
Trabajo practico 12Trabajo practico 12
Trabajo practico 12
Nicolas Montaldi
 
T.P. 11
T.P. 11T.P. 11
Trabajo practico nro. 9
Trabajo practico nro. 9Trabajo practico nro. 9
Trabajo practico nro. 9
Nicolas Montaldi
 
Trabajo practico Nro 3
Trabajo practico Nro 3Trabajo practico Nro 3
Trabajo practico Nro 3
Nicolas Montaldi
 
Muerte de las lenguas
Muerte de las lenguasMuerte de las lenguas
Muerte de las lenguas
Nicolas Montaldi
 
Trabajo practico Nro.5
Trabajo practico Nro.5Trabajo practico Nro.5
Trabajo practico Nro.5
Nicolas Montaldi
 
Trabajo practico n°2
Trabajo practico n°2Trabajo practico n°2
Trabajo practico n°2
Nicolas Montaldi
 
Tp n8 planilla de funciones
Tp n8 planilla de funcionesTp n8 planilla de funciones
Tp n8 planilla de funciones
Nicolas Montaldi
 
Trabajo Practico N7
Trabajo Practico N7Trabajo Practico N7
Trabajo Practico N7
Nicolas Montaldi
 
Trabajo practico N 4
Trabajo practico N 4Trabajo practico N 4
Trabajo practico N 4
Nicolas Montaldi
 
Tabajo practico N 3
Tabajo practico N 3Tabajo practico N 3
Tabajo practico N 3
Nicolas Montaldi
 
Trabajo Practico Nº 1
Trabajo Practico Nº 1Trabajo Practico Nº 1
Trabajo Practico Nº 1
Nicolas Montaldi
 
Trabajo practico n2
Trabajo practico n2Trabajo practico n2
Trabajo practico n2
Nicolas Montaldi
 

More from Nicolas Montaldi (16)

Trabajo practico 2
Trabajo practico 2Trabajo practico 2
Trabajo practico 2
 
Tp1 2014
Tp1 2014Tp1 2014
Tp1 2014
 
Trabajo Practico 11
Trabajo Practico 11Trabajo Practico 11
Trabajo Practico 11
 
Trabajo practico 12
Trabajo practico 12Trabajo practico 12
Trabajo practico 12
 
T.P. 11
T.P. 11T.P. 11
T.P. 11
 
Trabajo practico nro. 9
Trabajo practico nro. 9Trabajo practico nro. 9
Trabajo practico nro. 9
 
Trabajo practico Nro 3
Trabajo practico Nro 3Trabajo practico Nro 3
Trabajo practico Nro 3
 
Muerte de las lenguas
Muerte de las lenguasMuerte de las lenguas
Muerte de las lenguas
 
Trabajo practico Nro.5
Trabajo practico Nro.5Trabajo practico Nro.5
Trabajo practico Nro.5
 
Trabajo practico n°2
Trabajo practico n°2Trabajo practico n°2
Trabajo practico n°2
 
Tp n8 planilla de funciones
Tp n8 planilla de funcionesTp n8 planilla de funciones
Tp n8 planilla de funciones
 
Trabajo Practico N7
Trabajo Practico N7Trabajo Practico N7
Trabajo Practico N7
 
Trabajo practico N 4
Trabajo practico N 4Trabajo practico N 4
Trabajo practico N 4
 
Tabajo practico N 3
Tabajo practico N 3Tabajo practico N 3
Tabajo practico N 3
 
Trabajo Practico Nº 1
Trabajo Practico Nº 1Trabajo Practico Nº 1
Trabajo Practico Nº 1
 
Trabajo practico n2
Trabajo practico n2Trabajo practico n2
Trabajo practico n2
 

Recently uploaded

thyroid case presentation.pptx Kamala's Lakshaman palatial
thyroid case presentation.pptx Kamala's Lakshaman palatialthyroid case presentation.pptx Kamala's Lakshaman palatial
thyroid case presentation.pptx Kamala's Lakshaman palatial
Aditya Raghav
 
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
dsnow9802
 
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
taqyea
 
Tape Measure Training & Practice Assessments.pdf
Tape Measure Training & Practice Assessments.pdfTape Measure Training & Practice Assessments.pdf
Tape Measure Training & Practice Assessments.pdf
KateRobinson68
 
Leave-rules.ppt CCS leave rules 1972 for central govt employees
Leave-rules.ppt CCS leave rules 1972 for central govt employeesLeave-rules.ppt CCS leave rules 1972 for central govt employees
Leave-rules.ppt CCS leave rules 1972 for central govt employees
Sreenivas702647
 
Connect to Grow: The power of building networks
Connect to Grow: The power of building networksConnect to Grow: The power of building networks
Connect to Grow: The power of building networks
Eirini SYKA-LERIOTI
 
Leadership Ambassador club Adventist module
Leadership Ambassador club Adventist moduleLeadership Ambassador club Adventist module
Leadership Ambassador club Adventist module
kakomaeric00
 
Learnings from Successful Jobs Searchers
Learnings from Successful Jobs SearchersLearnings from Successful Jobs Searchers
Learnings from Successful Jobs Searchers
Bruce Bennett
 
All Of My Java Codes With A Sample Output.docx
All Of My Java Codes With A Sample Output.docxAll Of My Java Codes With A Sample Output.docx
All Of My Java Codes With A Sample Output.docx
adhitya5119
 
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
2zjra9bn
 
Lbs last rank 2023 9988kr47h4744j445.pdf
Lbs last rank 2023 9988kr47h4744j445.pdfLbs last rank 2023 9988kr47h4744j445.pdf
Lbs last rank 2023 9988kr47h4744j445.pdf
ashiquepa3
 
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
NWEXAM
 
A Guide to a Winning Interview June 2024
A Guide to a Winning Interview June 2024A Guide to a Winning Interview June 2024
A Guide to a Winning Interview June 2024
Bruce Bennett
 
IT Career Hacks Navigate the Tech Jungle with a Roadmap
IT Career Hacks Navigate the Tech Jungle with a RoadmapIT Career Hacks Navigate the Tech Jungle with a Roadmap
IT Career Hacks Navigate the Tech Jungle with a Roadmap
Base Camp
 
0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf
Thomas GIRARD BDes
 
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAANBUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
cahgading001
 
Switching Careers Slides - JoyceMSullivan SocMediaFin - 2024Jun11.pdf
Switching Careers Slides - JoyceMSullivan SocMediaFin -  2024Jun11.pdfSwitching Careers Slides - JoyceMSullivan SocMediaFin -  2024Jun11.pdf
Switching Careers Slides - JoyceMSullivan SocMediaFin - 2024Jun11.pdf
SocMediaFin - Joyce Sullivan
 
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
GabrielleSinaga
 
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
2zjra9bn
 

Recently uploaded (19)

thyroid case presentation.pptx Kamala's Lakshaman palatial
thyroid case presentation.pptx Kamala's Lakshaman palatialthyroid case presentation.pptx Kamala's Lakshaman palatial
thyroid case presentation.pptx Kamala's Lakshaman palatial
 
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
 
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
 
Tape Measure Training & Practice Assessments.pdf
Tape Measure Training & Practice Assessments.pdfTape Measure Training & Practice Assessments.pdf
Tape Measure Training & Practice Assessments.pdf
 
Leave-rules.ppt CCS leave rules 1972 for central govt employees
Leave-rules.ppt CCS leave rules 1972 for central govt employeesLeave-rules.ppt CCS leave rules 1972 for central govt employees
Leave-rules.ppt CCS leave rules 1972 for central govt employees
 
Connect to Grow: The power of building networks
Connect to Grow: The power of building networksConnect to Grow: The power of building networks
Connect to Grow: The power of building networks
 
Leadership Ambassador club Adventist module
Leadership Ambassador club Adventist moduleLeadership Ambassador club Adventist module
Leadership Ambassador club Adventist module
 
Learnings from Successful Jobs Searchers
Learnings from Successful Jobs SearchersLearnings from Successful Jobs Searchers
Learnings from Successful Jobs Searchers
 
All Of My Java Codes With A Sample Output.docx
All Of My Java Codes With A Sample Output.docxAll Of My Java Codes With A Sample Output.docx
All Of My Java Codes With A Sample Output.docx
 
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
 
Lbs last rank 2023 9988kr47h4744j445.pdf
Lbs last rank 2023 9988kr47h4744j445.pdfLbs last rank 2023 9988kr47h4744j445.pdf
Lbs last rank 2023 9988kr47h4744j445.pdf
 
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
 
A Guide to a Winning Interview June 2024
A Guide to a Winning Interview June 2024A Guide to a Winning Interview June 2024
A Guide to a Winning Interview June 2024
 
IT Career Hacks Navigate the Tech Jungle with a Roadmap
IT Career Hacks Navigate the Tech Jungle with a RoadmapIT Career Hacks Navigate the Tech Jungle with a Roadmap
IT Career Hacks Navigate the Tech Jungle with a Roadmap
 
0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf
 
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAANBUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
 
Switching Careers Slides - JoyceMSullivan SocMediaFin - 2024Jun11.pdf
Switching Careers Slides - JoyceMSullivan SocMediaFin -  2024Jun11.pdfSwitching Careers Slides - JoyceMSullivan SocMediaFin -  2024Jun11.pdf
Switching Careers Slides - JoyceMSullivan SocMediaFin - 2024Jun11.pdf
 
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
 
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
 

Cyberbulling - TIC

  • 2. Bullying is a form of physical and psychological abuse which threatens the well-being of young European citizens. In the long run young people who have been victims of bullying are at risk of developing health problems. Cyber bullying is a public health problem and an issue of children's human rights. In the worst cases cyber bullying has led to suicides among children and young people. There is therefore an urgent need for efficient methods to reduce the number of victims suffering from cyber bullying.
  • 3. * Degradation - Using cruel gossip or rumors to damage someone's reputation or friendship. * Harassment - Repeatedly sending insulting, offensive and rude messages. * Cyber Stalking - Repeatedly sending threatening messages to intimidate and threaten another. This would include activities online that would make the victim concerned about their safety. * Impersonation - Impersonating the victim and sending or posting material that will make the victim look bad, damage their reputation, or get them in trouble. * Flaming - The use of vulgar & angry language to start fights with the victim using electronic means. * Text Messages - The bully gets friends together to send thousands of messages to the victim's cell phone, running up the victim's phone bill and getting them into trouble with their parent. * Password Theft - They gain access to the victim's password and use it to lock them out of their accounts and to allow others to hack into the accounts. * Web Sites - The Cyber-Bully creates pages filled with material to target the Cyber-Bullying Victim. * PC Attack - Sending viruses, worms, Trojans and spyware to damage the victim's computer. * Proxy Attack - The Cyber-Bully has others to do the dirty work for them. * Images - The Cyber-Bully posts photos of the victim that are embarrassing in nature. Sometimes these images are enhanced or altered using sophisticated graphic software programs.
  • 4. *According to recent surveys it was found that 33% of our children will be subjected to Cyber-Bullying. That is right, one out of every three kids will fall victim! *Even more alarming is that it was found that 41% of these kids who were victims of Cyber-Bullying never told a parent, teacher, relative, or authority figure about it. This makes it very difficult for a parent to protect their children in that there is a good chance that if their child is a Cyber- Bullying victim that they will not even know it!
  • 5. Education can help considerably in preventing and dealing with the consequences of cyberbullying. The first place to begin an education campaign is with the kids and teens themselves. We need to address ways they can become inadvertent cyberbullies, how to be accountable for their actions and not to stand by and allow bullying (in any form) to be acceptable. We need to They can even let others know that they won’t allow cyberbullying, supporting the victim, making it clear that they won’t be used to torment others and that they care about the feelings of others is key,teach them not to ignore the pain of others.