SlideShare a Scribd company logo
Cyberbullying is the use of social networks to repeatedly harm or harass other people in a
deliberate manner.[1]
According to U.S. Legal Definitions, "cyber-bullying could be limited to
posting rumors or gossips about a person in the internet bringing about hatred in other’s minds;
or it may go to the extent of personally identifying victims and publishing materials severely
defaming and humiliating them"
A majority of states have laws that explicitly include electronic forms of communication within
stalking or harassment laws.[28][29]
Most law enforcement agencies have cyber-crime units and often Internet stalking is treated with
more seriousness than reports of physical stalking.[30]
Help and resources can be searched by
state or area.
- Law inforcement
- Intimidation, emotional damage, suicide
-
- According to the Cyberbullying Research Center, "there have been several high‐profile
cases involving teenagers taking their own lives in part because of being harassed and
mistreated over the Internet, a phenomenon we have termed cyberbullicide – suicide
indirectly or directly influenced by experiences with online aggression."
- Cyberbullying is an intense form of psychological abuse, whose victims are more than
twice as likely to suffer from mental disorders compared to traditional bullying

More Related Content

What's hot

Detecting Moral Foundations With Twitter
Detecting Moral Foundations With TwitterDetecting Moral Foundations With Twitter
Detecting Moral Foundations With Twitter
Selah Lynch
 
Poverty and crime cause final
Poverty and crime cause finalPoverty and crime cause final
Poverty and crime cause final
Jibran Karim
 
Luke Mawbey, Head of Technology, ComplyAdvantage - Fighting corruption with t...
Luke Mawbey, Head of Technology, ComplyAdvantage - Fighting corruption with t...Luke Mawbey, Head of Technology, ComplyAdvantage - Fighting corruption with t...
Luke Mawbey, Head of Technology, ComplyAdvantage - Fighting corruption with t...
Techsylvania
 
6 motivations of cybercriminals
6 motivations of cybercriminals   6 motivations of cybercriminals
6 motivations of cybercriminals
Bev Robb
 
Mass media and communication
Mass media and communication Mass media and communication
Mass media and communication
NiraliMakvana1
 
Panic theory slideshare
Panic theory slidesharePanic theory slideshare
Panic theory slidesharePrecious King
 
English presentation
English presentationEnglish presentation
English presentationGinaSoler10
 
Distributed Control for Inclusion - Matilda Wysocki, Refactor Camp 2018
Distributed Control for Inclusion - Matilda Wysocki, Refactor Camp 2018Distributed Control for Inclusion - Matilda Wysocki, Refactor Camp 2018
Distributed Control for Inclusion - Matilda Wysocki, Refactor Camp 2018
refactorcamp
 
Cyber Bullying and Internet Addiction
Cyber Bullying and Internet AddictionCyber Bullying and Internet Addiction
Cyber Bullying and Internet Addiction
Aruell Tamaray
 

What's hot (10)

Cyberbullying and the law
Cyberbullying and the lawCyberbullying and the law
Cyberbullying and the law
 
Detecting Moral Foundations With Twitter
Detecting Moral Foundations With TwitterDetecting Moral Foundations With Twitter
Detecting Moral Foundations With Twitter
 
Poverty and crime cause final
Poverty and crime cause finalPoverty and crime cause final
Poverty and crime cause final
 
Luke Mawbey, Head of Technology, ComplyAdvantage - Fighting corruption with t...
Luke Mawbey, Head of Technology, ComplyAdvantage - Fighting corruption with t...Luke Mawbey, Head of Technology, ComplyAdvantage - Fighting corruption with t...
Luke Mawbey, Head of Technology, ComplyAdvantage - Fighting corruption with t...
 
6 motivations of cybercriminals
6 motivations of cybercriminals   6 motivations of cybercriminals
6 motivations of cybercriminals
 
Mass media and communication
Mass media and communication Mass media and communication
Mass media and communication
 
Panic theory slideshare
Panic theory slidesharePanic theory slideshare
Panic theory slideshare
 
English presentation
English presentationEnglish presentation
English presentation
 
Distributed Control for Inclusion - Matilda Wysocki, Refactor Camp 2018
Distributed Control for Inclusion - Matilda Wysocki, Refactor Camp 2018Distributed Control for Inclusion - Matilda Wysocki, Refactor Camp 2018
Distributed Control for Inclusion - Matilda Wysocki, Refactor Camp 2018
 
Cyber Bullying and Internet Addiction
Cyber Bullying and Internet AddictionCyber Bullying and Internet Addiction
Cyber Bullying and Internet Addiction
 

Viewers also liked

Skolkovo Robotics Projects
Skolkovo Robotics ProjectsSkolkovo Robotics Projects
Skolkovo Robotics Projects
Skolkovo Robotics Center
 
4Ciri Cinta Sejati
 4Ciri   Cinta Sejati 4Ciri   Cinta Sejati
4Ciri Cinta Sejati
Kank Hari
 
Pac Buzz - August 2015
Pac Buzz - August 2015Pac Buzz - August 2015
Pac Buzz - August 2015
Pacifica Companies
 
Судебная практика по применению МНС в России
Судебная практика по применению МНС в РоссииСудебная практика по применению МНС в России
Судебная практика по применению МНС в России
Infotropic Media
 
Dx observacional indicadores
Dx observacional indicadoresDx observacional indicadores
Dx observacional indicadoresLeoo DimaZz
 
¿ QUO VADIS, PATRIA?
¿ QUO VADIS, PATRIA?¿ QUO VADIS, PATRIA?
¿ QUO VADIS, PATRIA?FUSADES
 
Sm02 tc
Sm02 tcSm02 tc
Sm02 tcT M
 

Viewers also liked (17)

Hekhek
HekhekHekhek
Hekhek
 
Arroyo
ArroyoArroyo
Arroyo
 
Chin
ChinChin
Chin
 
Doc1
Doc1Doc1
Doc1
 
Skolkovo Robotics Projects
Skolkovo Robotics ProjectsSkolkovo Robotics Projects
Skolkovo Robotics Projects
 
Chin111133333
Chin111133333Chin111133333
Chin111133333
 
4Ciri Cinta Sejati
 4Ciri   Cinta Sejati 4Ciri   Cinta Sejati
4Ciri Cinta Sejati
 
Pac Buzz - August 2015
Pac Buzz - August 2015Pac Buzz - August 2015
Pac Buzz - August 2015
 
Судебная практика по применению МНС в России
Судебная практика по применению МНС в РоссииСудебная практика по применению МНС в России
Судебная практика по применению МНС в России
 
Los sentidos
Los sentidosLos sentidos
Los sentidos
 
Psp n
Psp nPsp n
Psp n
 
Dx observacional indicadores
Dx observacional indicadoresDx observacional indicadores
Dx observacional indicadores
 
03
0303
03
 
¿ QUO VADIS, PATRIA?
¿ QUO VADIS, PATRIA?¿ QUO VADIS, PATRIA?
¿ QUO VADIS, PATRIA?
 
Pda 25 r
Pda 25 rPda 25 r
Pda 25 r
 
Fina lerbloque1ro a
Fina lerbloque1ro aFina lerbloque1ro a
Fina lerbloque1ro a
 
Sm02 tc
Sm02 tcSm02 tc
Sm02 tc
 

Similar to Cyberbullying

Cyber Bullying and Internet Addiction
Cyber Bullying and Internet AddictionCyber Bullying and Internet Addiction
Cyber Bullying and Internet Addiction
mabahongutot
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Mukul Kumar
 
cyber crime
cyber crimecyber crime
cyber crime
Akash Mehta
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
ijtsrd
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
Ziar Khan
 
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxWHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
philipnelson29183
 
Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues
Fahad Saleem
 
ASA style sample
ASA style sampleASA style sample
ASA style sample
Marie Fincher
 
Oula 9 a
Oula   9 aOula   9 a
Oula 9 a
Anumod E Nair
 
Cyber crime (2)
Cyber crime (2)Cyber crime (2)
Cyber crime (2)
Abhishek Viswam
 
LEGAL PROTECTION OF WOMEN AS VICTIM OF THE CRIME OF PORNOGRAPHY (REVENGE PORN)
LEGAL PROTECTION OF WOMEN AS VICTIM OF THE CRIME OF PORNOGRAPHY (REVENGE PORN)LEGAL PROTECTION OF WOMEN AS VICTIM OF THE CRIME OF PORNOGRAPHY (REVENGE PORN)
LEGAL PROTECTION OF WOMEN AS VICTIM OF THE CRIME OF PORNOGRAPHY (REVENGE PORN)
AJHSSR Journal
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
bala prakash
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
IJCSIS Research Publications
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Universitas Pembangunan Panca Budi
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)rayarren06
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
Write My Statistics Paper Vestal
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandEnrique J Cordero
 

Similar to Cyberbullying (20)

Stalking2
Stalking2Stalking2
Stalking2
 
Cyber Bullying and Internet Addiction
Cyber Bullying and Internet AddictionCyber Bullying and Internet Addiction
Cyber Bullying and Internet Addiction
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxWHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
 
Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues
 
ASA style sample
ASA style sampleASA style sample
ASA style sample
 
Oula 9 a
Oula   9 aOula   9 a
Oula 9 a
 
Cyber crime (2)
Cyber crime (2)Cyber crime (2)
Cyber crime (2)
 
LEGAL PROTECTION OF WOMEN AS VICTIM OF THE CRIME OF PORNOGRAPHY (REVENGE PORN)
LEGAL PROTECTION OF WOMEN AS VICTIM OF THE CRIME OF PORNOGRAPHY (REVENGE PORN)LEGAL PROTECTION OF WOMEN AS VICTIM OF THE CRIME OF PORNOGRAPHY (REVENGE PORN)
LEGAL PROTECTION OF WOMEN AS VICTIM OF THE CRIME OF PORNOGRAPHY (REVENGE PORN)
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
Violent crime.pptx
Violent crime.pptxViolent crime.pptx
Violent crime.pptx
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
 

Cyberbullying

  • 1. Cyberbullying is the use of social networks to repeatedly harm or harass other people in a deliberate manner.[1] According to U.S. Legal Definitions, "cyber-bullying could be limited to posting rumors or gossips about a person in the internet bringing about hatred in other’s minds; or it may go to the extent of personally identifying victims and publishing materials severely defaming and humiliating them" A majority of states have laws that explicitly include electronic forms of communication within stalking or harassment laws.[28][29] Most law enforcement agencies have cyber-crime units and often Internet stalking is treated with more seriousness than reports of physical stalking.[30] Help and resources can be searched by state or area. - Law inforcement - Intimidation, emotional damage, suicide - - According to the Cyberbullying Research Center, "there have been several high‐profile cases involving teenagers taking their own lives in part because of being harassed and mistreated over the Internet, a phenomenon we have termed cyberbullicide – suicide indirectly or directly influenced by experiences with online aggression." - Cyberbullying is an intense form of psychological abuse, whose victims are more than twice as likely to suffer from mental disorders compared to traditional bullying