SlideShare a Scribd company logo
Harmful actions that are
communicated via
electronic media and are
intended to embarrass ,
harm, or slander another
individual.
Internet safety
• Don’t share personal information
• Keep passwords safe
• Don’t communicate with stranger
• Tell an adult if you come across information
that makes you feel uncomfortable
• Treat people with respect and dignity
•18% of students in grades 6-8 said they had been cyberbullied at least
once
in the last couple of months; and 6% said it had happened to them 2 or
more
times (Kowalski et al., 2005).
•11% of students in grades 6-8 said they had cyberbullied another
person
at least once in the last couple of months, and 2% said they had done it
two
or more times (Kowalski et al., 2005).
•19% of regular Internet users between the ages of 10 and 17 reported
being
involved in online aggression; (Ybarra & Mitchell, 2004).
•17% of 6-11 year-olds and 36% of 12-17-year-olds reported that
someone
said threatening or embarrassing things about them through e-mail,
instant messages, web sites, chat rooms, or text messages
(Fight Crime: Invest in Kids, 2006).
Statistics
How to recognize cyber bullying
Everyone seems to be participating
in the same joke
Changes in behavior or mood, especially
after or during the use of technology
Increased or decreased frequency of
technology use
Increased defensiveness or secrecy when
using technology
Changes in relationships between
friends
·People can Cyber Bully through:
·Texting
·Emails
·Instant messages
·Chat rooms
·Web pages
·Social Networks
·I touch
·DS
Types of Cyberbullying
Preventing Cyber bullying
Inform
Educate
Consider
Protect
Let people know what cyber bullying is, how
they can report cyber bullying
educate people that joking around can be harmful.
Emphasize the power bystanders have to take a stance
against bullying
Think before sending! Consider that any
message or images that you
take, post, or send can become public very
quickly and stay online forever
Never share your passwords
Make them hard to guess
Change passwords regularly
How to respond to Cyber bullies
Block
the
Bully
Collect
Evidence
Report
It
Don't
Retaliate
Most application have a method of blocking
unwanted contact
You can take away their power by blocking
them
An Angry reply gives the bully the satisfaction
of knowing they upset you.
Bully can also collect your reply as evidence
Keep a record of bully incidents,
conversations, e-mails, or IMs
Most applications you can report
bullying
Tell an adult

More Related Content

What's hot

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
John Dale Cruz
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
Trevschic
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
carlasoruco
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
Reynante Tagum
 
Cyberbullying and Cybercrime
Cyberbullying and CybercrimeCyberbullying and Cybercrime
Cyberbullying and Cybercrime
Apostolos Syropoulos
 
Cyber stalking
Cyber stalking Cyber stalking
Cyber stalking
hirakhalid2394
 
Bully
BullyBully
Bully
malah53560
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
FrenzyPurisima
 
Geek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingGeek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® Cyberbullying
Melissa McDonald
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
pardolopez
 
Cyberbullying: A Technology Issue Affecting Adolescents and What Needs to Be...
Cyberbullying:  A Technology Issue Affecting Adolescents and What Needs to Be...Cyberbullying:  A Technology Issue Affecting Adolescents and What Needs to Be...
Cyberbullying: A Technology Issue Affecting Adolescents and What Needs to Be...
samhauck
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentation
clifforddyyy
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
chocogyrl098
 
Cyber Bullying on Social Media Sites
Cyber Bullying on Social Media SitesCyber Bullying on Social Media Sites
Cyber Bullying on Social Media Sites
Swapnil Shahade
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
buech1cj
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
drogt1mm
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
larsselect
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Rozwadowski
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
Rishabh Kataria
 
Cyberbullying Presentation 2008
Cyberbullying Presentation 2008Cyberbullying Presentation 2008
Cyberbullying Presentation 2008
Josie Fraser
 

What's hot (20)

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
 
Cyberbullying and Cybercrime
Cyberbullying and CybercrimeCyberbullying and Cybercrime
Cyberbullying and Cybercrime
 
Cyber stalking
Cyber stalking Cyber stalking
Cyber stalking
 
Bully
BullyBully
Bully
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Geek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingGeek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying: A Technology Issue Affecting Adolescents and What Needs to Be...
Cyberbullying:  A Technology Issue Affecting Adolescents and What Needs to Be...Cyberbullying:  A Technology Issue Affecting Adolescents and What Needs to Be...
Cyberbullying: A Technology Issue Affecting Adolescents and What Needs to Be...
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying on Social Media Sites
Cyber Bullying on Social Media SitesCyber Bullying on Social Media Sites
Cyber Bullying on Social Media Sites
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyberbullying Presentation 2008
Cyberbullying Presentation 2008Cyberbullying Presentation 2008
Cyberbullying Presentation 2008
 

Viewers also liked

Презентация изделий компании Aqua-Line (светильники, водопады) для инвестора
Презентация изделий компании Aqua-Line (светильники, водопады) для инвестораПрезентация изделий компании Aqua-Line (светильники, водопады) для инвестора
Презентация изделий компании Aqua-Line (светильники, водопады) для инвестора
Вячеслав Марчков
 
Lecture3
Lecture3Lecture3
Lecture3
tt_aljobory
 
Lecture10
Lecture10Lecture10
Lecture10
tt_aljobory
 
Decentralized enactment of bpel processes
Decentralized enactment of bpel processesDecentralized enactment of bpel processes
Decentralized enactment of bpel processes
Nexgen Technology
 
Scalable analytics for iaa s cloud availability
Scalable analytics for iaa s cloud availabilityScalable analytics for iaa s cloud availability
Scalable analytics for iaa s cloud availability
Nexgen Technology
 
Variations in performance and scalability an experimental study in iaa s clou...
Variations in performance and scalability an experimental study in iaa s clou...Variations in performance and scalability an experimental study in iaa s clou...
Variations in performance and scalability an experimental study in iaa s clou...
Nexgen Technology
 
Mrodd mrseven (1)
Mrodd mrseven (1)Mrodd mrseven (1)
Mrodd mrseven (1)
Worserbay
 
Real Estate Investing Lessons For Dummies
Real Estate Investing Lessons For DummiesReal Estate Investing Lessons For Dummies
Real Estate Investing Lessons For Dummies
Curt Cloyd
 
The cambrian cloud introduction: major trends research notes
The cambrian cloud introduction: major trends research notesThe cambrian cloud introduction: major trends research notes
The cambrian cloud introduction: major trends research notes
Chris Jones
 
Dynamic aggregate an elastic framework for qo s aware distributed processing ...
Dynamic aggregate an elastic framework for qo s aware distributed processing ...Dynamic aggregate an elastic framework for qo s aware distributed processing ...
Dynamic aggregate an elastic framework for qo s aware distributed processing ...
Nexgen Technology
 
Half quarter turns
Half quarter turnsHalf quarter turns
Half quarter turns
Worserbay
 
Lcfn strategies 2012
Lcfn strategies 2012Lcfn strategies 2012
Lcfn strategies 2012
shrund
 
Introducing North Kathmandu Development Network by Govinda Narayan
Introducing North Kathmandu Development Network by Govinda NarayanIntroducing North Kathmandu Development Network by Govinda Narayan
Introducing North Kathmandu Development Network by Govinda Narayan
Souvihdya Manoz Khadka
 
Dislocations in Superlattice
Dislocations in SuperlatticeDislocations in Superlattice
Dislocations in Superlattice
Sum K
 
Optimally adaptive power saving protocols for ad hoc networks using the hyper...
Optimally adaptive power saving protocols for ad hoc networks using the hyper...Optimally adaptive power saving protocols for ad hoc networks using the hyper...
Optimally adaptive power saving protocols for ad hoc networks using the hyper...
Nexgen Technology
 
Subject To The Existing Mortgage - Is it a better option?
Subject To The Existing Mortgage - Is it a better option?Subject To The Existing Mortgage - Is it a better option?
Subject To The Existing Mortgage - Is it a better option?
Curt Cloyd
 
Interconnecting routing instances
Interconnecting routing instancesInterconnecting routing instances
Interconnecting routing instances
Nexgen Technology
 
Heavy or light
Heavy or lightHeavy or light
Heavy or light
Worserbay
 
Ucrania
UcraniaUcrania
Cm 3d shapes
Cm 3d shapesCm 3d shapes
Cm 3d shapes
Worserbay
 

Viewers also liked (20)

Презентация изделий компании Aqua-Line (светильники, водопады) для инвестора
Презентация изделий компании Aqua-Line (светильники, водопады) для инвестораПрезентация изделий компании Aqua-Line (светильники, водопады) для инвестора
Презентация изделий компании Aqua-Line (светильники, водопады) для инвестора
 
Lecture3
Lecture3Lecture3
Lecture3
 
Lecture10
Lecture10Lecture10
Lecture10
 
Decentralized enactment of bpel processes
Decentralized enactment of bpel processesDecentralized enactment of bpel processes
Decentralized enactment of bpel processes
 
Scalable analytics for iaa s cloud availability
Scalable analytics for iaa s cloud availabilityScalable analytics for iaa s cloud availability
Scalable analytics for iaa s cloud availability
 
Variations in performance and scalability an experimental study in iaa s clou...
Variations in performance and scalability an experimental study in iaa s clou...Variations in performance and scalability an experimental study in iaa s clou...
Variations in performance and scalability an experimental study in iaa s clou...
 
Mrodd mrseven (1)
Mrodd mrseven (1)Mrodd mrseven (1)
Mrodd mrseven (1)
 
Real Estate Investing Lessons For Dummies
Real Estate Investing Lessons For DummiesReal Estate Investing Lessons For Dummies
Real Estate Investing Lessons For Dummies
 
The cambrian cloud introduction: major trends research notes
The cambrian cloud introduction: major trends research notesThe cambrian cloud introduction: major trends research notes
The cambrian cloud introduction: major trends research notes
 
Dynamic aggregate an elastic framework for qo s aware distributed processing ...
Dynamic aggregate an elastic framework for qo s aware distributed processing ...Dynamic aggregate an elastic framework for qo s aware distributed processing ...
Dynamic aggregate an elastic framework for qo s aware distributed processing ...
 
Half quarter turns
Half quarter turnsHalf quarter turns
Half quarter turns
 
Lcfn strategies 2012
Lcfn strategies 2012Lcfn strategies 2012
Lcfn strategies 2012
 
Introducing North Kathmandu Development Network by Govinda Narayan
Introducing North Kathmandu Development Network by Govinda NarayanIntroducing North Kathmandu Development Network by Govinda Narayan
Introducing North Kathmandu Development Network by Govinda Narayan
 
Dislocations in Superlattice
Dislocations in SuperlatticeDislocations in Superlattice
Dislocations in Superlattice
 
Optimally adaptive power saving protocols for ad hoc networks using the hyper...
Optimally adaptive power saving protocols for ad hoc networks using the hyper...Optimally adaptive power saving protocols for ad hoc networks using the hyper...
Optimally adaptive power saving protocols for ad hoc networks using the hyper...
 
Subject To The Existing Mortgage - Is it a better option?
Subject To The Existing Mortgage - Is it a better option?Subject To The Existing Mortgage - Is it a better option?
Subject To The Existing Mortgage - Is it a better option?
 
Interconnecting routing instances
Interconnecting routing instancesInterconnecting routing instances
Interconnecting routing instances
 
Heavy or light
Heavy or lightHeavy or light
Heavy or light
 
Ucrania
UcraniaUcrania
Ucrania
 
Cm 3d shapes
Cm 3d shapesCm 3d shapes
Cm 3d shapes
 

Similar to Cyberbullying power ppt student copy

Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
HDCH
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
smeech
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
R Smith
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
R Smith
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
CharanBobby69CB
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
R Smith
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Veronica Alejandro
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
kschermerhorn
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Joe Gauder
 
Cyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItCyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent It
FeliciaDixon5
 
Huff591 interactivepresentationinternetclass
Huff591 interactivepresentationinternetclassHuff591 interactivepresentationinternetclass
Huff591 interactivepresentationinternetclass
chuff10
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
lheikkila
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
Karen Brooks
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
Desiree Caskey
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
guestb1fb9
 
Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)
SMA BRUDERAN PURWOREJO
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Yumna Ali
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
TeamBanana
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
mribera87
 
Social networks
Social networksSocial networks
Social networks
drlizmike
 

Similar to Cyberbullying power ppt student copy (20)

Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItCyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent It
 
Huff591 interactivepresentationinternetclass
Huff591 interactivepresentationinternetclassHuff591 interactivepresentationinternetclass
Huff591 interactivepresentationinternetclass
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Social networks
Social networksSocial networks
Social networks
 

More from brlewis1971

President project
President projectPresident project
President project
brlewis1971
 
Edmodotrainingpresentationbacktoschool2013
Edmodotrainingpresentationbacktoschool2013Edmodotrainingpresentationbacktoschool2013
Edmodotrainingpresentationbacktoschool2013
brlewis1971
 
Fmms qr code guidem
Fmms qr code guidemFmms qr code guidem
Fmms qr code guidem
brlewis1971
 
Anthony fitzpatrick white_out
Anthony fitzpatrick white_outAnthony fitzpatrick white_out
Anthony fitzpatrick white_out
brlewis1971
 
Edmodo training powerpoint
Edmodo training powerpointEdmodo training powerpoint
Edmodo training powerpoint
brlewis1971
 
Lan vs wan
Lan vs wanLan vs wan
Lan vs wan
brlewis1971
 
Budgets 8th grade ppt.
Budgets  8th grade ppt.Budgets  8th grade ppt.
Budgets 8th grade ppt.
brlewis1971
 
Rogue agents f
Rogue agents fRogue agents f
Rogue agents f
brlewis1971
 
Wolff anima
Wolff animaWolff anima
Wolff anima
brlewis1971
 
Animal presentation
Animal presentationAnimal presentation
Animal presentation
brlewis1971
 
Employers
EmployersEmployers
Employers
brlewis1971
 
Account types
Account typesAccount types
Account types
brlewis1971
 
Work place expectations
Work place expectationsWork place expectations
Work place expectations
brlewis1971
 
Types of bullying with pic
Types of bullying with picTypes of bullying with pic
Types of bullying with pic
brlewis1971
 

More from brlewis1971 (14)

President project
President projectPresident project
President project
 
Edmodotrainingpresentationbacktoschool2013
Edmodotrainingpresentationbacktoschool2013Edmodotrainingpresentationbacktoschool2013
Edmodotrainingpresentationbacktoschool2013
 
Fmms qr code guidem
Fmms qr code guidemFmms qr code guidem
Fmms qr code guidem
 
Anthony fitzpatrick white_out
Anthony fitzpatrick white_outAnthony fitzpatrick white_out
Anthony fitzpatrick white_out
 
Edmodo training powerpoint
Edmodo training powerpointEdmodo training powerpoint
Edmodo training powerpoint
 
Lan vs wan
Lan vs wanLan vs wan
Lan vs wan
 
Budgets 8th grade ppt.
Budgets  8th grade ppt.Budgets  8th grade ppt.
Budgets 8th grade ppt.
 
Rogue agents f
Rogue agents fRogue agents f
Rogue agents f
 
Wolff anima
Wolff animaWolff anima
Wolff anima
 
Animal presentation
Animal presentationAnimal presentation
Animal presentation
 
Employers
EmployersEmployers
Employers
 
Account types
Account typesAccount types
Account types
 
Work place expectations
Work place expectationsWork place expectations
Work place expectations
 
Types of bullying with pic
Types of bullying with picTypes of bullying with pic
Types of bullying with pic
 

Recently uploaded

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 

Recently uploaded (20)

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 

Cyberbullying power ppt student copy

  • 1. Harmful actions that are communicated via electronic media and are intended to embarrass , harm, or slander another individual.
  • 2. Internet safety • Don’t share personal information • Keep passwords safe • Don’t communicate with stranger • Tell an adult if you come across information that makes you feel uncomfortable • Treat people with respect and dignity
  • 3. •18% of students in grades 6-8 said they had been cyberbullied at least once in the last couple of months; and 6% said it had happened to them 2 or more times (Kowalski et al., 2005). •11% of students in grades 6-8 said they had cyberbullied another person at least once in the last couple of months, and 2% said they had done it two or more times (Kowalski et al., 2005). •19% of regular Internet users between the ages of 10 and 17 reported being involved in online aggression; (Ybarra & Mitchell, 2004). •17% of 6-11 year-olds and 36% of 12-17-year-olds reported that someone said threatening or embarrassing things about them through e-mail, instant messages, web sites, chat rooms, or text messages (Fight Crime: Invest in Kids, 2006). Statistics
  • 4. How to recognize cyber bullying Everyone seems to be participating in the same joke Changes in behavior or mood, especially after or during the use of technology Increased or decreased frequency of technology use Increased defensiveness or secrecy when using technology Changes in relationships between friends
  • 5. ·People can Cyber Bully through: ·Texting ·Emails ·Instant messages ·Chat rooms ·Web pages ·Social Networks ·I touch ·DS Types of Cyberbullying
  • 6. Preventing Cyber bullying Inform Educate Consider Protect Let people know what cyber bullying is, how they can report cyber bullying educate people that joking around can be harmful. Emphasize the power bystanders have to take a stance against bullying Think before sending! Consider that any message or images that you take, post, or send can become public very quickly and stay online forever Never share your passwords Make them hard to guess Change passwords regularly
  • 7. How to respond to Cyber bullies Block the Bully Collect Evidence Report It Don't Retaliate Most application have a method of blocking unwanted contact You can take away their power by blocking them An Angry reply gives the bully the satisfaction of knowing they upset you. Bully can also collect your reply as evidence Keep a record of bully incidents, conversations, e-mails, or IMs Most applications you can report bullying Tell an adult