SlideShare a Scribd company logo
Cyber bullying
Clifford Jonathan T. De Jesus
What is cyberbullying?
Cyberbullying is when a student use the internet,
cell phones, or other technological devices to send
or post text or images intended to hurt,
embarrass, threaten, torment, humiliate, or
intimidate their victim.
Cyberbullyingcan take many forms:
• Sending mean messages or threats to a person’s
email account or cell phone
• Spreading rumors online or through texts
• Posting hurtful or threatening messages on
social networking sites or web pages
• Stealing a person’s account information to
break into their account and send damaging
messages
• Pretending to be someone else online to hurt
another person
• Taking unflattering pictures of a person and
spreading them through cell phones or the
Internet
• Sexting, or circulating sexually suggestive
pictures or messages about a person
two kinds of
cyber-bullying
•Direct attacks – messages sent directly to the
victim
•Cyber-bullying by proxy - Using someone else
to cyber bully a victim, this proxy may know they
are cyber bullying and they may not.
Direct Attacks
•Instant Messaging
•Text Messaging
•Blogs
•Websites
•Emailing Pictures
•Stealing Passwords
•Sending porn
•Impersonation
Cyber-bullying by proxy
• Someone else does the dirty work for the main
cyber bully.
• Bullies may hack into the victim’s account or steal
their password. They may set up a new account
pretending to be the victim.
• Friends get angry with the victim.
• This form of cyber bullying is very dangerous
because many people are involved, not just the
bully and the victim.
Statistics
How does cyber bullying affect you ?
How to stop cyber
bullying !
•Don’t respond.
•Don’t retaliate.
•Save the evidence.
•Talk to a trusted adult. Be civil.
•Don’t be a bully.
•Be a friend, not a bystander.
Sources
• https://images.google.com/
• https://www.google.com.ph/
• http://www.gov.ph/2012/09/12/republic-act-no-10175/
• http://www.pacerteensagainstbullying.org/tab/experiencing-bullying/cyber-bullying/
• https://evsucielloigana.wordpress.com/anti-bullying/
• https://nobullying.com/the-effects-of-cyber-bullying/
• http://cyberbullying.org/2015-data
• https://www.youtube.com/watch?v=0oGFh0mwrjM
• http://www.stopcyberbullying.org/how_it_works/cyberbullying_by_proxy.html
• http://www.stopcyberbullying.org/how_it_works/direct_attacks.html
• http://www.safeteens.com/tips-to-stop-cyberbullying/

More Related Content

What's hot

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Veronica Alejandro
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Regina Marbun
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
kgoldberg01
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
jessy0121
 
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
cyberbullyingisreal
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying caitlynx48
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentationSally Garza
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
kscheidy
 
Bullying in social media presentation
Bullying in social media presentationBullying in social media presentation
Bullying in social media presentationmitchell_shannon
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
Christine Hui Jun Zhong
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
CarlosE15
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
R Smith
 
Internet safety
Internet safetyInternet safety
Internet safety
Dan Tomlinson
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Doha qaradeh
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*Amber Dee
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigable
Khy Amigable
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
Mary Alice Osborne
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
josiebrookeday
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power pointmb29thom
 

What's hot (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
 
Bullying in social media presentation
Bullying in social media presentationBullying in social media presentation
Bullying in social media presentation
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigable
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power point
 

Similar to Cyberbullying presentation

Tech for teacher cyber
Tech for teacher cyberTech for teacher cyber
Tech for teacher cyber
kenyahill2
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
anarosaleda
 
Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By Anamika
Gisha Mathyari
 
Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1
remerosearcenal
 
Stephanie nichole ho
Stephanie nichole hoStephanie nichole ho
Stephanie nichole ho
Stephanie Nichole Ho
 
The Hazards Of Cyberbullying
The Hazards Of CyberbullyingThe Hazards Of Cyberbullying
The Hazards Of CyberbullyingIC
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Rommel Mergillano
 
Tackling Cyberbullying: Know the Tactics, Protect Yourself
Tackling Cyberbullying: Know the Tactics, Protect YourselfTackling Cyberbullying: Know the Tactics, Protect Yourself
Tackling Cyberbullying: Know the Tactics, Protect Yourself
Brian Markle
 
Cyber bullying arcenal and ayco (1)
Cyber bullying arcenal and ayco (1)Cyber bullying arcenal and ayco (1)
Cyber bullying arcenal and ayco (1)
triciaayco
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Jessica Jundef
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
Deborrah Escobar
 
Cyberbullying_Presentation.pptx.pdf
Cyberbullying_Presentation.pptx.pdfCyberbullying_Presentation.pptx.pdf
Cyberbullying_Presentation.pptx.pdf
Chrisochieng3
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Jemerie Dale Villarin
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptx
MaZolynairCawigan
 
FAQ's About Cyberbulling
FAQ's About CyberbullingFAQ's About Cyberbulling
FAQ's About Cyberbulling
alsebastino
 
Stephanie nichole ho
Stephanie nichole hoStephanie nichole ho
Stephanie nichole ho
Stephanie Nichole Ho
 

Similar to Cyberbullying presentation (20)

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Tech for teacher cyber
Tech for teacher cyberTech for teacher cyber
Tech for teacher cyber
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By Anamika
 
Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1
 
Stephanie nichole ho
Stephanie nichole hoStephanie nichole ho
Stephanie nichole ho
 
The Hazards Of Cyberbullying
The Hazards Of CyberbullyingThe Hazards Of Cyberbullying
The Hazards Of Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Tackling Cyberbullying: Know the Tactics, Protect Yourself
Tackling Cyberbullying: Know the Tactics, Protect YourselfTackling Cyberbullying: Know the Tactics, Protect Yourself
Tackling Cyberbullying: Know the Tactics, Protect Yourself
 
Cyber bullying arcenal and ayco (1)
Cyber bullying arcenal and ayco (1)Cyber bullying arcenal and ayco (1)
Cyber bullying arcenal and ayco (1)
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
 
Cyberbullying_Presentation.pptx.pdf
Cyberbullying_Presentation.pptx.pdfCyberbullying_Presentation.pptx.pdf
Cyberbullying_Presentation.pptx.pdf
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptx
 
FAQ's About Cyberbulling
FAQ's About CyberbullingFAQ's About Cyberbulling
FAQ's About Cyberbulling
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Stephanie nichole ho
Stephanie nichole hoStephanie nichole ho
Stephanie nichole ho
 
Cbp
CbpCbp
Cbp
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 

Recently uploaded

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 

Recently uploaded (20)

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 

Cyberbullying presentation

  • 2.
  • 3. What is cyberbullying? Cyberbullying is when a student use the internet, cell phones, or other technological devices to send or post text or images intended to hurt, embarrass, threaten, torment, humiliate, or intimidate their victim.
  • 4. Cyberbullyingcan take many forms: • Sending mean messages or threats to a person’s email account or cell phone • Spreading rumors online or through texts • Posting hurtful or threatening messages on social networking sites or web pages • Stealing a person’s account information to break into their account and send damaging messages
  • 5. • Pretending to be someone else online to hurt another person • Taking unflattering pictures of a person and spreading them through cell phones or the Internet • Sexting, or circulating sexually suggestive pictures or messages about a person
  • 6. two kinds of cyber-bullying •Direct attacks – messages sent directly to the victim •Cyber-bullying by proxy - Using someone else to cyber bully a victim, this proxy may know they are cyber bullying and they may not.
  • 7. Direct Attacks •Instant Messaging •Text Messaging •Blogs •Websites •Emailing Pictures •Stealing Passwords •Sending porn •Impersonation
  • 8. Cyber-bullying by proxy • Someone else does the dirty work for the main cyber bully. • Bullies may hack into the victim’s account or steal their password. They may set up a new account pretending to be the victim. • Friends get angry with the victim. • This form of cyber bullying is very dangerous because many people are involved, not just the bully and the victim.
  • 10.
  • 11. How does cyber bullying affect you ?
  • 12.
  • 13. How to stop cyber bullying !
  • 14. •Don’t respond. •Don’t retaliate. •Save the evidence. •Talk to a trusted adult. Be civil. •Don’t be a bully. •Be a friend, not a bystander.
  • 15.
  • 16.
  • 17. Sources • https://images.google.com/ • https://www.google.com.ph/ • http://www.gov.ph/2012/09/12/republic-act-no-10175/ • http://www.pacerteensagainstbullying.org/tab/experiencing-bullying/cyber-bullying/ • https://evsucielloigana.wordpress.com/anti-bullying/ • https://nobullying.com/the-effects-of-cyber-bullying/ • http://cyberbullying.org/2015-data • https://www.youtube.com/watch?v=0oGFh0mwrjM • http://www.stopcyberbullying.org/how_it_works/cyberbullying_by_proxy.html • http://www.stopcyberbullying.org/how_it_works/direct_attacks.html • http://www.safeteens.com/tips-to-stop-cyberbullying/