SlideShare a Scribd company logo
Cyberbullying
A Q U I C K I N F O R M A T I O N G U I D E A B O U T
What is cyberbullying?
Cyberbullying is bullying with the use of
digital technologies. It can take place on
social media, messaging platforms, gaming
platforms and mobile phones. It is repeated
behaviour, aimed at scaring, angering or
shaming those who are targeted.
spreading lies about or posting
embarrassing photos or videos of
someone on social media
sending hurtful, abusive or
threatening messages, images or
videos via messaging platforms
impersonating someone and
sending mean messages to others
on their behalf or through fake
accounts.
Some examples of cyberbullying
include:
What are the effects
of cyberbullying?
Mentally – feeling upset, embarrassed, stupid,
even afraid or angry
Emotionally – feeling ashamed or losing interest
in the things you love
Physically – tired (loss of sleep), or experiencing
symptoms like stomach aches and headaches
When bullying happens online it can feel as if you’re
being attacked everywhere, even inside your own
home. It can seem like there’s no escape. The effects
can last a long time and affect a person in many
ways:
Who should I talk to if someone
is bullying me online?
If you think you’re being bullied, the first step is to seek help from someone you trust such as your parents, a
close family member or another trusted adult.
In your school you can reach out to a counsellor, the sports coach or your favourite teacher – either online or
in person.
And if you are not comfortable talking to someone you know, search for a helpline in your country to talk to a
professional counsellor.
If the bullying is happening on a social platform, consider blocking the bully and formally reporting their
behaviour on the platform itself. Social media companies are obligated to keep their users safe.
Is there a
punishment for
cyberbullying?
People who are victims of any form of violence, including bullying and
cyberbullying, have a right to justice and to have the offender held
accountable.
Laws against bullying, particularly on cyberbullying, are relatively new
and still do not exist everywhere. This is why many countries rely on
other relevant laws, such as ones against harassment, to punish
cyberbullies.
In countries that have specific laws on cyberbullying, online behaviour
that deliberately causes serious emotional distress is seen as criminal
activity. In some of these countries, victims of cyberbullying can seek
protection, prohibit communication from a specified person and restrict
the use of electronic devices used by that person for cyberbullying,
temporarily or permanently.
Technology
companies don’t
seem to care
about online
bullying and
harassment. Are
they being held
responsible?
Technology companies are increasingly paying attention to
the issue of online bullying.


Many of them are introducing ways to address it and better
protect their users with new tools, guidance and ways to
report online abuse.


But it is true that more is needed. Many young people
experience cyberbullying every day. Some face extreme forms
of online abuse. Some have taken their own lives as a result.


Technology companies have a responsibility to protect their
users especially children and young people.


It is up to all of us to hold them accountable when they’re not
living up to these responsibilities.
Cyber-bullying is
poised to turn into the
biggest online concern,
already affecting up to
35% of all children.
Dr Martyn Wild
Thank you for your attention
Cyberbullying - Romania.pdf

More Related Content

Similar to Cyberbullying - Romania.pdf

What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
Karissa Joy Daculap
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
FrenzyPurisima
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Zekhaya Sithole
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and postervictoriahoo
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
SuphaphonP
 
Week7 assgn2suphaphonp
Week7 assgn2suphaphonpWeek7 assgn2suphaphonp
Week7 assgn2suphaphonp
JingboWang9
 
Week7assgn2KwanHoY
Week7assgn2KwanHoYWeek7assgn2KwanHoY
Week7assgn2KwanHoY
YipKwanHo
 
Cyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdfCyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdf
Rahil Foundation
 
E safety-course_2010
E safety-course_2010E safety-course_2010
E safety-course_2010
kevinbrace
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican Guard
Apostolos Syropoulos
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2
bigmike18
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
Karen Brooks
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
alanrgibson41217
 
Cyberbullying- Lacson, Espinosa.pdf
Cyberbullying- Lacson, Espinosa.pdfCyberbullying- Lacson, Espinosa.pdf
Cyberbullying- Lacson, Espinosa.pdf
YnigoXaviLacson
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Nuria Quiles
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
Yaman Singhania
 
Combatting Cyberbullying: Creating Safer Online Spaces for Youth.pdf
Combatting Cyberbullying: Creating Safer Online Spaces for Youth.pdfCombatting Cyberbullying: Creating Safer Online Spaces for Youth.pdf
Combatting Cyberbullying: Creating Safer Online Spaces for Youth.pdf
ssuser17115b
 
MIL Q1 M7.pptx
MIL Q1 M7.pptxMIL Q1 M7.pptx
MIL Q1 M7.pptx
SheilaBungalan1
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointshannonmf
 

Similar to Cyberbullying - Romania.pdf (20)

What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Week7 assgn2suphaphonp
Week7 assgn2suphaphonpWeek7 assgn2suphaphonp
Week7 assgn2suphaphonp
 
Week7assgn2KwanHoY
Week7assgn2KwanHoYWeek7assgn2KwanHoY
Week7assgn2KwanHoY
 
Cyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdfCyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdf
 
E safety-course_2010
E safety-course_2010E safety-course_2010
E safety-course_2010
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican Guard
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Cyberbullying- Lacson, Espinosa.pdf
Cyberbullying- Lacson, Espinosa.pdfCyberbullying- Lacson, Espinosa.pdf
Cyberbullying- Lacson, Espinosa.pdf
 
Edp 279 unit 2.4
Edp 279 unit 2.4Edp 279 unit 2.4
Edp 279 unit 2.4
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
 
Combatting Cyberbullying: Creating Safer Online Spaces for Youth.pdf
Combatting Cyberbullying: Creating Safer Online Spaces for Youth.pdfCombatting Cyberbullying: Creating Safer Online Spaces for Youth.pdf
Combatting Cyberbullying: Creating Safer Online Spaces for Youth.pdf
 
MIL Q1 M7.pptx
MIL Q1 M7.pptxMIL Q1 M7.pptx
MIL Q1 M7.pptx
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 

More from PavelVtek3

War Traumas - Erasmus+ Mind Your Mind Project.pptx
War Traumas - Erasmus+ Mind Your Mind Project.pptxWar Traumas - Erasmus+ Mind Your Mind Project.pptx
War Traumas - Erasmus+ Mind Your Mind Project.pptx
PavelVtek3
 
The Overuse of Antidepressants - Erasmus+ Mind Your Mind Project.pdf
The Overuse of Antidepressants - Erasmus+ Mind Your Mind Project.pdfThe Overuse of Antidepressants - Erasmus+ Mind Your Mind Project.pdf
The Overuse of Antidepressants - Erasmus+ Mind Your Mind Project.pdf
PavelVtek3
 
Psychologist? I am not fool - The Fear of Professional Mental Help - Erasmus+...
Psychologist? I am not fool - The Fear of Professional Mental Help - Erasmus+...Psychologist? I am not fool - The Fear of Professional Mental Help - Erasmus+...
Psychologist? I am not fool - The Fear of Professional Mental Help - Erasmus+...
PavelVtek3
 
Greek philosophy, stoicism and its use in psychology - Erasmus+ Mind Your Min...
Greek philosophy, stoicism and its use in psychology - Erasmus+ Mind Your Min...Greek philosophy, stoicism and its use in psychology - Erasmus+ Mind Your Min...
Greek philosophy, stoicism and its use in psychology - Erasmus+ Mind Your Min...
PavelVtek3
 
Mind Your Mind Erasmus+ - Art as a cure for depression.pdf
Mind Your Mind Erasmus+ - Art as a cure for depression.pdfMind Your Mind Erasmus+ - Art as a cure for depression.pdf
Mind Your Mind Erasmus+ - Art as a cure for depression.pdf
PavelVtek3
 
Fake News - Czech Workshop.pptx
Fake News - Czech Workshop.pptxFake News - Czech Workshop.pptx
Fake News - Czech Workshop.pptx
PavelVtek3
 
Cybergrooming - Spain.pptx
Cybergrooming - Spain.pptxCybergrooming - Spain.pptx
Cybergrooming - Spain.pptx
PavelVtek3
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
PavelVtek3
 
Artificial intelligence - Portugal.pptx
Artificial intelligence - Portugal.pptxArtificial intelligence - Portugal.pptx
Artificial intelligence - Portugal.pptx
PavelVtek3
 

More from PavelVtek3 (9)

War Traumas - Erasmus+ Mind Your Mind Project.pptx
War Traumas - Erasmus+ Mind Your Mind Project.pptxWar Traumas - Erasmus+ Mind Your Mind Project.pptx
War Traumas - Erasmus+ Mind Your Mind Project.pptx
 
The Overuse of Antidepressants - Erasmus+ Mind Your Mind Project.pdf
The Overuse of Antidepressants - Erasmus+ Mind Your Mind Project.pdfThe Overuse of Antidepressants - Erasmus+ Mind Your Mind Project.pdf
The Overuse of Antidepressants - Erasmus+ Mind Your Mind Project.pdf
 
Psychologist? I am not fool - The Fear of Professional Mental Help - Erasmus+...
Psychologist? I am not fool - The Fear of Professional Mental Help - Erasmus+...Psychologist? I am not fool - The Fear of Professional Mental Help - Erasmus+...
Psychologist? I am not fool - The Fear of Professional Mental Help - Erasmus+...
 
Greek philosophy, stoicism and its use in psychology - Erasmus+ Mind Your Min...
Greek philosophy, stoicism and its use in psychology - Erasmus+ Mind Your Min...Greek philosophy, stoicism and its use in psychology - Erasmus+ Mind Your Min...
Greek philosophy, stoicism and its use in psychology - Erasmus+ Mind Your Min...
 
Mind Your Mind Erasmus+ - Art as a cure for depression.pdf
Mind Your Mind Erasmus+ - Art as a cure for depression.pdfMind Your Mind Erasmus+ - Art as a cure for depression.pdf
Mind Your Mind Erasmus+ - Art as a cure for depression.pdf
 
Fake News - Czech Workshop.pptx
Fake News - Czech Workshop.pptxFake News - Czech Workshop.pptx
Fake News - Czech Workshop.pptx
 
Cybergrooming - Spain.pptx
Cybergrooming - Spain.pptxCybergrooming - Spain.pptx
Cybergrooming - Spain.pptx
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Artificial intelligence - Portugal.pptx
Artificial intelligence - Portugal.pptxArtificial intelligence - Portugal.pptx
Artificial intelligence - Portugal.pptx
 

Recently uploaded

20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 

Recently uploaded (20)

20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 

Cyberbullying - Romania.pdf

  • 1. Cyberbullying A Q U I C K I N F O R M A T I O N G U I D E A B O U T
  • 2. What is cyberbullying? Cyberbullying is bullying with the use of digital technologies. It can take place on social media, messaging platforms, gaming platforms and mobile phones. It is repeated behaviour, aimed at scaring, angering or shaming those who are targeted.
  • 3. spreading lies about or posting embarrassing photos or videos of someone on social media sending hurtful, abusive or threatening messages, images or videos via messaging platforms impersonating someone and sending mean messages to others on their behalf or through fake accounts. Some examples of cyberbullying include:
  • 4. What are the effects of cyberbullying? Mentally – feeling upset, embarrassed, stupid, even afraid or angry Emotionally – feeling ashamed or losing interest in the things you love Physically – tired (loss of sleep), or experiencing symptoms like stomach aches and headaches When bullying happens online it can feel as if you’re being attacked everywhere, even inside your own home. It can seem like there’s no escape. The effects can last a long time and affect a person in many ways:
  • 5. Who should I talk to if someone is bullying me online? If you think you’re being bullied, the first step is to seek help from someone you trust such as your parents, a close family member or another trusted adult. In your school you can reach out to a counsellor, the sports coach or your favourite teacher – either online or in person. And if you are not comfortable talking to someone you know, search for a helpline in your country to talk to a professional counsellor. If the bullying is happening on a social platform, consider blocking the bully and formally reporting their behaviour on the platform itself. Social media companies are obligated to keep their users safe.
  • 6. Is there a punishment for cyberbullying? People who are victims of any form of violence, including bullying and cyberbullying, have a right to justice and to have the offender held accountable. Laws against bullying, particularly on cyberbullying, are relatively new and still do not exist everywhere. This is why many countries rely on other relevant laws, such as ones against harassment, to punish cyberbullies. In countries that have specific laws on cyberbullying, online behaviour that deliberately causes serious emotional distress is seen as criminal activity. In some of these countries, victims of cyberbullying can seek protection, prohibit communication from a specified person and restrict the use of electronic devices used by that person for cyberbullying, temporarily or permanently.
  • 7. Technology companies don’t seem to care about online bullying and harassment. Are they being held responsible? Technology companies are increasingly paying attention to the issue of online bullying. Many of them are introducing ways to address it and better protect their users with new tools, guidance and ways to report online abuse. But it is true that more is needed. Many young people experience cyberbullying every day. Some face extreme forms of online abuse. Some have taken their own lives as a result. Technology companies have a responsibility to protect their users especially children and young people. It is up to all of us to hold them accountable when they’re not living up to these responsibilities.
  • 8. Cyber-bullying is poised to turn into the biggest online concern, already affecting up to 35% of all children. Dr Martyn Wild
  • 9.
  • 10.
  • 11. Thank you for your attention