Public Speaking
Topic : Cyberbullying
Subject: English
I use this powerpoint as visual to my public speaking. Feel free to leave your comments :) Thank you
ERHS
G10 ZIRCON
16'-17'
Powerpoint 2016
Public Speaking
Topic : Cyberbullying
Subject: English
I use this powerpoint as visual to my public speaking. Feel free to leave your comments :) Thank you
ERHS
G10 ZIRCON
16'-17'
Powerpoint 2016
Do you know every year around 750 Australian teens between the ages of 13 and 17 commit suicide because of cyber bullying? It’s a statistic sure to concern any parent. The best way to address cyberbullying is to stop it before it starts. This presentation provides valuable legal tips on how to stop cyberbullying.
At Owen Hodge Lawyers we understand that experiences relating to cyberbullying are extremely traumatic. The personal information shared and the hateful content and rumours spread often leaves people in untter despair and hopelessness. We are here to help! If you have any questions in relation to cyberbullying, please feel free to contact our team at Owen Hodge Lawyers on 1800 770 780.
Presented by senior researchers from the UTS Health Psychology Unit, this lecture unravels the facts about cyber bullying. It debunks media stereotypes of perpetrators and victims, lays bare its costs to individuals and communities and offers practical pathways for solutions and healing.
This presentation is intended for parents. It has eye opening information that will help you become aware of the danger of cyber bullying and will give you tips on how to protect your children.
Anti-bullying act of 2013, Philippines
Child Protection Committee
Defining Bullying
Protocol of Bullying Action
Some Important Points
Recommendation Action Plan for the School
Roles of the authorities
Do you know every year around 750 Australian teens between the ages of 13 and 17 commit suicide because of cyber bullying? It’s a statistic sure to concern any parent. The best way to address cyberbullying is to stop it before it starts. This presentation provides valuable legal tips on how to stop cyberbullying.
At Owen Hodge Lawyers we understand that experiences relating to cyberbullying are extremely traumatic. The personal information shared and the hateful content and rumours spread often leaves people in untter despair and hopelessness. We are here to help! If you have any questions in relation to cyberbullying, please feel free to contact our team at Owen Hodge Lawyers on 1800 770 780.
Presented by senior researchers from the UTS Health Psychology Unit, this lecture unravels the facts about cyber bullying. It debunks media stereotypes of perpetrators and victims, lays bare its costs to individuals and communities and offers practical pathways for solutions and healing.
This presentation is intended for parents. It has eye opening information that will help you become aware of the danger of cyber bullying and will give you tips on how to protect your children.
Anti-bullying act of 2013, Philippines
Child Protection Committee
Defining Bullying
Protocol of Bullying Action
Some Important Points
Recommendation Action Plan for the School
Roles of the authorities
Amanda Lenhart delivered this presentation to the Year of the Child summit at the National Association of Attorneys General Year of the Child Conference, Philadelphia, PA, this talk surveys the current research on cyberbullying and online harassment, pulling in Pew Internet data as well as the work of the Crimes Against Children Research Center at the University of New Hampshire, Internet Solutions for Kids and other academics and scholars researching this topic. 5/13/09
Context: this presentation comprises slides used in an assembly presentation first delivered in February 2015. The target audience was Year 9 (aged 13 and 14) but may well be used with other teenage audiences. I do not show the first slide included here; I start with the first image as the audience settles. I ask if anyone spots something unusual about it, and when the horns in the shadow are noted, I say that this will make sense later.
The first section refers back to another assembly which I have delivered to many of the same students in Year 7 (aged 11 and 12) (http://www.slideshare.net/jamespenstone/digital-footprints-presentation). The early slides (safebook) are therefore a recap of common-sense advice about maintaining a positive online presence. I make it clear that social networks come and go with popularity /usage (the implied Facebook in the infographic may well not be one they use regularly).
Then the scene is set to talk specifically about issues of cyberbullying, a separate but connected strand of digital citizenship education. Speech bubbles imply discussion time for the audience (share with someone next to you), followed by volunteered answers. There is one thought bubble for individual reflection of 30 seconds or so.
Note: many videos which have been created on the topic of cyberbullying (including the ones used here) reference suicide as a potential outcome. I think it is important to give some context that this tragic outcome is actually rare and certainly not inevitable. It is important to address as a potential outcome, but there are many other outcomes which I think an audience should give a lot of consideration to especially as some of these are, by contrast, inevitable. So I do not dwell on the endings of some of the youtube clips shared here.
The most powerful video is the animated poem by Shane Koyzcan. Before playing, I emphasise that Shane uses the metaphor of ‘troll’ for cyberbullies, as opposed to the related but sometimes different use of the word online. It is worth allowing a few moments of quiet reflection immediately after it has played. I choose to draw out that (a) it is useful to hear the passion/anger/frustration of someone who has received bullying, as it makes us recognise the possible impact much more and (b) that no one person is actually the portrayed troll themselves but that their actions (intentional or otherwise) might take on the powerful metaphor. Hence the follow up question (which without this context seems a bit ambiguous). One of the best answers seems to me to be to empathise, referring back to earlier discussion on why it happens (one reason being that a bully is removed from the victim and can not see their impact).
After some appropriate responses, the presentation ends with a positive statistic from the recent survey in Canadian schools (and one which contradicts the 90% statistic). I think this is a useful way to end, as well as referring back to the choices we
In the UK, a reported 22% of children and young people claim to have been the target of cyberbullying making this one of the most important new areas of behavior to understand and to equip schools, carers and young people with the ability to respond.
In 2007, Childnet was commissioned by the Department for Children, Schools and Families to produce advice and guidance for schools on preventing and responding to cyberbullying. Lead by Will Gardner and Josie Fraser, Childnet worked in close consultation with a wide range of sectors including children and young people, schools, industry, law enforcement, professional bodies, parent groups and child welfare organisations.
I created this slide show for Middle and High school students to help educate them about cyberbullying and how it can start out so innocently, and become so very hurtful. I hope you will be able to use parts or all of this presentation with your students.
Cyber Bullying is when a child is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child using the Internet, interactive and digital technologies or cell phones. This presentation shows signs and ways to prevent cyber bullying
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Large Language Model (LLM) and it’s Geospatial Applications
CYBERBULLYING
1. Philippine Normal University College of Arts and Sciences
Taft Avenue, Manila SY 2010-2011
CYBERBULLYING
Olweus (1993)
“A person is bullied when he or she is exposed, repeatedly and over time, to
negative actions on the part of one or more other persons, and he or she has
difficulty defending himself or herself."
This definition includes three important
components:
1. Bullying is aggressive behavior
that involves unwanted, negative
actions.
2. Bullying involves a pattern of
behavior repeated over time
3. Bullying involves an imbalance of
power or strength.”
Bullying
• Physical
• Relational/Verbal
• Internet
Online Harassment & Cyberbullying
• Online harassment: aggressive
behavior, “harm doing,” insults,
denigration, impersonation,
exclusion, outing, activities
associated with hacking –
stealing information, breaking
into accounts, damaging
websites, profiles etc. (Willard,
2006)
• Cyberbullying: online harassment that is
– repeated over time
Reynante S. Tagum
1
2. – Involves a power imbalance between a perpetrator and a victim. Power
imbalance may be differences in online skills.
• Other complicating factor -- perpetrators are also often victims, sometimes
online, sometimes elsewhere. Internet bullying can be particularly hard to
disentangle. (Willard, 2006)
What makes online harassment & bullying different?
• Technology is vehicle
• Persistence of content
– Editable, alterable
• Distributability of content
– Speed
– Breadth
• Dis-inhibition over computer-
mediated communication
• Invasive
Cyberbullying "involves the use of information and communication technologies to
support deliberate, repeated, and hostile behavior by an individual or group, that is
intended to harm others. -Bill Belsey"
Cyberbullying is being cruel to others by sending or posting harmful material or
engaging in other forms of social aggression using the internet or other digital
technologies. Cyberbullying can take
different forms:
• Flaming. Online fights using
electronic messages with
angry and vulgar language.
Joe and Alec’s online
exchange got angrier
and angrier. Insults were
flying. Joe warned Alec
to watch his back in
school the next day.
• Harassment. Repeatedly
sending nasty, mean, and insulting messages.
Reynante S. Tagum
2
3. Sara reported to the principal that Kayla was bullying another student.
When Sara got home, she had 35 angry messages in her e-mail box. The
anonymous cruel messages kept coming—some from complete
strangers.
• Denigration. “Dissing” someone online. Sending or posting gossip or rumors
about a person to damage his or her reputation or friendships.
Some boys created a “We Hate Joe” Web site where they posted jokes,
cartoons, gossip, and rumors, all dissing Joe.
• Impersonation. Pretending to be someone else and sending or posting
material to get that person in trouble or danger or to damage that person’s
reputation or friendships.
Laura watched closely as Emma logged on to her account and discovered
her password. Later, Laura logged on to Emma’s account and sent a
hurtful message to Emma’s boyfriend, Adam.
• Outing. Sharing someone’s secrets or embarrassing information or images
online.
Greg, an obese high school student, was changing in the locker room
after gym class. Matt took a picture of him with his cell phone camera.
Within seconds, the picture was flying around the phones at school.
• Trickery. Talking someone into revealing secrets or embarrassing
information, then sharing it online.
Katie sent a message to Jessica pretending to be her friend and asking
lots of questions. Jessica responded, sharing really personal information.
Katie forwarded the message to lots of other people with her own
comment, “Jessica is a loser.”
• Exclusion. Intentionally and cruelly excluding someone from an online group.
Millie tries hard to fit in with a group of girls at school. She recently got on
the “outs” with a leader in this group. Now Millie has been blocked from
the friendship links of all of the girls.
• Cyberstalking. Repeated, intense harassment and denigration that includes
threats or creates significant fear.
When Annie broke up with Sam, he sent her many angry, threatening,
pleading messages. He spread nasty rumors about her to her friends and
Reynante S. Tagum
3
4. posted a sexually suggestive picture she had given him in a sex-oriented
discussion group, along with her e-mail address and cell phone number.
Impact of Cyberbullying
It is widely known that face-to-face bullying can result in long-term psychological harm
to targets. This harm includes low self-esteem, depression, anger, school failure and
avoidance, and, in some cases, school violence or suicide. It is possible that the harm
caused by cyberbullying may be greater than harm caused by traditional bullying
because . . .
• Online communications can
be extremely vicious.
• There is no escape for those
who are being cyberbullied—
victimization is ongoing, 24/7.
• Cyberbullying material can
be distributed worldwide and
is often irretrievable.
• Cyberbullies can be
anonymous and can solicit
the involvement of unknown
“friends.”
• Teens may be reluctant to
tell adults what is happening
online or through their cell phones because they are emotionally traumatized,
think it is their fault, fear greater retribution, or fear online activities or cell
phone use will be restricted.
A group of girls at Alan’s school had been taunting him through instant
messaging, teasing him about his small size, daring him to do things he
couldn’t do, suggesting that the world would be a better place if he
committed suicide. One day, he shot himself. His last online message was
“Sometimes the only way to get the respect you deserve is to die.” This is
also a true story.
PREVENTING CYBERBULLYING
There are several important things that
you can to do to avoid being a target
of cyberbullying:
• Protect yourself. Never provide
any information or images in
electronic form that could be used
against you.
Reynante S. Tagum
4
5. • Examine how you are communicating. If you find that people are frequently
attacking you, look closely at how you are communicating with them. You might be
communicating in a way that is irritating others or hurting their feelings.
• Find some new friends. If you are trying to fit into a group of people who are
treating you badly, it might be easier to simply find some nicer friends. Life’s too
short to waste time trying to be friends with mean people.
Discipline and Legal Issues
An article entitled, “Senate bill
seeks to stop bullying in schools”
written by Kimberly Jane T. Tan of
GMA news said that Senator Miriam
Defensor-Santiago submitted Senate
Bill No. 2677. The bill mandates all
schools, whether public or private,
including colleges and universities, to
craft policies that will address the
problem of bullying in their respective
institutions.
“Sen. Antonio Trillanes IV and
Cong. Rodel Batocabe have come up
with their respective Anti-bullying bills in a bid to break this vicious cycle and create a
school environment that is truly child-friendly”, as said in the article “School Bullies,
Beware!: Anti-Bullying Bills to the Rescue” in the Manila Bulletin.
Batocabe’s House Bill 2361 or the Anti-Bullying Act criminalizes bullying and
cyberbullying, and penalizes bullies who are minor (below 18) and their parents.
Trillanes’ Anti-bullying Act (SBN 413), on the other hand, requires school districts
to adopt policies prohibiting harassment, intimidation and bullying.
What We Can Do1
De La Salle University
Psychology professor Anton Simon
Palo says the solution to bullying
should be a preventive policy, not a
reactive one. This, he adds, is best
achieved not just in school but in the
community level.
Marlon Era, a sociologist and
professor at DLSU, states that children
Reynante S. Tagum
5
6. who resort to bullying may be seeking recognition in some other way. They may also
have the wrong role models at home.
“All the basic things in life we learn that from the family, from the parents. Even if
good laws are implemented on this issue, if the family orientation is bad, you still cannot
address the program. We are developing the country’s future leaders here so it is
important to teach the right values to our children. We should teach them that its better
to be friendly and caring so they would gain more friends,” Era stresses.
For Palo, the best solution is to
empower the students to have a
unified effort to stop the bullies; to
teach proper counseling techniques to
teachers and guidance counselors; to
involve the parents in the treatment of
the child; and to set up community
psychosocial centers that play an
active role in educating people and
children on bullying.
Submitted to:
PROF. SYLVIA T. CABERIO
Counseling Theories and Practice 1
Submitted by:
MR. REYNANTE S.TAGUM
M.A. in Education Major in Guidance and Counseling
1
Really, What Constitutes Bullying? by Rachel C. Barawid, November 10, 2010
Reynante S. Tagum
6
7. http://mb.com.ph/articles/286812/really-what-constitutes-bullying
Reference
Online Articles
A new menace: cyberbullying
http://opinion.inquirer.net/inquireropinion/columns/view/20100716-281552/A-new-menace-
cyberbullying
Cyber bully victims hit with depression—survey
http://newsinfo.inquirer.net/breakingnews/infotech/view/20100922-293654/Cyber-bully-victims-
hit-with-depressionsurvey
Cyber Parenting (How it could work)
http://www.mb.com.ph/articles/235379/cyber-parenting-how-it-could-work
Gay student in alleged webcam bullying commits suicide
http://newsinfo.inquirer.net/breakingnews/infotech/view/20101001-295328/Gay-student-in-
alleged-webcam-bullying-commits-suicide
Have you been a victim of cyber-harassment?
http://showbizandstyle.inquirer.net/you/2bu/view/20091016-230461/Have-you-been-a-victim-of-
cyber-harassment
Heart in cyberspace
http://opinion.inquirer.net/inquireropinion/columns/view/20080619-143480/Heart-in-cyberspace
In Cyber Bullying, Depression Hits Victims Hardest
http://www.depnet.ph/uni0/news/newsitem/3381/default.aspx
Parents still crucial vs. online risks
http://newsinfo.inquirer.net/breakingnews/infotech/view/20090602-208452/Parents-still-crucial-
vs-online-risks
Research on cyber bullying, technical issues expose dangers
http://www.manilatimes.net/national/2008/aug/17/yehey/top_stories/20080817top4.html
S. Korea's Cyworld touts privacy in battle with Facebook
http://newsinfo.inquirer.net/breakingnews/world/view/20101216-309307/SKoreas-Cyworld-
touts-privacy-in-battle-with-Facebook
School Bullies, Beware!: Anti-Bullying Bills to the Rescue
http://mb.com.ph/articles/286811/school-bullies-beware-antibullying-bills-rescue
Senate bill seeks to stop bullying in schools
Reynante S. Tagum
7