SlideShare a Scribd company logo
Philippine Normal University                          College of Arts and Sciences
Taft Avenue, Manila                                                  SY 2010-2011



                                     CYBERBULLYING


Olweus (1993)
  “A person is bullied when he or she is exposed, repeatedly and over time, to
  negative actions on the part of one or more other persons, and he or she has
  difficulty defending himself or herself."


This definition includes three important
components:
   1. Bullying is aggressive behavior
      that involves unwanted, negative
      actions.
   2. Bullying involves a pattern of
      behavior repeated over time
   3. Bullying involves an imbalance of
      power or strength.”

Bullying
   • Physical
   • Relational/Verbal
   • Internet



Online Harassment & Cyberbullying

     •     Online harassment: aggressive
           behavior, “harm doing,” insults,
           denigration,       impersonation,
           exclusion,   outing,    activities
           associated with hacking –
           stealing information, breaking
           into     accounts,     damaging
           websites, profiles etc. (Willard,
           2006)

     •     Cyberbullying: online harassment that is
              – repeated over time


Reynante S. Tagum
                                                                                 1
–   Involves a power imbalance between a perpetrator and a victim. Power
                        imbalance may be differences in online skills.

     •     Other complicating factor -- perpetrators are also often victims, sometimes
           online, sometimes elsewhere. Internet bullying can be particularly hard to
           disentangle. (Willard, 2006)

What makes online harassment & bullying different?

     •     Technology is vehicle
     •     Persistence of content
              – Editable, alterable
     •     Distributability of content
              – Speed
              – Breadth
     •     Dis-inhibition over computer-
           mediated communication
     •     Invasive




    Cyberbullying "involves the use of information and communication technologies to
    support deliberate, repeated, and hostile behavior by an individual or group, that is
    intended to harm others. -Bill Belsey"

Cyberbullying is being cruel to others by sending or posting harmful material or
engaging in other forms of social aggression using the internet or other digital
technologies. Cyberbullying can take
different forms:

           •    Flaming. Online fights using
               electronic messages with
               angry and vulgar language.

                        Joe and Alec’s online
                        exchange got angrier
                        and angrier. Insults were
                        flying. Joe warned Alec
                        to watch his back in
                        school the next day.

           •    Harassment.     Repeatedly
               sending nasty, mean, and insulting messages.




Reynante S. Tagum
                                                                                            2
Sara reported to the principal that Kayla was bullying another student.
                       When Sara got home, she had 35 angry messages in her e-mail box. The
                       anonymous cruel messages kept coming—some from complete
                       strangers.

           •    Denigration. “Dissing” someone online. Sending or posting gossip or rumors
               about a person to damage his or her reputation or friendships.

                       Some boys created a “We Hate Joe” Web site where they posted jokes,
                       cartoons, gossip, and rumors, all dissing Joe.

           •    Impersonation. Pretending to be someone else and sending or posting
               material to get that person in trouble or danger or to damage that person’s
               reputation or friendships.

                       Laura watched closely as Emma logged on to her account and discovered
                       her password. Later, Laura logged on to Emma’s account and sent a
                       hurtful message to Emma’s boyfriend, Adam.

           •    Outing. Sharing someone’s secrets or embarrassing information or images
               online.

                       Greg, an obese high school student, was changing in the locker room
                       after gym class. Matt took a picture of him with his cell phone camera.
                       Within seconds, the picture was flying around the phones at school.

           •     Trickery. Talking someone into              revealing   secrets   or   embarrassing
               information, then sharing it online.

                       Katie sent a message to Jessica pretending to be her friend and asking
                       lots of questions. Jessica responded, sharing really personal information.
                       Katie forwarded the message to lots of other people with her own
                       comment, “Jessica is a loser.”

           •        Exclusion. Intentionally and cruelly excluding someone from an online group.

                       Millie tries hard to fit in with a group of girls at school. She recently got on
                       the “outs” with a leader in this group. Now Millie has been blocked from
                       the friendship links of all of the girls.

           •     Cyberstalking. Repeated, intense harassment and denigration that includes
               threats or creates significant fear.

                       When Annie broke up with Sam, he sent her many angry, threatening,
                       pleading messages. He spread nasty rumors about her to her friends and



Reynante S. Tagum
                                                                                                      3
posted a sexually suggestive picture she had given him in a sex-oriented
                    discussion group, along with her e-mail address and cell phone number.

Impact of Cyberbullying

It is widely known that face-to-face bullying can result in long-term psychological harm
to targets. This harm includes low self-esteem, depression, anger, school failure and
avoidance, and, in some cases, school violence or suicide. It is possible that the harm
caused by cyberbullying may be greater than harm caused by traditional bullying
because . . .
        • Online communications can
          be extremely vicious.
        • There is no escape for those
          who are being cyberbullied—
          victimization is ongoing, 24/7.
        • Cyberbullying material can
          be distributed worldwide and
          is often irretrievable.
        • Cyberbullies         can      be
          anonymous and can solicit
          the involvement of unknown
          “friends.”
        • Teens may be reluctant to
          tell adults what is happening
          online or through their cell phones because they are emotionally traumatized,
          think it is their fault, fear greater retribution, or fear online activities or cell
          phone use will be restricted.

                    A group of girls at Alan’s school had been taunting him through instant
                    messaging, teasing him about his small size, daring him to do things he
                    couldn’t do, suggesting that the world would be a better place if he
                    committed suicide. One day, he shot himself. His last online message was
                    “Sometimes the only way to get the respect you deserve is to die.” This is
                    also a true story.


PREVENTING CYBERBULLYING

There are several important things that
you can to do to avoid being a target
of cyberbullying:
  • Protect yourself. Never provide
    any information or images in
    electronic form that could be used
    against you.



Reynante S. Tagum
                                                                                             4
•  Examine how you are communicating. If you find that people are frequently
    attacking you, look closely at how you are communicating with them. You might be
    communicating in a way that is irritating others or hurting their feelings.
   • Find some new friends. If you are trying to fit into a group of people who are
    treating you badly, it might be easier to simply find some nicer friends. Life’s too
    short to waste time trying to be friends with mean people.


Discipline and Legal Issues

        An article entitled, “Senate bill
seeks to stop bullying in schools”
written by Kimberly Jane T. Tan of
GMA news said that Senator Miriam
Defensor-Santiago submitted Senate
Bill No. 2677. The bill mandates all
schools, whether public or private,
including colleges and universities, to
craft policies that will address the
problem of bullying in their respective
institutions.

       “Sen. Antonio Trillanes IV and
Cong. Rodel Batocabe have come up
with their respective Anti-bullying bills in a bid to break this vicious cycle and create a
school environment that is truly child-friendly”, as said in the article “School Bullies,
Beware!: Anti-Bullying Bills to the Rescue” in the Manila Bulletin.
       Batocabe’s House Bill 2361 or the Anti-Bullying Act criminalizes bullying and
cyberbullying, and penalizes bullies who are minor (below 18) and their parents.
       Trillanes’ Anti-bullying Act (SBN 413), on the other hand, requires school districts
to adopt policies prohibiting harassment, intimidation and bullying.


What We Can Do1

       De    La     Salle   University
Psychology professor Anton Simon
Palo says the solution to bullying
should be a preventive policy, not a
reactive one. This, he adds, is best
achieved not just in school but in the
community level.

      Marlon Era, a sociologist and
professor at DLSU, states that children




Reynante S. Tagum
                                                                                         5
who resort to bullying may be seeking recognition in some other way. They may also
have the wrong role models at home.

        “All the basic things in life we learn that from the family, from the parents. Even if
good laws are implemented on this issue, if the family orientation is bad, you still cannot
address the program. We are developing the country’s future leaders here so it is
important to teach the right values to our children. We should teach them that its better
to be friendly and caring so they would gain more friends,” Era stresses.

       For Palo, the best solution is to
empower the students to have a
unified effort to stop the bullies; to
teach proper counseling techniques to
teachers and guidance counselors; to
involve the parents in the treatment of
the child; and to set up community
psychosocial centers that play an
active role in educating people and
children on bullying.




Submitted to:
PROF. SYLVIA T. CABERIO
Counseling Theories and Practice 1



Submitted by:
MR. REYNANTE S.TAGUM
M.A. in Education Major in Guidance and Counseling




1
    Really, What Constitutes Bullying? by Rachel C. Barawid, November 10, 2010



Reynante S. Tagum
                                                                                            6
http://mb.com.ph/articles/286812/really-what-constitutes-bullying
Reference


Online Articles

A new menace: cyberbullying
http://opinion.inquirer.net/inquireropinion/columns/view/20100716-281552/A-new-menace-
cyberbullying

Cyber bully victims hit with depression—survey
http://newsinfo.inquirer.net/breakingnews/infotech/view/20100922-293654/Cyber-bully-victims-
hit-with-depressionsurvey

Cyber Parenting (How it could work)
http://www.mb.com.ph/articles/235379/cyber-parenting-how-it-could-work

Gay student in alleged webcam bullying commits suicide
http://newsinfo.inquirer.net/breakingnews/infotech/view/20101001-295328/Gay-student-in-
alleged-webcam-bullying-commits-suicide

Have you been a victim of cyber-harassment?
http://showbizandstyle.inquirer.net/you/2bu/view/20091016-230461/Have-you-been-a-victim-of-
cyber-harassment

Heart in cyberspace
http://opinion.inquirer.net/inquireropinion/columns/view/20080619-143480/Heart-in-cyberspace

In Cyber Bullying, Depression Hits Victims Hardest
http://www.depnet.ph/uni0/news/newsitem/3381/default.aspx

Parents still crucial vs. online risks
http://newsinfo.inquirer.net/breakingnews/infotech/view/20090602-208452/Parents-still-crucial-
vs-online-risks

Research on cyber bullying, technical issues expose dangers
http://www.manilatimes.net/national/2008/aug/17/yehey/top_stories/20080817top4.html

S. Korea's Cyworld touts privacy in battle with Facebook
http://newsinfo.inquirer.net/breakingnews/world/view/20101216-309307/SKoreas-Cyworld-
touts-privacy-in-battle-with-Facebook

School Bullies, Beware!: Anti-Bullying Bills to the Rescue
http://mb.com.ph/articles/286811/school-bullies-beware-antibullying-bills-rescue


Senate bill seeks to stop bullying in schools


Reynante S. Tagum
                                                                                             7
http://www.gmanews.tv/story/213952/senate-bill-seeks-to-stop-bullying-in-schools#

The Facebook Generation
http://showbizandstyle.inquirer.net/sim/sim/view/20101113-303030/The-Facebook-Generation

Tougher law vs cyber bullying pushed
http://www.journal.com.ph/index.php/national/20804-tougher-law-vs-cyber-bullying-
pushed.html



PDF File

Educator’s Guide to Cyberbullying and Cyberthreats by Nancy Williard, 2007



PowerPoint File

Bullying, Cyberbullying, Murder and Bullycide by Rick Shaw
www.awareity.com

Cyberbullying by Adrienne DeWolfe

Cyberbullying: What the research is telling us…
Amanda Lenhart
Pew Internet & American Life Project
http://www.pewinternet.org

Tech etiquette
www.SmallTalkBigResults.com




Reynante S. Tagum
                                                                                           8

More Related Content

What's hot

Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
Christine Hui Jun Zhong
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
CoachElrod
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Andreareyeshdz
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
CarlosE15
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Veronica Alejandro
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
griehl
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Quirky Kid
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying PresentationCourtney Cole
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parents
damarissepulveda
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
jessy0121
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingckeeling
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
HDCH
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Marian Merritt
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
Karissa Joy Daculap
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Zarmeen Durrani
 
Anti-bullying act of 2013, Philippines
Anti-bullying act of 2013, Philippines Anti-bullying act of 2013, Philippines
Anti-bullying act of 2013, Philippines
Paula Marie Llido
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
kscheidy
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power pointmb29thom
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 

What's hot (20)

Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parents
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Anti-bullying act of 2013, Philippines
Anti-bullying act of 2013, Philippines Anti-bullying act of 2013, Philippines
Anti-bullying act of 2013, Philippines
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power point
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 

Viewers also liked

Bullying thesis
Bullying thesisBullying thesis
Bullying thesisnone
 
J.c. van leeuwen 2012 - literature review on cyberbullying definitions
J.c. van leeuwen   2012 - literature review on cyberbullying definitions J.c. van leeuwen   2012 - literature review on cyberbullying definitions
J.c. van leeuwen 2012 - literature review on cyberbullying definitions
Rico Leeuwen
 
Research thesis (effects of bullying)
Research thesis (effects of bullying)Research thesis (effects of bullying)
Research thesis (effects of bullying)frncsm13
 
Research Study about Bullying
Research Study about BullyingResearch Study about Bullying
Research Study about Bullying
Darlene Enderez
 
Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…
Pew Research Center's Internet & American Life Project
 
The impact of bullying in adolescents on school
The impact of bullying in adolescents on schoolThe impact of bullying in adolescents on school
The impact of bullying in adolescents on schoolDenni Domingo
 
Understanding Cyberbullying
Understanding CyberbullyingUnderstanding Cyberbullying
Understanding Cyberbullying
James Penstone
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
John_Gowland
 
Physical security analysis tool
Physical security analysis toolPhysical security analysis tool
Physical security analysis tool
Jere Peltonen
 
Cyberbullying Presentation 2008
Cyberbullying Presentation 2008Cyberbullying Presentation 2008
Cyberbullying Presentation 2008
Josie Fraser
 
Cyber Bullying Questionnaire Results
Cyber Bullying Questionnaire ResultsCyber Bullying Questionnaire Results
Cyber Bullying Questionnaire Resultsa2columnd12
 
Gatorade Brand Vision Presenation
Gatorade Brand Vision PresenationGatorade Brand Vision Presenation
Gatorade Brand Vision Presenation
brianabrochu
 
Disaster management and role of nurse
Disaster management and role of nurseDisaster management and role of nurse
Disaster management and role of nurse
AIIMS, Rishikesh
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
Mary Alice Osborne
 
CONCEPTUAL FRAMEWORK
CONCEPTUAL FRAMEWORKCONCEPTUAL FRAMEWORK
CONCEPTUAL FRAMEWORK
lendiibanez22
 
Chapter 2-Realated literature and Studies
Chapter 2-Realated literature and StudiesChapter 2-Realated literature and Studies
Chapter 2-Realated literature and Studies
Mercy Daracan
 

Viewers also liked (20)

Bullying thesis
Bullying thesisBullying thesis
Bullying thesis
 
J.c. van leeuwen 2012 - literature review on cyberbullying definitions
J.c. van leeuwen   2012 - literature review on cyberbullying definitions J.c. van leeuwen   2012 - literature review on cyberbullying definitions
J.c. van leeuwen 2012 - literature review on cyberbullying definitions
 
Research thesis (effects of bullying)
Research thesis (effects of bullying)Research thesis (effects of bullying)
Research thesis (effects of bullying)
 
Research Study about Bullying
Research Study about BullyingResearch Study about Bullying
Research Study about Bullying
 
Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…
 
The impact of bullying in adolescents on school
The impact of bullying in adolescents on schoolThe impact of bullying in adolescents on school
The impact of bullying in adolescents on school
 
My thesis proposal
My thesis proposalMy thesis proposal
My thesis proposal
 
Understanding Cyberbullying
Understanding CyberbullyingUnderstanding Cyberbullying
Understanding Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Physical security analysis tool
Physical security analysis toolPhysical security analysis tool
Physical security analysis tool
 
Cyberbullying Presentation 2008
Cyberbullying Presentation 2008Cyberbullying Presentation 2008
Cyberbullying Presentation 2008
 
Kes buli
Kes buliKes buli
Kes buli
 
Cyber Bullying Questionnaire Results
Cyber Bullying Questionnaire ResultsCyber Bullying Questionnaire Results
Cyber Bullying Questionnaire Results
 
Gatorade Brand Vision Presenation
Gatorade Brand Vision PresenationGatorade Brand Vision Presenation
Gatorade Brand Vision Presenation
 
Disaster management and role of nurse
Disaster management and role of nurseDisaster management and role of nurse
Disaster management and role of nurse
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Bullying research in filipino
Bullying research in filipinoBullying research in filipino
Bullying research in filipino
 
CONCEPTUAL FRAMEWORK
CONCEPTUAL FRAMEWORKCONCEPTUAL FRAMEWORK
CONCEPTUAL FRAMEWORK
 
Chapter 2-Realated literature and Studies
Chapter 2-Realated literature and StudiesChapter 2-Realated literature and Studies
Chapter 2-Realated literature and Studies
 
Lecture5 - C4.5
Lecture5 - C4.5Lecture5 - C4.5
Lecture5 - C4.5
 

Similar to CYBERBULLYING

Cyber-bullying
Cyber-bullyingCyber-bullying
Cyber-bullying
anwidener
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentationSally Garza
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Serene Yee
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
pamelazuley
 
Geek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingGeek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® Cyberbullying
Melissa McDonald
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
CharanBobby69CB
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
R Smith
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Jessica Jundef
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
R Smith
 
Online platforms for ict development: Cyberbullying
Online platforms for ict development: Cyberbullying Online platforms for ict development: Cyberbullying
Online platforms for ict development: Cyberbullying
AlexanderNana
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
R Smith
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
Deborrah Escobar
 
Cyber bullying arcenal and ayco (1)
Cyber bullying arcenal and ayco (1)Cyber bullying arcenal and ayco (1)
Cyber bullying arcenal and ayco (1)
triciaayco
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Joe Gauder
 
Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1
remerosearcenal
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptx
MaZolynairCawigan
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
Ziar Khan
 
School Cyber Bullying Among Students .pptx.pptx
School Cyber Bullying Among Students .pptx.pptxSchool Cyber Bullying Among Students .pptx.pptx
School Cyber Bullying Among Students .pptx.pptx
ROSALIEBASA1
 

Similar to CYBERBULLYING (20)

Cyber-bullying
Cyber-bullyingCyber-bullying
Cyber-bullying
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Geek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingGeek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® Cyberbullying
 
Cbp
CbpCbp
Cbp
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Online platforms for ict development: Cyberbullying
Online platforms for ict development: Cyberbullying Online platforms for ict development: Cyberbullying
Online platforms for ict development: Cyberbullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
 
Cyber bullying arcenal and ayco (1)
Cyber bullying arcenal and ayco (1)Cyber bullying arcenal and ayco (1)
Cyber bullying arcenal and ayco (1)
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptx
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
School Cyber Bullying Among Students .pptx.pptx
School Cyber Bullying Among Students .pptx.pptxSchool Cyber Bullying Among Students .pptx.pptx
School Cyber Bullying Among Students .pptx.pptx
 

More from Reynante Tagum

Orientation on Bullying
Orientation on BullyingOrientation on Bullying
Orientation on Bullying
Reynante Tagum
 
Wild things
Wild thingsWild things
Wild things
Reynante Tagum
 
Short Table Tennis Quiz
Short Table Tennis QuizShort Table Tennis Quiz
Short Table Tennis Quiz
Reynante Tagum
 
Participatory Action Research
Participatory Action ResearchParticipatory Action Research
Participatory Action Research
Reynante Tagum
 
Participatory Action Research
Participatory Action ResearchParticipatory Action Research
Participatory Action ResearchReynante Tagum
 
Current Issues in GC Report - Windows
Current Issues in GC Report - WindowsCurrent Issues in GC Report - Windows
Current Issues in GC Report - WindowsReynante Tagum
 
Religion and Religious Education
Religion and Religious EducationReligion and Religious Education
Religion and Religious EducationReynante Tagum
 
Ginzberg et al.
Ginzberg et al.Ginzberg et al.
Ginzberg et al.
Reynante Tagum
 

More from Reynante Tagum (11)

Orientation on Bullying
Orientation on BullyingOrientation on Bullying
Orientation on Bullying
 
Knowthyself
KnowthyselfKnowthyself
Knowthyself
 
Wild things
Wild thingsWild things
Wild things
 
Short Table Tennis Quiz
Short Table Tennis QuizShort Table Tennis Quiz
Short Table Tennis Quiz
 
Participatory Action Research
Participatory Action ResearchParticipatory Action Research
Participatory Action Research
 
Participatory Action Research
Participatory Action ResearchParticipatory Action Research
Participatory Action Research
 
Current Issues in GC Report - Windows
Current Issues in GC Report - WindowsCurrent Issues in GC Report - Windows
Current Issues in GC Report - Windows
 
Report at ED501
Report at ED501Report at ED501
Report at ED501
 
Concept Map
Concept MapConcept Map
Concept Map
 
Religion and Religious Education
Religion and Religious EducationReligion and Religious Education
Religion and Religious Education
 
Ginzberg et al.
Ginzberg et al.Ginzberg et al.
Ginzberg et al.
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 

CYBERBULLYING

  • 1. Philippine Normal University College of Arts and Sciences Taft Avenue, Manila SY 2010-2011 CYBERBULLYING Olweus (1993) “A person is bullied when he or she is exposed, repeatedly and over time, to negative actions on the part of one or more other persons, and he or she has difficulty defending himself or herself." This definition includes three important components: 1. Bullying is aggressive behavior that involves unwanted, negative actions. 2. Bullying involves a pattern of behavior repeated over time 3. Bullying involves an imbalance of power or strength.” Bullying • Physical • Relational/Verbal • Internet Online Harassment & Cyberbullying • Online harassment: aggressive behavior, “harm doing,” insults, denigration, impersonation, exclusion, outing, activities associated with hacking – stealing information, breaking into accounts, damaging websites, profiles etc. (Willard, 2006) • Cyberbullying: online harassment that is – repeated over time Reynante S. Tagum 1
  • 2. Involves a power imbalance between a perpetrator and a victim. Power imbalance may be differences in online skills. • Other complicating factor -- perpetrators are also often victims, sometimes online, sometimes elsewhere. Internet bullying can be particularly hard to disentangle. (Willard, 2006) What makes online harassment & bullying different? • Technology is vehicle • Persistence of content – Editable, alterable • Distributability of content – Speed – Breadth • Dis-inhibition over computer- mediated communication • Invasive Cyberbullying "involves the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm others. -Bill Belsey" Cyberbullying is being cruel to others by sending or posting harmful material or engaging in other forms of social aggression using the internet or other digital technologies. Cyberbullying can take different forms: • Flaming. Online fights using electronic messages with angry and vulgar language. Joe and Alec’s online exchange got angrier and angrier. Insults were flying. Joe warned Alec to watch his back in school the next day. • Harassment. Repeatedly sending nasty, mean, and insulting messages. Reynante S. Tagum 2
  • 3. Sara reported to the principal that Kayla was bullying another student. When Sara got home, she had 35 angry messages in her e-mail box. The anonymous cruel messages kept coming—some from complete strangers. • Denigration. “Dissing” someone online. Sending or posting gossip or rumors about a person to damage his or her reputation or friendships. Some boys created a “We Hate Joe” Web site where they posted jokes, cartoons, gossip, and rumors, all dissing Joe. • Impersonation. Pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person’s reputation or friendships. Laura watched closely as Emma logged on to her account and discovered her password. Later, Laura logged on to Emma’s account and sent a hurtful message to Emma’s boyfriend, Adam. • Outing. Sharing someone’s secrets or embarrassing information or images online. Greg, an obese high school student, was changing in the locker room after gym class. Matt took a picture of him with his cell phone camera. Within seconds, the picture was flying around the phones at school. • Trickery. Talking someone into revealing secrets or embarrassing information, then sharing it online. Katie sent a message to Jessica pretending to be her friend and asking lots of questions. Jessica responded, sharing really personal information. Katie forwarded the message to lots of other people with her own comment, “Jessica is a loser.” • Exclusion. Intentionally and cruelly excluding someone from an online group. Millie tries hard to fit in with a group of girls at school. She recently got on the “outs” with a leader in this group. Now Millie has been blocked from the friendship links of all of the girls. • Cyberstalking. Repeated, intense harassment and denigration that includes threats or creates significant fear. When Annie broke up with Sam, he sent her many angry, threatening, pleading messages. He spread nasty rumors about her to her friends and Reynante S. Tagum 3
  • 4. posted a sexually suggestive picture she had given him in a sex-oriented discussion group, along with her e-mail address and cell phone number. Impact of Cyberbullying It is widely known that face-to-face bullying can result in long-term psychological harm to targets. This harm includes low self-esteem, depression, anger, school failure and avoidance, and, in some cases, school violence or suicide. It is possible that the harm caused by cyberbullying may be greater than harm caused by traditional bullying because . . . • Online communications can be extremely vicious. • There is no escape for those who are being cyberbullied— victimization is ongoing, 24/7. • Cyberbullying material can be distributed worldwide and is often irretrievable. • Cyberbullies can be anonymous and can solicit the involvement of unknown “friends.” • Teens may be reluctant to tell adults what is happening online or through their cell phones because they are emotionally traumatized, think it is their fault, fear greater retribution, or fear online activities or cell phone use will be restricted. A group of girls at Alan’s school had been taunting him through instant messaging, teasing him about his small size, daring him to do things he couldn’t do, suggesting that the world would be a better place if he committed suicide. One day, he shot himself. His last online message was “Sometimes the only way to get the respect you deserve is to die.” This is also a true story. PREVENTING CYBERBULLYING There are several important things that you can to do to avoid being a target of cyberbullying: • Protect yourself. Never provide any information or images in electronic form that could be used against you. Reynante S. Tagum 4
  • 5. • Examine how you are communicating. If you find that people are frequently attacking you, look closely at how you are communicating with them. You might be communicating in a way that is irritating others or hurting their feelings. • Find some new friends. If you are trying to fit into a group of people who are treating you badly, it might be easier to simply find some nicer friends. Life’s too short to waste time trying to be friends with mean people. Discipline and Legal Issues An article entitled, “Senate bill seeks to stop bullying in schools” written by Kimberly Jane T. Tan of GMA news said that Senator Miriam Defensor-Santiago submitted Senate Bill No. 2677. The bill mandates all schools, whether public or private, including colleges and universities, to craft policies that will address the problem of bullying in their respective institutions. “Sen. Antonio Trillanes IV and Cong. Rodel Batocabe have come up with their respective Anti-bullying bills in a bid to break this vicious cycle and create a school environment that is truly child-friendly”, as said in the article “School Bullies, Beware!: Anti-Bullying Bills to the Rescue” in the Manila Bulletin. Batocabe’s House Bill 2361 or the Anti-Bullying Act criminalizes bullying and cyberbullying, and penalizes bullies who are minor (below 18) and their parents. Trillanes’ Anti-bullying Act (SBN 413), on the other hand, requires school districts to adopt policies prohibiting harassment, intimidation and bullying. What We Can Do1 De La Salle University Psychology professor Anton Simon Palo says the solution to bullying should be a preventive policy, not a reactive one. This, he adds, is best achieved not just in school but in the community level. Marlon Era, a sociologist and professor at DLSU, states that children Reynante S. Tagum 5
  • 6. who resort to bullying may be seeking recognition in some other way. They may also have the wrong role models at home. “All the basic things in life we learn that from the family, from the parents. Even if good laws are implemented on this issue, if the family orientation is bad, you still cannot address the program. We are developing the country’s future leaders here so it is important to teach the right values to our children. We should teach them that its better to be friendly and caring so they would gain more friends,” Era stresses. For Palo, the best solution is to empower the students to have a unified effort to stop the bullies; to teach proper counseling techniques to teachers and guidance counselors; to involve the parents in the treatment of the child; and to set up community psychosocial centers that play an active role in educating people and children on bullying. Submitted to: PROF. SYLVIA T. CABERIO Counseling Theories and Practice 1 Submitted by: MR. REYNANTE S.TAGUM M.A. in Education Major in Guidance and Counseling 1 Really, What Constitutes Bullying? by Rachel C. Barawid, November 10, 2010 Reynante S. Tagum 6
  • 7. http://mb.com.ph/articles/286812/really-what-constitutes-bullying Reference Online Articles A new menace: cyberbullying http://opinion.inquirer.net/inquireropinion/columns/view/20100716-281552/A-new-menace- cyberbullying Cyber bully victims hit with depression—survey http://newsinfo.inquirer.net/breakingnews/infotech/view/20100922-293654/Cyber-bully-victims- hit-with-depressionsurvey Cyber Parenting (How it could work) http://www.mb.com.ph/articles/235379/cyber-parenting-how-it-could-work Gay student in alleged webcam bullying commits suicide http://newsinfo.inquirer.net/breakingnews/infotech/view/20101001-295328/Gay-student-in- alleged-webcam-bullying-commits-suicide Have you been a victim of cyber-harassment? http://showbizandstyle.inquirer.net/you/2bu/view/20091016-230461/Have-you-been-a-victim-of- cyber-harassment Heart in cyberspace http://opinion.inquirer.net/inquireropinion/columns/view/20080619-143480/Heart-in-cyberspace In Cyber Bullying, Depression Hits Victims Hardest http://www.depnet.ph/uni0/news/newsitem/3381/default.aspx Parents still crucial vs. online risks http://newsinfo.inquirer.net/breakingnews/infotech/view/20090602-208452/Parents-still-crucial- vs-online-risks Research on cyber bullying, technical issues expose dangers http://www.manilatimes.net/national/2008/aug/17/yehey/top_stories/20080817top4.html S. Korea's Cyworld touts privacy in battle with Facebook http://newsinfo.inquirer.net/breakingnews/world/view/20101216-309307/SKoreas-Cyworld- touts-privacy-in-battle-with-Facebook School Bullies, Beware!: Anti-Bullying Bills to the Rescue http://mb.com.ph/articles/286811/school-bullies-beware-antibullying-bills-rescue Senate bill seeks to stop bullying in schools Reynante S. Tagum 7
  • 8. http://www.gmanews.tv/story/213952/senate-bill-seeks-to-stop-bullying-in-schools# The Facebook Generation http://showbizandstyle.inquirer.net/sim/sim/view/20101113-303030/The-Facebook-Generation Tougher law vs cyber bullying pushed http://www.journal.com.ph/index.php/national/20804-tougher-law-vs-cyber-bullying- pushed.html PDF File Educator’s Guide to Cyberbullying and Cyberthreats by Nancy Williard, 2007 PowerPoint File Bullying, Cyberbullying, Murder and Bullycide by Rick Shaw www.awareity.com Cyberbullying by Adrienne DeWolfe Cyberbullying: What the research is telling us… Amanda Lenhart Pew Internet & American Life Project http://www.pewinternet.org Tech etiquette www.SmallTalkBigResults.com Reynante S. Tagum 8