SlideShare a Scribd company logo
1 of 4
“The Dark Side of Connectivity”
Confronting Cyber Bullying and Social Media Abuse
Prof. Deven Gol
Department of Information Technology
G H Patel College of Engineering & Technology
Vallabh Vidyanagar (Gujarat)
devengol@gcet.ac.in
What is cyberbullying?
It occurs on
social media
messaging platforms
gaming platforms, and
cell phones
Cyberbullying involves repetitive actions with the intention of
scaring
angering
shaming the targeted individuals
2
Prof. Deven Gol (IT- GCET)
Reference
1) https://www.unicef.org/end-violence/how-to-stop-cyberbullying
2) https://www.parentcircle.com/cyberbullying-laws-and-policies-in-india/article
3) https://www.legalserviceindia.com/legal/article-7789-how-to-file-a-complaint-in-
regards-to-violation-of-cyber-laws.html
4) https://www.techtarget.com/whatis/definition/cyberbullying
5) https://online.maryville.edu/blog/what-is-cyberbullying-an-overview-for-students-
parents-and-teachers/#difference
6) https://www.pewresearch.org/internet/2018/09/27/a-majority-of-teens-have-
experienced-some-form-of-cyberbullying/
7) https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9964357/
8) https://edubirdie.com/examples/social-media-addiction-linked-to-cyberbullying/
Prof. Deven Gol (IT- GCET) 3
4
Address:
G H Patel College of
Engg. & Tech.,
Vallabh Vidyanagar
Contact Number:
Mobile No : 88888888888
Phone : 02692231651
Email id:
devengol@gcet.ac.in
THANK YOU
4

More Related Content

Similar to Format (1).pptx

Implementation of Cyber Security in Corporate Sector of Pakistan
Implementation of Cyber Security in Corporate Sector of PakistanImplementation of Cyber Security in Corporate Sector of Pakistan
Implementation of Cyber Security in Corporate Sector of Pakistan
IJAEMSJORNAL
 
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
Running Head CURRENT CHALLENGES FACING CYBER SECURITY          .docxRunning Head CURRENT CHALLENGES FACING CYBER SECURITY          .docx
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
healdkathaleen
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
Kirti Temani
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
AnastaciaShadelb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
ChantellPantoja184
 
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docxRunning head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
cowinhelen
 
Required topic cyberlaw documentpresentation document .docx
Required topic  cyberlaw documentpresentation document .docxRequired topic  cyberlaw documentpresentation document .docx
Required topic cyberlaw documentpresentation document .docx
heunice
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
vrickens
 

Similar to Format (1).pptx (20)

Cyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network securityCyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network security
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
Implementation of Cyber Security in Corporate Sector of Pakistan
Implementation of Cyber Security in Corporate Sector of PakistanImplementation of Cyber Security in Corporate Sector of Pakistan
Implementation of Cyber Security in Corporate Sector of Pakistan
 
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
Running Head CURRENT CHALLENGES FACING CYBER SECURITY          .docxRunning Head CURRENT CHALLENGES FACING CYBER SECURITY          .docx
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
188
188188
188
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
 
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, BindungThe Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
 
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docxRunning head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
 
Required topic cyberlaw documentpresentation document .docx
Required topic  cyberlaw documentpresentation document .docxRequired topic  cyberlaw documentpresentation document .docx
Required topic cyberlaw documentpresentation document .docx
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 

Recently uploaded

Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdf
Kira Dess
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
BalamuruganV28
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
drjose256
 

Recently uploaded (20)

Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdf
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailing
 
engineering chemistry power point presentation
engineering chemistry  power point presentationengineering chemistry  power point presentation
engineering chemistry power point presentation
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, Functions
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Station
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Students
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.ppt
 
Intro to Design (for Engineers) at Sydney Uni
Intro to Design (for Engineers) at Sydney UniIntro to Design (for Engineers) at Sydney Uni
Intro to Design (for Engineers) at Sydney Uni
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdf
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
 

Format (1).pptx

  • 1. “The Dark Side of Connectivity” Confronting Cyber Bullying and Social Media Abuse Prof. Deven Gol Department of Information Technology G H Patel College of Engineering & Technology Vallabh Vidyanagar (Gujarat) devengol@gcet.ac.in
  • 2. What is cyberbullying? It occurs on social media messaging platforms gaming platforms, and cell phones Cyberbullying involves repetitive actions with the intention of scaring angering shaming the targeted individuals 2 Prof. Deven Gol (IT- GCET)
  • 3. Reference 1) https://www.unicef.org/end-violence/how-to-stop-cyberbullying 2) https://www.parentcircle.com/cyberbullying-laws-and-policies-in-india/article 3) https://www.legalserviceindia.com/legal/article-7789-how-to-file-a-complaint-in- regards-to-violation-of-cyber-laws.html 4) https://www.techtarget.com/whatis/definition/cyberbullying 5) https://online.maryville.edu/blog/what-is-cyberbullying-an-overview-for-students- parents-and-teachers/#difference 6) https://www.pewresearch.org/internet/2018/09/27/a-majority-of-teens-have- experienced-some-form-of-cyberbullying/ 7) https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9964357/ 8) https://edubirdie.com/examples/social-media-addiction-linked-to-cyberbullying/ Prof. Deven Gol (IT- GCET) 3
  • 4. 4 Address: G H Patel College of Engg. & Tech., Vallabh Vidyanagar Contact Number: Mobile No : 88888888888 Phone : 02692231651 Email id: devengol@gcet.ac.in THANK YOU 4