SlideShare a Scribd company logo
Cyberbullying is the use of technology to harass, threaten, embarrass, or target
another person. By definition, it occurs among young people. When an adult is
involved, it may meet the definition of cyber-harassment or cyber-stalking, a
crime that can have legal consequences and involve jail time.
Sometimes cyberbullying can be easy to spot — for example, if your child shows
you a text message, tweet, or response to a status update on Facebook that is
harsh, mean, or cruel. Other acts are less obvious, like impersonating a victim
online or posting personal information, photos, or videos designed to hurt or
embarrass another person. Some kids report that a fake account, web page, or
online persona has been created with the sole intention to harass and bully.
Cyberbullying also can happen accidentally. The impersonal nature of text
messages, IMs, and emails make it very hard to detect the sender's tone — one
person's joke could be another's hurtful insult. Nevertheless, a repeated pattern
of emails, text messages, and online posts is rarely accidental.
Efects of cyberbullying


No longer limited to schoolyards or street corners, modern-day bullying can
happen at home as well as at school — essentially 24 hours a day. As long as
kids have access to a phone, computer, or other device (such as an I Touch),
they are at risk.
Severe or chronic cyberbullying can leave victims at greater risk for anxiety,
depression, and other stress-related disorders. In some rare but highly
publicized cases, some kids have turned to suicide.
The punishment for cyberbullies can include being suspended from school or
kicked off of sports teams. Certain types of cyberbullying also may violate
school codes or even anti-discrimination or sexual harassment laws.
How Parents Can Help
If you discover that your child is being cyberbullied, talk to him or her about any experiences you have
had in your childhood. This can help your child feel less alone. Let your child know that it's not his or
her fault, and that bullying says more about the bully than the victim. Talking to teachers or school
administrators also may help, but take cues from your child.
Many schools, school districts, and after-school clubs have established protocols for responding to
cyberbullying; these vary by district and state. But before reporting the problem, let your child know
that you plan to do so, as he or she could have concerns about "tattling" and might prefer that the
problem be handled privately.
Other measures to try:
Block the bully. Most devices have settings that allow you to electronically block emails, IMs, or text
messages from specific people.
Limit access to technology. Although it's hurtful, many kids who are bullied can't resist the temptation
to check websites or phones to see if there are new messages. Keep the computer in a public place in
the house (no laptops in children's bedrooms, for example) and limit the use of cell phones and games.
Some companies allow you to turn off text messaging services during certain hours. And, most
websites and phones provide the option for parental controls, which provide parents with access to
their children’s messages and online life.
Know your kids' online world. Check their postings and the sites kids visit, and be aware of how they
spend their time online. Talk to them about the importance of privacy and why it's a bad idea to share
personal information online, even with friends. Encourage them to safeguard passwords. Write up cell
phone and social media contracts that you are willing to enforce.
Look to the web for resource and support information about cyberbullying.
If your son or daughter agrees, you may also arrange for mediation with a therapist or counselor at
school who can work with your child and/or the bully.
When Your Child Is the Bully
Finding out that your kid is the one who is behaving inappropriately can be upsetting and
heartbreaking. It's important to address the problem head on and not wait for it to go away.
Talk to your child firmly about his or her actions and explain the negative impact it has on others.
Joking and teasing might seem OK, but it can hurt people's feelings and lead to getting in trouble.
Bullying — in any form — is unacceptable; there can be serious (and sometimes irrevocable)
consequences at home, school, and in the community if it continues.
Remind your child that the use of cell phones and computers is a privilege. Sometimes it helps to
restrict the use of these devices until behavior improves. If you feel your child should have a cell
phone for safety reasons, make sure it is a phone that can only be used for emergency purposes.
Insist on strict parental controls on all devices if there is any history of your child making impulsive
decisions when they are online.
To get to the heart of the matter, sometimes talking to teachers, guidance counselors, and other
school officials can help identify situations that lead a kid to bully others. If your child has trouble
managing anger, talk to a therapist about helping your son or daughter learn to cope with anger,
hurt, frustration, and other strong emotions in a healthy way.
Professional counseling often helps kids learn to deal with their feelings and improve their
confidence and social skills, which in turn can reduce the risk of bullying. If you're tech-savvy
yourself, model good online habits to help your kids understand the benefits and the dangers of life
in the digital world.
How Are Teens Cyberbullied?
Being a victim of cyberbullying can be a common and painful experience. Some
youth who cyberbully
Pretend they are other people online to trick others
Spread lies and rumors about victims
Trick people into revealing personal information
Send or forward mean text messages
Post pictures of victims without their consent
When teens were asked why they think others cyberbully, 81 percent said
that cyberbullies think it’s funny. Other teens believe that youth who cyberbully
Don’t think it’s a big deal
Don’t think about the consequences
Are encouraged by friends
Think everybody cyberbullies
Think they won’t get caught
How Do Victims React?
Contrary to what cyberbullies may believe, cyberbullying is a big deal, and can cause a
variety of reactions in teens. Some teens have reacted in positive ways to try to
prevent cyberbullying by
Blocking communication with the cyberbully
Deleting messages without reading them
Talking to a friend about the bullying
Reporting the problem to an Internet service provider or website moderator
Many youth experience a variety of emotions when they are cyberbullied. Youth who
are cyberbullied report feeling angry, hurt, embarrassed, or scared. These emotions
can cause victims to react in ways such as
Seeking revenge on the bully
Avoiding friends and activities
Cyberbullying back
Some teens feel threatened because they may not know who is cyberbullying them.
Although cyberbullies may think they are anonymous, they can be found. If you
are cyberbullied or harassed and need help, save all communication with
the cyberbully and talk to a parent, teacher, law enforcement officer, or other adult
you trust.
How Can I Prevent Cyber bullying?
Teens have figured out ways to prevent cyber bullying. Follow in the footsteps of other
quick-thinking teens and
Refuse to pass along cyber bullying messages
Tell friends to stop cyber bullying
Block communication with cyber bullies
Report cyber bullying to a trusted adult
You can also help prevent cyber bullying by
Speaking with other students, as well as teachers and school administrators, to develop
rules against cyber bullying
Raising awareness of the cyber bullying problem in your community by holding an
assembly and creating fliers to give to younger kids or parents
Sharing NCPC’s anti-cyber bullying message with friends
Don’t forget that even though you can’t see a cyber bully or the bully’s victim, cyber
bullying causes real problems. If you wouldn’t say it in person, don’t say it online.
Delete cyber bullying. Don’t write it. Don’t forward it.
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng

More Related Content

What's hot

Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
griehl
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
Neville Maluleke
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
Christine Hui Jun Zhong
 
Parents must know about cyber bullying 2
Parents must know about cyber bullying  2Parents must know about cyber bullying  2
Parents must know about cyber bullying 2
Pratima Nayak ,Kendriya Vidyalaya Sangathan
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
pscl
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying PresentationMegan Townes
 
Cyber Bullying Questionnaire Results
Cyber Bullying Questionnaire ResultsCyber Bullying Questionnaire Results
Cyber Bullying Questionnaire Resultsa2columnd12
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
wrhawkins
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointshannonmf
 
savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)Chris Jagger
 
NetSmart [English]
NetSmart [English]NetSmart [English]
NetSmart [English]
truyenthong_vng
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Regina Marbun
 
PPT Year 9 Parent Presentation Evening Feb 2011
PPT Year 9 Parent Presentation Evening Feb 2011PPT Year 9 Parent Presentation Evening Feb 2011
PPT Year 9 Parent Presentation Evening Feb 2011Loreto Normanurst
 

What's hot (17)

Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Parents must know about cyber bullying 2
Parents must know about cyber bullying  2Parents must know about cyber bullying  2
Parents must know about cyber bullying 2
 
Cyberbullying assignment
Cyberbullying assignmentCyberbullying assignment
Cyberbullying assignment
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying Presentation
 
Cyber Bullying Questionnaire Results
Cyber Bullying Questionnaire ResultsCyber Bullying Questionnaire Results
Cyber Bullying Questionnaire Results
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)
 
NetSmart [English]
NetSmart [English]NetSmart [English]
NetSmart [English]
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
PPT Year 9 Parent Presentation Evening Feb 2011
PPT Year 9 Parent Presentation Evening Feb 2011PPT Year 9 Parent Presentation Evening Feb 2011
PPT Year 9 Parent Presentation Evening Feb 2011
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 

Viewers also liked

переход на расширенные кампании (Eng)
переход на расширенные кампании (Eng)переход на расширенные кампании (Eng)
переход на расширенные кампании (Eng)Nikita Evsey
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngmiliarguelles1
 
Technology Acceleration Canvas by InnoCo
Technology Acceleration Canvas by InnoCoTechnology Acceleration Canvas by InnoCo
Technology Acceleration Canvas by InnoCo
Marcin Baron
 
Czy(m) bogaty jest Górny Śląsk?
Czy(m) bogaty jest Górny Śląsk?Czy(m) bogaty jest Górny Śląsk?
Czy(m) bogaty jest Górny Śląsk?
Marcin Baron
 
Kelsen, hans. a democracia (1)
Kelsen, hans. a democracia (1)Kelsen, hans. a democracia (1)
Kelsen, hans. a democracia (1)
Adriana Cerqueira Silva
 
Global food systems
Global food systemsGlobal food systems
Global food systems
rigsrigsrigs
 
Professional athlete powerpoint
Professional athlete powerpointProfessional athlete powerpoint
Professional athlete powerpointavacrawford
 

Viewers also liked (8)

переход на расширенные кампании (Eng)
переход на расширенные кампании (Eng)переход на расширенные кампании (Eng)
переход на расширенные кампании (Eng)
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
sentence
sentencesentence
sentence
 
Technology Acceleration Canvas by InnoCo
Technology Acceleration Canvas by InnoCoTechnology Acceleration Canvas by InnoCo
Technology Acceleration Canvas by InnoCo
 
Czy(m) bogaty jest Górny Śląsk?
Czy(m) bogaty jest Górny Śląsk?Czy(m) bogaty jest Górny Śląsk?
Czy(m) bogaty jest Górny Śląsk?
 
Kelsen, hans. a democracia (1)
Kelsen, hans. a democracia (1)Kelsen, hans. a democracia (1)
Kelsen, hans. a democracia (1)
 
Global food systems
Global food systemsGlobal food systems
Global food systems
 
Professional athlete powerpoint
Professional athlete powerpointProfessional athlete powerpoint
Professional athlete powerpoint
 

Similar to Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng

C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
Arissa Ablao
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
HomeGuides
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
NaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
purush203
 
Bullying vs cyber bullying italy
Bullying vs cyber bullying italyBullying vs cyber bullying italy
Bullying vs cyber bullying italy
Fight Against Discrimination And Racism
 
Cyber bullying-and-internet-addiction
Cyber bullying-and-internet-addictionCyber bullying-and-internet-addiction
Cyber bullying-and-internet-addiction
Stephanie Nichole Ho
 
Cyber bullying-and-internet-addiction
Cyber bullying-and-internet-addictionCyber bullying-and-internet-addiction
Cyber bullying-and-internet-addiction
KingRupertRaphaelHab
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
NiravD3
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
pardolopez
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Mefratechnologies
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Veronica Alejandro
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
FiolaManabat
 
Digital abuse
Digital abuseDigital abuse
Digital abuse
Penda Sunkett
 
Preventing Cyberbullying
Preventing CyberbullyingPreventing Cyberbullying
Preventing Cyberbullying
Ability Skills Knowledge Fraternity
 
Cyberbullying and internent addiction
Cyberbullying  and internent addictionCyberbullying  and internent addiction
Cyberbullying and internent addiction
Christopher Mejia
 
Cyberbullying and Internet Addiction
Cyberbullying and Internet AddictionCyberbullying and Internet Addiction
Cyberbullying and Internet Addiction
Rossehna Mari Magtoto
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
StemGrade
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican Guard
Apostolos Syropoulos
 
Bullying In School Essay
Bullying In School EssayBullying In School Essay
Bullying In School Essay
CustomWrittenCollege
 

Similar to Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng (20)

C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Bullying
BullyingBullying
Bullying
 
Bullying vs cyber bullying italy
Bullying vs cyber bullying italyBullying vs cyber bullying italy
Bullying vs cyber bullying italy
 
Cyber bullying-and-internet-addiction
Cyber bullying-and-internet-addictionCyber bullying-and-internet-addiction
Cyber bullying-and-internet-addiction
 
Cyber bullying-and-internet-addiction
Cyber bullying-and-internet-addictionCyber bullying-and-internet-addiction
Cyber bullying-and-internet-addiction
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Digital abuse
Digital abuseDigital abuse
Digital abuse
 
Preventing Cyberbullying
Preventing CyberbullyingPreventing Cyberbullying
Preventing Cyberbullying
 
Cyberbullying and internent addiction
Cyberbullying  and internent addictionCyberbullying  and internent addiction
Cyberbullying and internent addiction
 
Cyberbullying and Internet Addiction
Cyberbullying and Internet AddictionCyberbullying and Internet Addiction
Cyberbullying and Internet Addiction
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican Guard
 
Bullying In School Essay
Bullying In School EssayBullying In School Essay
Bullying In School Essay
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 

Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng

  • 1.
  • 2. Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. By definition, it occurs among young people. When an adult is involved, it may meet the definition of cyber-harassment or cyber-stalking, a crime that can have legal consequences and involve jail time. Sometimes cyberbullying can be easy to spot — for example, if your child shows you a text message, tweet, or response to a status update on Facebook that is harsh, mean, or cruel. Other acts are less obvious, like impersonating a victim online or posting personal information, photos, or videos designed to hurt or embarrass another person. Some kids report that a fake account, web page, or online persona has been created with the sole intention to harass and bully. Cyberbullying also can happen accidentally. The impersonal nature of text messages, IMs, and emails make it very hard to detect the sender's tone — one person's joke could be another's hurtful insult. Nevertheless, a repeated pattern of emails, text messages, and online posts is rarely accidental.
  • 3. Efects of cyberbullying No longer limited to schoolyards or street corners, modern-day bullying can happen at home as well as at school — essentially 24 hours a day. As long as kids have access to a phone, computer, or other device (such as an I Touch), they are at risk. Severe or chronic cyberbullying can leave victims at greater risk for anxiety, depression, and other stress-related disorders. In some rare but highly publicized cases, some kids have turned to suicide. The punishment for cyberbullies can include being suspended from school or kicked off of sports teams. Certain types of cyberbullying also may violate school codes or even anti-discrimination or sexual harassment laws.
  • 4. How Parents Can Help If you discover that your child is being cyberbullied, talk to him or her about any experiences you have had in your childhood. This can help your child feel less alone. Let your child know that it's not his or her fault, and that bullying says more about the bully than the victim. Talking to teachers or school administrators also may help, but take cues from your child. Many schools, school districts, and after-school clubs have established protocols for responding to cyberbullying; these vary by district and state. But before reporting the problem, let your child know that you plan to do so, as he or she could have concerns about "tattling" and might prefer that the problem be handled privately. Other measures to try: Block the bully. Most devices have settings that allow you to electronically block emails, IMs, or text messages from specific people. Limit access to technology. Although it's hurtful, many kids who are bullied can't resist the temptation to check websites or phones to see if there are new messages. Keep the computer in a public place in the house (no laptops in children's bedrooms, for example) and limit the use of cell phones and games. Some companies allow you to turn off text messaging services during certain hours. And, most websites and phones provide the option for parental controls, which provide parents with access to their children’s messages and online life. Know your kids' online world. Check their postings and the sites kids visit, and be aware of how they spend their time online. Talk to them about the importance of privacy and why it's a bad idea to share personal information online, even with friends. Encourage them to safeguard passwords. Write up cell phone and social media contracts that you are willing to enforce. Look to the web for resource and support information about cyberbullying. If your son or daughter agrees, you may also arrange for mediation with a therapist or counselor at school who can work with your child and/or the bully.
  • 5. When Your Child Is the Bully Finding out that your kid is the one who is behaving inappropriately can be upsetting and heartbreaking. It's important to address the problem head on and not wait for it to go away. Talk to your child firmly about his or her actions and explain the negative impact it has on others. Joking and teasing might seem OK, but it can hurt people's feelings and lead to getting in trouble. Bullying — in any form — is unacceptable; there can be serious (and sometimes irrevocable) consequences at home, school, and in the community if it continues. Remind your child that the use of cell phones and computers is a privilege. Sometimes it helps to restrict the use of these devices until behavior improves. If you feel your child should have a cell phone for safety reasons, make sure it is a phone that can only be used for emergency purposes. Insist on strict parental controls on all devices if there is any history of your child making impulsive decisions when they are online. To get to the heart of the matter, sometimes talking to teachers, guidance counselors, and other school officials can help identify situations that lead a kid to bully others. If your child has trouble managing anger, talk to a therapist about helping your son or daughter learn to cope with anger, hurt, frustration, and other strong emotions in a healthy way. Professional counseling often helps kids learn to deal with their feelings and improve their confidence and social skills, which in turn can reduce the risk of bullying. If you're tech-savvy yourself, model good online habits to help your kids understand the benefits and the dangers of life in the digital world.
  • 6. How Are Teens Cyberbullied? Being a victim of cyberbullying can be a common and painful experience. Some youth who cyberbully Pretend they are other people online to trick others Spread lies and rumors about victims Trick people into revealing personal information Send or forward mean text messages Post pictures of victims without their consent When teens were asked why they think others cyberbully, 81 percent said that cyberbullies think it’s funny. Other teens believe that youth who cyberbully Don’t think it’s a big deal Don’t think about the consequences Are encouraged by friends Think everybody cyberbullies Think they won’t get caught
  • 7. How Do Victims React? Contrary to what cyberbullies may believe, cyberbullying is a big deal, and can cause a variety of reactions in teens. Some teens have reacted in positive ways to try to prevent cyberbullying by Blocking communication with the cyberbully Deleting messages without reading them Talking to a friend about the bullying Reporting the problem to an Internet service provider or website moderator Many youth experience a variety of emotions when they are cyberbullied. Youth who are cyberbullied report feeling angry, hurt, embarrassed, or scared. These emotions can cause victims to react in ways such as Seeking revenge on the bully Avoiding friends and activities Cyberbullying back Some teens feel threatened because they may not know who is cyberbullying them. Although cyberbullies may think they are anonymous, they can be found. If you are cyberbullied or harassed and need help, save all communication with the cyberbully and talk to a parent, teacher, law enforcement officer, or other adult you trust.
  • 8. How Can I Prevent Cyber bullying? Teens have figured out ways to prevent cyber bullying. Follow in the footsteps of other quick-thinking teens and Refuse to pass along cyber bullying messages Tell friends to stop cyber bullying Block communication with cyber bullies Report cyber bullying to a trusted adult You can also help prevent cyber bullying by Speaking with other students, as well as teachers and school administrators, to develop rules against cyber bullying Raising awareness of the cyber bullying problem in your community by holding an assembly and creating fliers to give to younger kids or parents Sharing NCPC’s anti-cyber bullying message with friends Don’t forget that even though you can’t see a cyber bully or the bully’s victim, cyber bullying causes real problems. If you wouldn’t say it in person, don’t say it online. Delete cyber bullying. Don’t write it. Don’t forward it.