SlideShare a Scribd company logo
1 of 13
Download to read offline
CYBERBULLYING
0
MEMBERS OF PROJECT:
1. JAVERIA KHANUM 37925
2. SITWAT MEDHI 36965
3. SALIKA ARBAB 36668
4. GULFREEN BIBI 35440
HOW TO PREVENT CYBRBULLYING
CYBERBULLYING
CYBERBULLYING
1
YBERBULLYING is
harassment and
misbehavior with
others by the means
of electronic media,
technologies, mobile phones
and internet and
cyberbullying increased in
last decade. (government,
2021)
Bullying is generally seen as
voluntary action to harms,
others where it is difficult for
victim to defeat him/herself.
Researchers have also found
that teenagers are more
involve in cyberbullying
crime. Anxiety, depression and
psychosomatic symptoms are
increased in students or
teenagers who are bullied by
others and especially
psychosomatic
problems risk for difficulties
at school, colleges,
universities and other
educational and working
places.
C
CYBERBULLYING
2
MORE DANGEROUS
ZOOM OF INTERNET
NOWS A DAYS:
Social networks can be use in
harmful ways as well. It is
used by group of people
generally, edit images of
being contacted by strangers,
hacking, computers viruses
etc.
GUIDLINE TO PREVENT
CYBERBULLING
Today younger generation has a
direct access to internet from
Personal Computers, mobiles at
homes, colleges even in public
places. In the recent years,
program and policies are made to
prevent and reduce the problem
of cyber bulling specially in
teenagers.
➢STUDENTS ROLE:
Students should also
make efforts to prevent
cyberbullying increases
the likelihood of the
compliance with school,
policies, ensures the
strategies are relevant and
engaging for students and
acknowledge that they play
a critical role in maintaining
a positive school
environment.
Most of students are
involved in cyber bulling
because there are unaware
about the consequences of
cyber bulling and its
prevention. But most of
students are unaware of
cyberbullying and do not
know how to prevent
themselves and what action
they have to take because
of that fear their bullied by
others.
Cyber bulling is most
common in teenagers;
reason is because most
teenagers use cyber
CYBERBULLYING
3
bulling to seek revenge.
These teenagers are
referred as
bulling-
victim. This
bully-victim
wants others
to feel what
they have
felt and feel
justified in
doing so, by
cyberbullying others.
Why cyber bulling
is an easy access:
The reason why
cyberbullying is an essay
access, because they feel
they are freed from the
constant of suitable
behavior, not thinking
about the consequences
and saying things they
normally would not say in
face-to-face setting. And
not actually seeing how
their words effect the
person from whom they
were meant. They are less
likely to feel regret,
sympathy or compassion of
their victim. To save our
students and
children
because they
are future of the
country so, we
have to take
following steps.
STEPS
TAKEN FOR
STUDENTS
SECURITY:
i. Improve students
understanding, skills
and competences to
prevent and respond
to bulling and school
should support
students.
ii. Curricula need to
provide students
with opportunities to
develop their social
skills and enhance
self-esteem.
iii. We should educate
student how to
protect and take
safety strategies to
prevent and respond
CYBERBULLYING
4
report the
cyberbullying.
iv. We also need to
educate students
about their rights and
responsibilities in this
world and give
knowledge how to
adopt positive
attitudes towards
these modern
technologies and
how to become good
“DIGITAL CITIZENS”.
➢FAMILIES ROLE:
Outside the educational
institute cyberbullying is
also found more.
We should aware the
developing and uneducated
families about the
cyberbullying and its
preventions. Family
functioning and bulling
behaviors is closely linked.
So, children with strong
bounding with their parents
and elders are less likely to
involve in cyberbullying.
We need to make a
program that trains the
parents in information
nights, teacher-parent
meeting, was associated
with decrease in both
student’s bulling others and
being bullied.
➢SCHOOL
MANAGNMENT
ROLE:
In school we should
create maintain the
environmental that help
students well bring and
maintain good behavior.
School should provide
safety, encourages open
communication and
positive relationship and
CYBERBULLYING
5
supports a sense of
connectedness to school
that reduces the risk of
bulling.
Government should
make such as school
policy and groups that
are helpful in reducing
bulling.
➢TEACHER’S ROLE:
Teachers also play an
important role in
reducing the cyber
bulling by
discouraging bulling
and cyberbullying.
Teachers need a
comprehensive
professional learning
to enhance their
confidence in
assisting students
with bulling-related
matters.
Teachers should make
warmth, friendly
relationship with their
students and must
understand them in
this way teachers can
save their students
from cyberbullying.
They should keep an
eye on students in
case of any type
misbehave and
distraction investigate
and guide the
students. (Romera,
2019)
➢ROLE OF
INDUSTRIES
REDUCING
CYBERBYULLING:
• Industry comprises
of different
organizations e.g.,
ISPS (networking
services provider),
MPCS (mobile
phones
companies), social
CYBERBULLYING
6
networking sites,
online virtual,
hardware and
software etc.
• Industry can
remove
cyberbullying and
provide and
provide secure and
trustworthy online
experiences for
adults, children,
and teenagers.
On media age limit should
require on some content only
specific person of specific age
can open.
As the rating of
cyberbullying increases
day by day through
social media, social
media companies should
combat online abuse.
Instagram is rated
highest, the social media
apps where victim has
been targeted and
harassed. There are also
other apps like
Facebook, Twitter,
Snapchat, YouTube and
other social media
apps.
CYBERBULLYING
7
Other media platform
where the bully harasses
their victim. These social
media company should
protect the user from
being harassed and
respond to a report of
abuse and harm and any
other offensive
comments.
➢ACTION TOWARD
RUMORS:
People have many more
ways to share gossips,
spread rumors and lash out
each other’s than in past.
So, Government should
make policy that whoever
spread rumors without any
prove and interfere in other
life. Person should fine with
charges and this is an illegal
activity.
➢ACTIONS BY
PARENTS:
Cyberbullying is more
complex than just asking
parents to take away
personal accounts,
personal computers,
laptops and mobiles from
children below age of 14.
Children must use in front
of parents.
Children should not allow to
use any technology and
apps and phones in their
private room. Parents and
teachers have duty to keep
an eye on the children.
Taking away computers or
phones also stop
cyberbullying activities and
also limit the people to
connect with others,
further, isolating them.
To prevent cyberbullying
the parents and teachers
should establish an
environment of trust and
communication so the
students or children and
teenagers easily share with
the adults. (extendednotes,
2015)
➢GIVING
KNOWLEDGE TO
PUBLIC:
People need to gain
knowledge how
CYBERBULLYING
8
cyberbullying impact victim
life.
For student’s school not
only need to have codes of
conduct that cover student
behavior both in school and
when social technologies,
they need prevention
strategies that define
cyberbullying, how its
happens and what are its
prevention.
Retreat the students get to
know each other and
introduce commonalities
may decrease cyberbullying
activity.
Install monitoring apps (it
monitors all social media
activities and even the
deleted text and call logs)
➢ MADE COMMITTES
FOR PUBLIC HEIP:
Establish students’ safety
committee for the
students, who are being
bullied, they should create
policies and rules against
cyberbullying including
cyberbullying reporting
system.
Educate your child about
cyberbullying and how to
prevent it.
ALL THESE ACTIONS
AND MEASURES HEIPS
IN THE PREVENTION OF
CYBERBULLYING.SO, IT
IS OUR DUTY TO
FOLLOW ALL THESE
CYBERBULLYING
9
PRECAUTIONARY
MEASURE.
Law and
punishment:
We should consider law as a
prevention and safely
measure against
cyberbullying. The most
common view in society
about the law is that, law is
for punish people but it’s
wrong. Actually, it helps
people to distinguish
between right and wrong but
in CANDA and AUSTRILA
there’s not law for
cyberbullying because of
these above mention
reasons. Cyberbullying
increase day by day in the
whole world.
Government should make
law and made heavy
punishment for those who
break the law with heavy
number of charges.
Following law should be
made:
• Law and punishment
and retribution.
• Penalties for a
cyberbullying can range
from school suspension
or expulsions.
• Law as a deferent.
• Law as social norm.
• Law informing policy.
All these laws should be
mold in this way so that can
help Victim to recover
physically and mentally.
Criminal has to pay back to
person to whom he or she has
bully. (Evan Fisher, 2021)
CYBERBULLYING NEEDS
MORE ATTENTION FROM
RESEARCHERS AND
STRATEGIES TO COMBAT
THIS PHENOMENON NEED
TO BE BOTH FULLY
CONCEPTUALIZED,
DEVELOPED and
MEASURED.
CYBERBULLYING
10
Somehow cyberbullying is
decrease for the SIX years
rating is given in below graph:
30%
26%
22%
9%
7%
6%
CYBER BULLYING RATE ON
SOCIAL MEDIA
Facebook
Snapchat
Whatsap
Youtube
Twitter
1 2 3 4 5 6
Series1 2016 2017 2018 2019 2020 2021
Series2 2% 2% 3% 5% 8% 10%
2016 2017 2018 2019 2020 2021
2% 2% 3% 5% 8% 10%
0
500
1000
1500
2000
2500
PRVENTION RATING OF LAST SIX
YEARS
Series1 Series2
CYBERBULLYING
11
References
(2015, july 16). Retrieved from extendednotes:
https://www.extendednotes.com/after-
school-articles/5-tips-to-prevent-
cyberbullying-among-students
Evan Fisher, E. (2021, dec 27). findlaw.
Retrieved from findlaw:
https://www.findlaw.com/criminal/cri
minal-charges/cyber-bullying.html
government, U. S. (2021, nov 05). cyberbullying.
Retrieved from stopbullying.gov:
https://www.google.com/search?q=cyb
erbullying&sxsrf=AOaemvLvpD3Dr_5CB
X5bmD1em819iIUYUw%3A1641973240
855&ei=-
IXeYbrTM9LC8gKVsoSICg&ved=0ahUKE
wi6r4H-
2qv1AhVSoVwKHRUZAaEQ4dUDCA4&u
act=5&oq=cyberbullying&gs_lcp=Cgdnd
3Mtd2l6EAMyBAgjECcyBAgjECcyBAgjEC
cyBwgAELEDEE
Romera, E. M. (2019, august 14). frontiersin.
Retrieved from Frontiers in Psychology:
https://www.frontiersin.org/articles/10
.3389/fpsyg.2019.01830/full
TOOL OF MS. WORD
THAT WE USE IN OUR
PROJECT:
• Headers
• Cover Page
• Photos
• Word Art
• Add page number
• Writing style
• FONT
• Font size
• Alignment
• Water mark
• Paragraph spacing
• Theme
• Page border
• Graphs
• References
• Columns
• Footer
CYBERBULLYING
12

More Related Content

What's hot

Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentationMatthew Momney
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.jessy0121
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingbl03cook
 
Rischi e pericoli del Web
Rischi e pericoli del Web Rischi e pericoli del Web
Rischi e pericoli del Web claudiopasqua
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide sharebr03wood
 
Digital footprint powerpoint
Digital footprint powerpointDigital footprint powerpoint
Digital footprint powerpointducklvr9
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality reportJonan Momo
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying21rahul1999
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...HDCH
 
Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentationSally Garza
 
Living in the IT Era - Lesson 3.pptx
Living in the IT Era - Lesson 3.pptxLiving in the IT Era - Lesson 3.pptx
Living in the IT Era - Lesson 3.pptxFroilan Cantillo
 
Living in the IT Era - Lesson 5.0.pptx
Living in the IT Era - Lesson 5.0.pptxLiving in the IT Era - Lesson 5.0.pptx
Living in the IT Era - Lesson 5.0.pptxFroilan Cantillo
 
Literasi Digital untuk Orang Tua - Mendampingi Anak di era Digital
Literasi Digital untuk Orang Tua - Mendampingi Anak di era DigitalLiterasi Digital untuk Orang Tua - Mendampingi Anak di era Digital
Literasi Digital untuk Orang Tua - Mendampingi Anak di era DigitalIndriyatno Banyumurti
 

What's hot (20)

Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
USE OF CELL PHONES
USE OF CELL PHONES USE OF CELL PHONES
USE OF CELL PHONES
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Rischi e pericoli del Web
Rischi e pericoli del Web Rischi e pericoli del Web
Rischi e pericoli del Web
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Digital footprint powerpoint
Digital footprint powerpointDigital footprint powerpoint
Digital footprint powerpoint
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
 
Week-4-PerDev.pptx
Week-4-PerDev.pptxWeek-4-PerDev.pptx
Week-4-PerDev.pptx
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
Living in the IT Era - Lesson 3.pptx
Living in the IT Era - Lesson 3.pptxLiving in the IT Era - Lesson 3.pptx
Living in the IT Era - Lesson 3.pptx
 
Living in the IT Era - Lesson 5.0.pptx
Living in the IT Era - Lesson 5.0.pptxLiving in the IT Era - Lesson 5.0.pptx
Living in the IT Era - Lesson 5.0.pptx
 
Literasi Digital untuk Orang Tua - Mendampingi Anak di era Digital
Literasi Digital untuk Orang Tua - Mendampingi Anak di era DigitalLiterasi Digital untuk Orang Tua - Mendampingi Anak di era Digital
Literasi Digital untuk Orang Tua - Mendampingi Anak di era Digital
 

Similar to Magazine on the PERVENTION OF CYBERBULLYING

The Prevention of Cyberbullying
The Prevention of CyberbullyingThe Prevention of Cyberbullying
The Prevention of CyberbullyingRRGraph Design
 
HOW TO PREVENT CYBER BULLYING SLIDES PRESENTATION.pptx
HOW TO PREVENT CYBER BULLYING SLIDES PRESENTATION.pptxHOW TO PREVENT CYBER BULLYING SLIDES PRESENTATION.pptx
HOW TO PREVENT CYBER BULLYING SLIDES PRESENTATION.pptxJaveriaZain1
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber pathProfsdetchana Murthy
 
Cyber bullying.pdf
Cyber bullying.pdfCyber bullying.pdf
Cyber bullying.pdfDobby12
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and postervictoriahoo
 
SEG AT2 final update
SEG AT2 final updateSEG AT2 final update
SEG AT2 final updateBradyTrotman
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversationlippertnicole
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)amalgarn
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)Sumaiya Ismail
 
Social Media Policy for our School District
Social Media Policy for our School DistrictSocial Media Policy for our School District
Social Media Policy for our School DistrictSallyLynnMcLean
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointhmorrell1
 
Social media (sanju)
Social media (sanju)Social media (sanju)
Social media (sanju)sanju prasad
 

Similar to Magazine on the PERVENTION OF CYBERBULLYING (20)

The Prevention of Cyberbullying
The Prevention of CyberbullyingThe Prevention of Cyberbullying
The Prevention of Cyberbullying
 
HOW TO PREVENT CYBER BULLYING SLIDES PRESENTATION.pptx
HOW TO PREVENT CYBER BULLYING SLIDES PRESENTATION.pptxHOW TO PREVENT CYBER BULLYING SLIDES PRESENTATION.pptx
HOW TO PREVENT CYBER BULLYING SLIDES PRESENTATION.pptx
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber path
 
Cyber bullying.pdf
Cyber bullying.pdfCyber bullying.pdf
Cyber bullying.pdf
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
 
SEG AT2 final update
SEG AT2 final updateSEG AT2 final update
SEG AT2 final update
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversation
 
SEG AT2.pptx
SEG AT2.pptxSEG AT2.pptx
SEG AT2.pptx
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)
 
Social Media Policy for our School District
Social Media Policy for our School DistrictSocial Media Policy for our School District
Social Media Policy for our School District
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Chandan kumar
Chandan kumarChandan kumar
Chandan kumar
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
Cyberbullying: Advice for Schools
Cyberbullying: Advice for SchoolsCyberbullying: Advice for Schools
Cyberbullying: Advice for Schools
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Social media (sanju)
Social media (sanju)Social media (sanju)
Social media (sanju)
 

Recently uploaded

Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptxBasil Achie
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Pooja Nehwal
 
SBFT Tool Competition 2024 - CPS-UAV Test Case Generation Track
SBFT Tool Competition 2024 - CPS-UAV Test Case Generation TrackSBFT Tool Competition 2024 - CPS-UAV Test Case Generation Track
SBFT Tool Competition 2024 - CPS-UAV Test Case Generation TrackSebastiano Panichella
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxmavinoikein
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@vikas rana
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...NETWAYS
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )Pooja Nehwal
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxFamilyWorshipCenterD
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSebastiano Panichella
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSebastiano Panichella
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...NETWAYS
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptssuser319dad
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
 
SBFT Tool Competition 2024 - CPS-UAV Test Case Generation Track
SBFT Tool Competition 2024 - CPS-UAV Test Case Generation TrackSBFT Tool Competition 2024 - CPS-UAV Test Case Generation Track
SBFT Tool Competition 2024 - CPS-UAV Test Case Generation Track
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptx
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation Track
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.ppt
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
 

Magazine on the PERVENTION OF CYBERBULLYING

  • 1. CYBERBULLYING 0 MEMBERS OF PROJECT: 1. JAVERIA KHANUM 37925 2. SITWAT MEDHI 36965 3. SALIKA ARBAB 36668 4. GULFREEN BIBI 35440 HOW TO PREVENT CYBRBULLYING CYBERBULLYING
  • 2. CYBERBULLYING 1 YBERBULLYING is harassment and misbehavior with others by the means of electronic media, technologies, mobile phones and internet and cyberbullying increased in last decade. (government, 2021) Bullying is generally seen as voluntary action to harms, others where it is difficult for victim to defeat him/herself. Researchers have also found that teenagers are more involve in cyberbullying crime. Anxiety, depression and psychosomatic symptoms are increased in students or teenagers who are bullied by others and especially psychosomatic problems risk for difficulties at school, colleges, universities and other educational and working places. C
  • 3. CYBERBULLYING 2 MORE DANGEROUS ZOOM OF INTERNET NOWS A DAYS: Social networks can be use in harmful ways as well. It is used by group of people generally, edit images of being contacted by strangers, hacking, computers viruses etc. GUIDLINE TO PREVENT CYBERBULLING Today younger generation has a direct access to internet from Personal Computers, mobiles at homes, colleges even in public places. In the recent years, program and policies are made to prevent and reduce the problem of cyber bulling specially in teenagers. ➢STUDENTS ROLE: Students should also make efforts to prevent cyberbullying increases the likelihood of the compliance with school, policies, ensures the strategies are relevant and engaging for students and acknowledge that they play a critical role in maintaining a positive school environment. Most of students are involved in cyber bulling because there are unaware about the consequences of cyber bulling and its prevention. But most of students are unaware of cyberbullying and do not know how to prevent themselves and what action they have to take because of that fear their bullied by others. Cyber bulling is most common in teenagers; reason is because most teenagers use cyber
  • 4. CYBERBULLYING 3 bulling to seek revenge. These teenagers are referred as bulling- victim. This bully-victim wants others to feel what they have felt and feel justified in doing so, by cyberbullying others. Why cyber bulling is an easy access: The reason why cyberbullying is an essay access, because they feel they are freed from the constant of suitable behavior, not thinking about the consequences and saying things they normally would not say in face-to-face setting. And not actually seeing how their words effect the person from whom they were meant. They are less likely to feel regret, sympathy or compassion of their victim. To save our students and children because they are future of the country so, we have to take following steps. STEPS TAKEN FOR STUDENTS SECURITY: i. Improve students understanding, skills and competences to prevent and respond to bulling and school should support students. ii. Curricula need to provide students with opportunities to develop their social skills and enhance self-esteem. iii. We should educate student how to protect and take safety strategies to prevent and respond
  • 5. CYBERBULLYING 4 report the cyberbullying. iv. We also need to educate students about their rights and responsibilities in this world and give knowledge how to adopt positive attitudes towards these modern technologies and how to become good “DIGITAL CITIZENS”. ➢FAMILIES ROLE: Outside the educational institute cyberbullying is also found more. We should aware the developing and uneducated families about the cyberbullying and its preventions. Family functioning and bulling behaviors is closely linked. So, children with strong bounding with their parents and elders are less likely to involve in cyberbullying. We need to make a program that trains the parents in information nights, teacher-parent meeting, was associated with decrease in both student’s bulling others and being bullied. ➢SCHOOL MANAGNMENT ROLE: In school we should create maintain the environmental that help students well bring and maintain good behavior. School should provide safety, encourages open communication and positive relationship and
  • 6. CYBERBULLYING 5 supports a sense of connectedness to school that reduces the risk of bulling. Government should make such as school policy and groups that are helpful in reducing bulling. ➢TEACHER’S ROLE: Teachers also play an important role in reducing the cyber bulling by discouraging bulling and cyberbullying. Teachers need a comprehensive professional learning to enhance their confidence in assisting students with bulling-related matters. Teachers should make warmth, friendly relationship with their students and must understand them in this way teachers can save their students from cyberbullying. They should keep an eye on students in case of any type misbehave and distraction investigate and guide the students. (Romera, 2019) ➢ROLE OF INDUSTRIES REDUCING CYBERBYULLING: • Industry comprises of different organizations e.g., ISPS (networking services provider), MPCS (mobile phones companies), social
  • 7. CYBERBULLYING 6 networking sites, online virtual, hardware and software etc. • Industry can remove cyberbullying and provide and provide secure and trustworthy online experiences for adults, children, and teenagers. On media age limit should require on some content only specific person of specific age can open. As the rating of cyberbullying increases day by day through social media, social media companies should combat online abuse. Instagram is rated highest, the social media apps where victim has been targeted and harassed. There are also other apps like Facebook, Twitter, Snapchat, YouTube and other social media apps.
  • 8. CYBERBULLYING 7 Other media platform where the bully harasses their victim. These social media company should protect the user from being harassed and respond to a report of abuse and harm and any other offensive comments. ➢ACTION TOWARD RUMORS: People have many more ways to share gossips, spread rumors and lash out each other’s than in past. So, Government should make policy that whoever spread rumors without any prove and interfere in other life. Person should fine with charges and this is an illegal activity. ➢ACTIONS BY PARENTS: Cyberbullying is more complex than just asking parents to take away personal accounts, personal computers, laptops and mobiles from children below age of 14. Children must use in front of parents. Children should not allow to use any technology and apps and phones in their private room. Parents and teachers have duty to keep an eye on the children. Taking away computers or phones also stop cyberbullying activities and also limit the people to connect with others, further, isolating them. To prevent cyberbullying the parents and teachers should establish an environment of trust and communication so the students or children and teenagers easily share with the adults. (extendednotes, 2015) ➢GIVING KNOWLEDGE TO PUBLIC: People need to gain knowledge how
  • 9. CYBERBULLYING 8 cyberbullying impact victim life. For student’s school not only need to have codes of conduct that cover student behavior both in school and when social technologies, they need prevention strategies that define cyberbullying, how its happens and what are its prevention. Retreat the students get to know each other and introduce commonalities may decrease cyberbullying activity. Install monitoring apps (it monitors all social media activities and even the deleted text and call logs) ➢ MADE COMMITTES FOR PUBLIC HEIP: Establish students’ safety committee for the students, who are being bullied, they should create policies and rules against cyberbullying including cyberbullying reporting system. Educate your child about cyberbullying and how to prevent it. ALL THESE ACTIONS AND MEASURES HEIPS IN THE PREVENTION OF CYBERBULLYING.SO, IT IS OUR DUTY TO FOLLOW ALL THESE
  • 10. CYBERBULLYING 9 PRECAUTIONARY MEASURE. Law and punishment: We should consider law as a prevention and safely measure against cyberbullying. The most common view in society about the law is that, law is for punish people but it’s wrong. Actually, it helps people to distinguish between right and wrong but in CANDA and AUSTRILA there’s not law for cyberbullying because of these above mention reasons. Cyberbullying increase day by day in the whole world. Government should make law and made heavy punishment for those who break the law with heavy number of charges. Following law should be made: • Law and punishment and retribution. • Penalties for a cyberbullying can range from school suspension or expulsions. • Law as a deferent. • Law as social norm. • Law informing policy. All these laws should be mold in this way so that can help Victim to recover physically and mentally. Criminal has to pay back to person to whom he or she has bully. (Evan Fisher, 2021) CYBERBULLYING NEEDS MORE ATTENTION FROM RESEARCHERS AND STRATEGIES TO COMBAT THIS PHENOMENON NEED TO BE BOTH FULLY CONCEPTUALIZED, DEVELOPED and MEASURED.
  • 11. CYBERBULLYING 10 Somehow cyberbullying is decrease for the SIX years rating is given in below graph: 30% 26% 22% 9% 7% 6% CYBER BULLYING RATE ON SOCIAL MEDIA Facebook Snapchat Whatsap Youtube Twitter 1 2 3 4 5 6 Series1 2016 2017 2018 2019 2020 2021 Series2 2% 2% 3% 5% 8% 10% 2016 2017 2018 2019 2020 2021 2% 2% 3% 5% 8% 10% 0 500 1000 1500 2000 2500 PRVENTION RATING OF LAST SIX YEARS Series1 Series2
  • 12. CYBERBULLYING 11 References (2015, july 16). Retrieved from extendednotes: https://www.extendednotes.com/after- school-articles/5-tips-to-prevent- cyberbullying-among-students Evan Fisher, E. (2021, dec 27). findlaw. Retrieved from findlaw: https://www.findlaw.com/criminal/cri minal-charges/cyber-bullying.html government, U. S. (2021, nov 05). cyberbullying. Retrieved from stopbullying.gov: https://www.google.com/search?q=cyb erbullying&sxsrf=AOaemvLvpD3Dr_5CB X5bmD1em819iIUYUw%3A1641973240 855&ei=- IXeYbrTM9LC8gKVsoSICg&ved=0ahUKE wi6r4H- 2qv1AhVSoVwKHRUZAaEQ4dUDCA4&u act=5&oq=cyberbullying&gs_lcp=Cgdnd 3Mtd2l6EAMyBAgjECcyBAgjECcyBAgjEC cyBwgAELEDEE Romera, E. M. (2019, august 14). frontiersin. Retrieved from Frontiers in Psychology: https://www.frontiersin.org/articles/10 .3389/fpsyg.2019.01830/full TOOL OF MS. WORD THAT WE USE IN OUR PROJECT: • Headers • Cover Page • Photos • Word Art • Add page number • Writing style • FONT • Font size • Alignment • Water mark • Paragraph spacing • Theme • Page border • Graphs • References • Columns • Footer