SlideShare a Scribd company logo
1 of 8
By: Emily Jones
Cyber harassment usually pertains to
threatening or harassing email
messages, instant messages, or to blog
entries or websites dedicated solely to
tormenting an individual.
-According to the NCLS-
 You can report comments on
sites like Facebook and Twitter
and have it removed.
 If the comments are considered
libel or slander, you can file a
civil or federal suit.
 The book Virtually Criminal by
Matthew Williams quote.
“ The Internet is too
widespread to be easily
dominated by any single
government.”
Interview With Sarah Jones
English 102 Recast Project
English 102 Recast Project

More Related Content

What's hot

Cyberbullying No27 2009 Laurence And Saad
Cyberbullying No27 2009 Laurence And SaadCyberbullying No27 2009 Laurence And Saad
Cyberbullying No27 2009 Laurence And Saadsbaluch1
 
Plugged in and tuned out
Plugged in and tuned outPlugged in and tuned out
Plugged in and tuned outMohamed Sedky
 
Cyber sex preo-rf-v5
Cyber sex preo-rf-v5Cyber sex preo-rf-v5
Cyber sex preo-rf-v5Tom Daly
 
Cyber Bullying and Internet Addiction
Cyber Bullying and Internet AddictionCyber Bullying and Internet Addiction
Cyber Bullying and Internet AddictionAruell Tamaray
 
Cyber Bullying new
Cyber Bullying newCyber Bullying new
Cyber Bullying newguest03780d
 
Cyberbullying slidedeck
Cyberbullying slidedeckCyberbullying slidedeck
Cyberbullying slidedeckbyau1111
 
Social networks 2013-dwm
Social networks 2013-dwmSocial networks 2013-dwm
Social networks 2013-dwmjsgagnon
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying John Field
 
DR JON GOLDIN - THE RISKS AND BENEFITS OF SOCIAL MEDIA ON THE MENTAL HEALTH O...
DR JON GOLDIN - THE RISKS AND BENEFITS OF SOCIAL MEDIA ON THE MENTAL HEALTH O...DR JON GOLDIN - THE RISKS AND BENEFITS OF SOCIAL MEDIA ON THE MENTAL HEALTH O...
DR JON GOLDIN - THE RISKS AND BENEFITS OF SOCIAL MEDIA ON THE MENTAL HEALTH O...iCAADEvents
 
COM 427 Social Media and Security
COM 427 Social Media and SecurityCOM 427 Social Media and Security
COM 427 Social Media and SecurityKyle Basedow
 
Globalization Presentation
Globalization PresentationGlobalization Presentation
Globalization Presentationblm2010
 
Film assignment 2 - Connie Li
Film assignment 2 - Connie LiFilm assignment 2 - Connie Li
Film assignment 2 - Connie LiConnie Li
 

What's hot (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying No27 2009 Laurence And Saad
Cyberbullying No27 2009 Laurence And SaadCyberbullying No27 2009 Laurence And Saad
Cyberbullying No27 2009 Laurence And Saad
 
Plugged in and tuned out
Plugged in and tuned outPlugged in and tuned out
Plugged in and tuned out
 
Sexting
SextingSexting
Sexting
 
Cyber sex preo-rf-v5
Cyber sex preo-rf-v5Cyber sex preo-rf-v5
Cyber sex preo-rf-v5
 
Soc presentation
Soc presentationSoc presentation
Soc presentation
 
Cyber Bullying and Internet Addiction
Cyber Bullying and Internet AddictionCyber Bullying and Internet Addiction
Cyber Bullying and Internet Addiction
 
Cyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells UsCyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells Us
 
Cyber Bullying new
Cyber Bullying newCyber Bullying new
Cyber Bullying new
 
What is Cyberbullying? (#WVUCommMOOC)
What is Cyberbullying? (#WVUCommMOOC)What is Cyberbullying? (#WVUCommMOOC)
What is Cyberbullying? (#WVUCommMOOC)
 
Cyberbullying slidedeck
Cyberbullying slidedeckCyberbullying slidedeck
Cyberbullying slidedeck
 
Sexting
SextingSexting
Sexting
 
Sexting
SextingSexting
Sexting
 
Social networks 2013-dwm
Social networks 2013-dwmSocial networks 2013-dwm
Social networks 2013-dwm
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
DR JON GOLDIN - THE RISKS AND BENEFITS OF SOCIAL MEDIA ON THE MENTAL HEALTH O...
DR JON GOLDIN - THE RISKS AND BENEFITS OF SOCIAL MEDIA ON THE MENTAL HEALTH O...DR JON GOLDIN - THE RISKS AND BENEFITS OF SOCIAL MEDIA ON THE MENTAL HEALTH O...
DR JON GOLDIN - THE RISKS AND BENEFITS OF SOCIAL MEDIA ON THE MENTAL HEALTH O...
 
COM 427 Social Media and Security
COM 427 Social Media and SecurityCOM 427 Social Media and Security
COM 427 Social Media and Security
 
Week 5
Week 5Week 5
Week 5
 
Globalization Presentation
Globalization PresentationGlobalization Presentation
Globalization Presentation
 
Film assignment 2 - Connie Li
Film assignment 2 - Connie LiFilm assignment 2 - Connie Li
Film assignment 2 - Connie Li
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

English 102 Recast Project

  • 2. Cyber harassment usually pertains to threatening or harassing email messages, instant messages, or to blog entries or websites dedicated solely to tormenting an individual. -According to the NCLS-
  • 3.
  • 4.  You can report comments on sites like Facebook and Twitter and have it removed.  If the comments are considered libel or slander, you can file a civil or federal suit.  The book Virtually Criminal by Matthew Williams quote. “ The Internet is too widespread to be easily dominated by any single government.”
  • 5.