SlideShare a Scribd company logo
Stop Cyberbullying Day –
Eye-Opening Statistics and
Preventive Measures
#STOPCYBERBULLYINGDAY
• As much as 10% of middle and high school students in a survey were
found to have been encountered with hate terms used by others
against them.
• 50% of young people were found to hide about the cyberbullying
attacks that happen to them from their parents.
• Amongst every 3 young individuals in a survey, more than 1 individual
was found to have experienced some form of cyber threats online.
• As much as 25% of adolescents and teenagers have experienced
repeated bullying over their mobile phones or the Internet.
• As fewer as only 1 in every 5 incidents of bullying is reported to the
law enforcement.
• Criticizing comments and hurtful rumors are some of the most
common ways by which people are bullied.
• Low self-esteem and social isolation are the two most common
impacts of cyberbullying on victims. In worst case scenarios, victims
even think or commit suicide as well.
Anti-Cyberbullying Measures
Promote Awareness:
• Tell, share, discuss and do everything to bring awareness amongst
people about cyberbullying.
• Exchange ideas and formulate strategies to help those who have been
bullied and save others from becoming victims.
Report Authorities:
• If you have been experiencing bullying of any form or feel that
someone is being tortured, then don’t try to hide/ignore things.
• Immediately report the concerned law authorities so that they can
help the victim in getting out of the situation and charge the bully.
Be a Responsible Parent:
• As a parent, it is your duty to monitor your child’s online activities and his
daily routine.
• Keep a close watch on how much time he spends browsing the internet,
who all he meets outside, what websites does he visit on the internet, etc.
• However, use a parental control software to ensure that your monitoring
activities remain secret from your child.
#STOPCYBERBULLYINGDAY
www.reveantivirus.com

More Related Content

What's hot

Cyberbullying tips from connect safely
Cyberbullying tips from connect safelyCyberbullying tips from connect safely
Cyberbullying tips from connect safely
Curso RRSS
 
2013 bullying & cyber bullying prevention
2013 bullying & cyber bullying prevention2013 bullying & cyber bullying prevention
2013 bullying & cyber bullying preventioneverettwebmaster
 
Cyber bullying vs traditional bullying
Cyber bullying vs traditional bullyingCyber bullying vs traditional bullying
Cyber bullying vs traditional bullying
Aliasgher Ahmedabadwala
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentation
clifforddyyy
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
Ziar Khan
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Suresh Kumar Murugesan
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Doha qaradeh
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Zarmeen Durrani
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Quirky Kid
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
ConnectSafely
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
Apostolos Syropoulos
 
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Scott Mills
 
21st Century Bullying Crueler Than Ever
21st Century Bullying   Crueler Than Ever21st Century Bullying   Crueler Than Ever
21st Century Bullying Crueler Than Evermbernstein
 
Cyberbullying in Social Media_FINAL without video clip_09.14.15
Cyberbullying in Social Media_FINAL without video clip_09.14.15Cyberbullying in Social Media_FINAL without video clip_09.14.15
Cyberbullying in Social Media_FINAL without video clip_09.14.15Sue DeRosier
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
samhauck
 
08 09 S2t Ppt
08 09 S2t Ppt08 09 S2t Ppt
08 09 S2t Ppt
safe2tell
 

What's hot (20)

Edu352 dis2 w1
Edu352 dis2 w1Edu352 dis2 w1
Edu352 dis2 w1
 
Cyberbullying tips from connect safely
Cyberbullying tips from connect safelyCyberbullying tips from connect safely
Cyberbullying tips from connect safely
 
2013 bullying & cyber bullying prevention
2013 bullying & cyber bullying prevention2013 bullying & cyber bullying prevention
2013 bullying & cyber bullying prevention
 
Bully
BullyBully
Bully
 
Cyber bullying vs traditional bullying
Cyber bullying vs traditional bullyingCyber bullying vs traditional bullying
Cyber bullying vs traditional bullying
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentation
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
 
21st Century Bullying Crueler Than Ever
21st Century Bullying   Crueler Than Ever21st Century Bullying   Crueler Than Ever
21st Century Bullying Crueler Than Ever
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying in Social Media_FINAL without video clip_09.14.15
Cyberbullying in Social Media_FINAL without video clip_09.14.15Cyberbullying in Social Media_FINAL without video clip_09.14.15
Cyberbullying in Social Media_FINAL without video clip_09.14.15
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
08 09 S2t Ppt
08 09 S2t Ppt08 09 S2t Ppt
08 09 S2t Ppt
 

Similar to Stop cyberbullying day – eye opening statistics and preventive measures

Perils of social media
Perils of social mediaPerils of social media
Perils of social media
Inderjeet Singh
 
Cabatian & Estrada 1
Cabatian & Estrada 1Cabatian & Estrada 1
Cabatian & Estrada 1
Samphiriane
 
Bullying
BullyingBullying
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big Problem
Gail Rebuck
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
springvillegi
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
bl03cook
 
Csis200 cyberbullying
Csis200 cyberbullyingCsis200 cyberbullying
Csis200 cyberbullying
Bl03_Cook
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
pardolopez
 
Cyberbullying and Internet Addiction
Cyberbullying and Internet AddictionCyberbullying and Internet Addiction
Cyberbullying and Internet Addiction
Reuben Millare
 
Cyberbullying and Internet addiction by Jhoanne Erika Masaya
Cyberbullying and Internet addiction by Jhoanne Erika MasayaCyberbullying and Internet addiction by Jhoanne Erika Masaya
Cyberbullying and Internet addiction by Jhoanne Erika Masaya
Jhoanneerika
 
Cyberbullying and internent addiction
Cyberbullying  and internent addictionCyberbullying  and internent addiction
Cyberbullying and internent addiction
Christopher Mejia
 
What is bullying
What is bullyingWhat is bullying
What is bullying
Dev Chauhan
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
NiravD3
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-tr
Elmer Sunga
 
cyber bulling
 cyber bulling cyber bulling
cyber bulling
superior law college
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
How to stop cyber bullying
How to stop cyber bullyingHow to stop cyber bullying
How to stop cyber bullying
Bullyvention
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
CoachElrod
 
Statistics and salient information
Statistics and salient informationStatistics and salient information
Statistics and salient information
smithmpa
 
Cyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItCyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent It
FeliciaDixon5
 

Similar to Stop cyberbullying day – eye opening statistics and preventive measures (20)

Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
Cabatian & Estrada 1
Cabatian & Estrada 1Cabatian & Estrada 1
Cabatian & Estrada 1
 
Bullying
BullyingBullying
Bullying
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big Problem
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Csis200 cyberbullying
Csis200 cyberbullyingCsis200 cyberbullying
Csis200 cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying and Internet Addiction
Cyberbullying and Internet AddictionCyberbullying and Internet Addiction
Cyberbullying and Internet Addiction
 
Cyberbullying and Internet addiction by Jhoanne Erika Masaya
Cyberbullying and Internet addiction by Jhoanne Erika MasayaCyberbullying and Internet addiction by Jhoanne Erika Masaya
Cyberbullying and Internet addiction by Jhoanne Erika Masaya
 
Cyberbullying and internent addiction
Cyberbullying  and internent addictionCyberbullying  and internent addiction
Cyberbullying and internent addiction
 
What is bullying
What is bullyingWhat is bullying
What is bullying
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-tr
 
cyber bulling
 cyber bulling cyber bulling
cyber bulling
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
How to stop cyber bullying
How to stop cyber bullyingHow to stop cyber bullying
How to stop cyber bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Statistics and salient information
Statistics and salient informationStatistics and salient information
Statistics and salient information
 
Cyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItCyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent It
 

More from kanika sharma

5 things to remember for successful SMS marketing
5 things to remember for successful SMS marketing5 things to remember for successful SMS marketing
5 things to remember for successful SMS marketing
kanika sharma
 
Top 5 strategies to boost your business marketing
Top 5 strategies to boost your business marketingTop 5 strategies to boost your business marketing
Top 5 strategies to boost your business marketing
kanika sharma
 
Why is Bulk SMS a better promotional tool?
Why is Bulk SMS a better promotional tool?Why is Bulk SMS a better promotional tool?
Why is Bulk SMS a better promotional tool?
kanika sharma
 
7 tips to prevent yourself from becoming a victim of Cyber Attacks
7 tips to prevent yourself from becoming a victim of Cyber Attacks7 tips to prevent yourself from becoming a victim of Cyber Attacks
7 tips to prevent yourself from becoming a victim of Cyber Attacks
kanika sharma
 
10 Tips to Secure Your Password
10 Tips to Secure Your Password10 Tips to Secure Your Password
10 Tips to Secure Your Password
kanika sharma
 
Security threats for SME's
Security threats for SME'sSecurity threats for SME's
Security threats for SME's
kanika sharma
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attacks
kanika sharma
 
Internet security tips that every parent should know
Internet security tips that every parent should knowInternet security tips that every parent should know
Internet security tips that every parent should know
kanika sharma
 
Safety tips when using a public computer
Safety tips when using a public computerSafety tips when using a public computer
Safety tips when using a public computer
kanika sharma
 
What are bad passwords?
What are bad passwords?What are bad passwords?
What are bad passwords?
kanika sharma
 
Top 5 website security myths
Top 5 website security mythsTop 5 website security myths
Top 5 website security myths
kanika sharma
 
6 interesting things to know about Bad Rabbit Ransomware
6 interesting things to know about Bad Rabbit Ransomware6 interesting things to know about Bad Rabbit Ransomware
6 interesting things to know about Bad Rabbit Ransomware
kanika sharma
 
Favorite tools of hackers to target mobile users
Favorite tools of hackers to target mobile usersFavorite tools of hackers to target mobile users
Favorite tools of hackers to target mobile users
kanika sharma
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
kanika sharma
 
don’t forget to keep these 5 Travel items
 don’t forget to keep these 5 Travel items don’t forget to keep these 5 Travel items
don’t forget to keep these 5 Travel items
kanika sharma
 
Famous tourist attractions to see in Chile –
Famous tourist attractions to see in Chile –Famous tourist attractions to see in Chile –
Famous tourist attractions to see in Chile –
kanika sharma
 
Japan travel – do you know these 11
Japan travel – do you know these 11Japan travel – do you know these 11
Japan travel – do you know these 11
kanika sharma
 
Device security Tips
Device security TipsDevice security Tips
Device security Tips
kanika sharma
 
How to keep your laptop & mobile safe
How to keep your laptop & mobile safeHow to keep your laptop & mobile safe
How to keep your laptop & mobile safe
kanika sharma
 
What is cyber crime
What is cyber crimeWhat is cyber crime
What is cyber crime
kanika sharma
 

More from kanika sharma (20)

5 things to remember for successful SMS marketing
5 things to remember for successful SMS marketing5 things to remember for successful SMS marketing
5 things to remember for successful SMS marketing
 
Top 5 strategies to boost your business marketing
Top 5 strategies to boost your business marketingTop 5 strategies to boost your business marketing
Top 5 strategies to boost your business marketing
 
Why is Bulk SMS a better promotional tool?
Why is Bulk SMS a better promotional tool?Why is Bulk SMS a better promotional tool?
Why is Bulk SMS a better promotional tool?
 
7 tips to prevent yourself from becoming a victim of Cyber Attacks
7 tips to prevent yourself from becoming a victim of Cyber Attacks7 tips to prevent yourself from becoming a victim of Cyber Attacks
7 tips to prevent yourself from becoming a victim of Cyber Attacks
 
10 Tips to Secure Your Password
10 Tips to Secure Your Password10 Tips to Secure Your Password
10 Tips to Secure Your Password
 
Security threats for SME's
Security threats for SME'sSecurity threats for SME's
Security threats for SME's
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attacks
 
Internet security tips that every parent should know
Internet security tips that every parent should knowInternet security tips that every parent should know
Internet security tips that every parent should know
 
Safety tips when using a public computer
Safety tips when using a public computerSafety tips when using a public computer
Safety tips when using a public computer
 
What are bad passwords?
What are bad passwords?What are bad passwords?
What are bad passwords?
 
Top 5 website security myths
Top 5 website security mythsTop 5 website security myths
Top 5 website security myths
 
6 interesting things to know about Bad Rabbit Ransomware
6 interesting things to know about Bad Rabbit Ransomware6 interesting things to know about Bad Rabbit Ransomware
6 interesting things to know about Bad Rabbit Ransomware
 
Favorite tools of hackers to target mobile users
Favorite tools of hackers to target mobile usersFavorite tools of hackers to target mobile users
Favorite tools of hackers to target mobile users
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
 
don’t forget to keep these 5 Travel items
 don’t forget to keep these 5 Travel items don’t forget to keep these 5 Travel items
don’t forget to keep these 5 Travel items
 
Famous tourist attractions to see in Chile –
Famous tourist attractions to see in Chile –Famous tourist attractions to see in Chile –
Famous tourist attractions to see in Chile –
 
Japan travel – do you know these 11
Japan travel – do you know these 11Japan travel – do you know these 11
Japan travel – do you know these 11
 
Device security Tips
Device security TipsDevice security Tips
Device security Tips
 
How to keep your laptop & mobile safe
How to keep your laptop & mobile safeHow to keep your laptop & mobile safe
How to keep your laptop & mobile safe
 
What is cyber crime
What is cyber crimeWhat is cyber crime
What is cyber crime
 

Recently uploaded

test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 

Recently uploaded (20)

test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 

Stop cyberbullying day – eye opening statistics and preventive measures

  • 1. Stop Cyberbullying Day – Eye-Opening Statistics and Preventive Measures #STOPCYBERBULLYINGDAY
  • 2. • As much as 10% of middle and high school students in a survey were found to have been encountered with hate terms used by others against them.
  • 3. • 50% of young people were found to hide about the cyberbullying attacks that happen to them from their parents.
  • 4. • Amongst every 3 young individuals in a survey, more than 1 individual was found to have experienced some form of cyber threats online.
  • 5. • As much as 25% of adolescents and teenagers have experienced repeated bullying over their mobile phones or the Internet.
  • 6. • As fewer as only 1 in every 5 incidents of bullying is reported to the law enforcement.
  • 7. • Criticizing comments and hurtful rumors are some of the most common ways by which people are bullied.
  • 8. • Low self-esteem and social isolation are the two most common impacts of cyberbullying on victims. In worst case scenarios, victims even think or commit suicide as well.
  • 10. Promote Awareness: • Tell, share, discuss and do everything to bring awareness amongst people about cyberbullying. • Exchange ideas and formulate strategies to help those who have been bullied and save others from becoming victims.
  • 11. Report Authorities: • If you have been experiencing bullying of any form or feel that someone is being tortured, then don’t try to hide/ignore things. • Immediately report the concerned law authorities so that they can help the victim in getting out of the situation and charge the bully.
  • 12. Be a Responsible Parent: • As a parent, it is your duty to monitor your child’s online activities and his daily routine. • Keep a close watch on how much time he spends browsing the internet, who all he meets outside, what websites does he visit on the internet, etc. • However, use a parental control software to ensure that your monitoring activities remain secret from your child.