SlideShare a Scribd company logo
1 of 7
• What is cyberbullying, exactly?
"Cyberbullying" is when a child, preteen or teen is
   tormented, threatened, harassed, humiliated, embarrassed or
   otherwise targeted by another child, preteen or teen using the
   Internet, interactive and digital technologies or mobile phones.
• The methods used are limited only by the child's imagination and
   access to technology. And the cyberbully one moment may become
   the victim the next. The kids often change roles, going from victim
   to bully and back again.
An usual case im Clincton Missouri


 This year in Clinton Missouri, charges were filed against a teenager who allegedly
    created a fake Facebook account to serve as a competition against a young girl
    who was interested romantically in a male student. The account was created by
     another girl who wanted the boy all to herself, the suit claims. As a result, the
  targeted individual underwent significant levels of stress which affected her studies
     and her ability to attend school regularly. The case is one of many that feature
  phony accounts on Facebook or MySpace that are used to harass young people or
                               stir up trouble among friends.

Cyber Bullying has become a worldwide problem because of the difficulty to track its
  occurrences. It some cases it has been accepted as humor, but when is it taken to
 far? When a child has taken her own life because she was cyber bullied, we know it
                            has been taken way too far.
• Why do kids cyberbully each other?
Who knows why kids do anything? When it comes to cyberbullying, they are often
  motivated by anger, revenge or frustration. Sometimes they do it for entertainment
  or because they are bored and have too much time on their hands and too many
  tech toys available to them. Many do it for laughs or to get a reaction. Some do it by
  accident, and either send a message to the wrong recipient or didn't think before
  they did something. The Power-hungry do it to torment others and for their ego.
  Revenge of the nerd may start out defending themselves from traditional bullying
  only to find that they enjoy being the tough guy or gal. Mean girls do it to help
  bolster or remind people of their own social standing. And some think they are
  righting wrong and standing up for others.
• Preventing cyberbullying
Educating the kids about the consequences Teaching them to respect others and to
   take a stand against bullying of all kinds helps too.
• What's the Parents' Role in This?
Parents need to be the one trusted place kids can go when things go wrong online and
   offline. Yet they often are the one place kids avoid when things go wrong online.
   Why? Parents tend to overreact. Most children will avoid telling their parents about
   a cyberbullying incident fearing they will only make things worse. (Calling the other
   parents, the school, blaming the victim or taking away Internet privileges.) Trust in
   their kids, it is very important
• When schools try and get involved by disciplining the student for cyberbullying
   actions that took place off-campus and outside of school hours, they are often sued
   for exceeding their authority and violating the student's free speech right. They
   also, often lose. Schools can be very effective brokers in working with the parents
   to stop and remedy cyberbullying situations. They can also educate the students on
   cyberethics and the law. If schools are creative, they can sometimes avoid the
   claim that their actions exceeded their legal authority for off-campus cyberbullying
   actions.
• Percentages:


   How victims felt?
To finish this work of cyberbullying we'll give our
                       opinion:
   we believe that cyberbullying today, with so
               many technologies, with
   the slightest action this exists, from a posting
             on facebook or even a joke.
Also another point of view, is that now everyone
    has access to the media, so we think it is the
    responsibility of parents to put a limit to the
  internet, and as we said in the beginning, teach
    respect to others, because in extreme cases
       a complete joke can end like a tragedy

More Related Content

What's hot

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingwrhawkins
 
Cyber Bulling On School Grounds
Cyber Bulling On School GroundsCyber Bulling On School Grounds
Cyber Bulling On School Groundskerr1va
 
Statistics and salient information
Statistics and salient informationStatistics and salient information
Statistics and salient informationsmithmpa
 
Sarah doty cyber bullying
Sarah doty cyber bullyingSarah doty cyber bullying
Sarah doty cyber bullyingSarah Doty
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenHomeGuides
 
Girls Talk August 2016
Girls Talk August 2016Girls Talk August 2016
Girls Talk August 2016Kathryn White
 
Nicki Karet & Alison Preston
Nicki Karet & Alison PrestonNicki Karet & Alison Preston
Nicki Karet & Alison PrestonMRS
 
Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Children, Church and the Digital Age (#DigitalParenting with @drbexl)Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Children, Church and the Digital Age (#DigitalParenting with @drbexl)Bex Lewis
 
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year oldsRumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year oldsYTH
 
Cyber Bulling Presentation
Cyber Bulling PresentationCyber Bulling Presentation
Cyber Bulling Presentationvasta1sk
 
Ciberbullying alfio el mas raro
Ciberbullying alfio el mas raroCiberbullying alfio el mas raro
Ciberbullying alfio el mas raroAlfio Alfieri
 
The effects of social media on children
The effects of social media on childrenThe effects of social media on children
The effects of social media on childrenChris Jones
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014- Mark - Fullbright
 

What's hot (19)

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Bulling On School Grounds
Cyber Bulling On School GroundsCyber Bulling On School Grounds
Cyber Bulling On School Grounds
 
Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)
 
Statistics and salient information
Statistics and salient informationStatistics and salient information
Statistics and salient information
 
Sarah doty cyber bullying
Sarah doty cyber bullyingSarah doty cyber bullying
Sarah doty cyber bullying
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Girls Talk August 2016
Girls Talk August 2016Girls Talk August 2016
Girls Talk August 2016
 
April27 dyc
April27 dycApril27 dyc
April27 dyc
 
Nicki Karet & Alison Preston
Nicki Karet & Alison PrestonNicki Karet & Alison Preston
Nicki Karet & Alison Preston
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Children, Church and the Digital Age (#DigitalParenting with @drbexl)Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Children, Church and the Digital Age (#DigitalParenting with @drbexl)
 
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year oldsRumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
Cyber Bulling Presentation
Cyber Bulling PresentationCyber Bulling Presentation
Cyber Bulling Presentation
 
Ciberbullying alfio el mas raro
Ciberbullying alfio el mas raroCiberbullying alfio el mas raro
Ciberbullying alfio el mas raro
 
The effects of social media on children
The effects of social media on childrenThe effects of social media on children
The effects of social media on children
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
 

Similar to Vickyy delfi ingles, cyberbullying

Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngmiliarguelles1
 
Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Joyce Hirsh
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
CyberbullyingspecR Smith
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfCharanBobby69CB
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingR Smith
 
Cyberbullying and internent addiction
Cyberbullying  and internent addictionCyberbullying  and internent addiction
Cyberbullying and internent addictionChristopher Mejia
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
CyberbullyingspecR Smith
 
How to stop cyber bullying
How to stop cyber bullyingHow to stop cyber bullying
How to stop cyber bullyingBullyvention
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointshannonmf
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009bermandry
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptNaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptpurush203
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 

Similar to Vickyy delfi ingles, cyberbullying (20)

Cyberbulling!
Cyberbulling!Cyberbulling!
Cyberbulling!
 
cyberbullying TIC
cyberbullying TICcyberbullying TIC
cyberbullying TIC
 
Bullying vs cyber bullying italy
Bullying vs cyber bullying italyBullying vs cyber bullying italy
Bullying vs cyber bullying italy
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
 
Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying and internent addiction
Cyberbullying  and internent addictionCyberbullying  and internent addiction
Cyberbullying and internent addiction
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
How to stop cyber bullying
How to stop cyber bullyingHow to stop cyber bullying
How to stop cyber bullying
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Edp 279 unit 2.4
Edp 279 unit 2.4Edp 279 unit 2.4
Edp 279 unit 2.4
 

More from victoriapp

Vicky paz posse
Vicky paz posseVicky paz posse
Vicky paz possevictoriapp
 
Trabajo practico 1 vicky pazposse
Trabajo practico 1 vicky pazposseTrabajo practico 1 vicky pazposse
Trabajo practico 1 vicky pazpossevictoriapp
 
Trabajo practico n 1
Trabajo practico n 1Trabajo practico n 1
Trabajo practico n 1victoriapp
 
Trabajo practico n 2
Trabajo practico n 2Trabajo practico n 2
Trabajo practico n 2victoriapp
 
Cyberbullyingtrabajopractivco6
Cyberbullyingtrabajopractivco6Cyberbullyingtrabajopractivco6
Cyberbullyingtrabajopractivco6victoriapp
 
Trabajo practico n 4
Trabajo practico n 4Trabajo practico n 4
Trabajo practico n 4victoriapp
 
Trabajo practico n 2
Trabajo practico n 2Trabajo practico n 2
Trabajo practico n 2victoriapp
 
Resolución de trabrajo practico n 3
Resolución de trabrajo practico n 3Resolución de trabrajo practico n 3
Resolución de trabrajo practico n 3victoriapp
 

More from victoriapp (8)

Vicky paz posse
Vicky paz posseVicky paz posse
Vicky paz posse
 
Trabajo practico 1 vicky pazposse
Trabajo practico 1 vicky pazposseTrabajo practico 1 vicky pazposse
Trabajo practico 1 vicky pazposse
 
Trabajo practico n 1
Trabajo practico n 1Trabajo practico n 1
Trabajo practico n 1
 
Trabajo practico n 2
Trabajo practico n 2Trabajo practico n 2
Trabajo practico n 2
 
Cyberbullyingtrabajopractivco6
Cyberbullyingtrabajopractivco6Cyberbullyingtrabajopractivco6
Cyberbullyingtrabajopractivco6
 
Trabajo practico n 4
Trabajo practico n 4Trabajo practico n 4
Trabajo practico n 4
 
Trabajo practico n 2
Trabajo practico n 2Trabajo practico n 2
Trabajo practico n 2
 
Resolución de trabrajo practico n 3
Resolución de trabrajo practico n 3Resolución de trabrajo practico n 3
Resolución de trabrajo practico n 3
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Vickyy delfi ingles, cyberbullying

  • 1.
  • 2. • What is cyberbullying, exactly? "Cyberbullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. • The methods used are limited only by the child's imagination and access to technology. And the cyberbully one moment may become the victim the next. The kids often change roles, going from victim to bully and back again.
  • 3. An usual case im Clincton Missouri This year in Clinton Missouri, charges were filed against a teenager who allegedly created a fake Facebook account to serve as a competition against a young girl who was interested romantically in a male student. The account was created by another girl who wanted the boy all to herself, the suit claims. As a result, the targeted individual underwent significant levels of stress which affected her studies and her ability to attend school regularly. The case is one of many that feature phony accounts on Facebook or MySpace that are used to harass young people or stir up trouble among friends. Cyber Bullying has become a worldwide problem because of the difficulty to track its occurrences. It some cases it has been accepted as humor, but when is it taken to far? When a child has taken her own life because she was cyber bullied, we know it has been taken way too far.
  • 4. • Why do kids cyberbully each other? Who knows why kids do anything? When it comes to cyberbullying, they are often motivated by anger, revenge or frustration. Sometimes they do it for entertainment or because they are bored and have too much time on their hands and too many tech toys available to them. Many do it for laughs or to get a reaction. Some do it by accident, and either send a message to the wrong recipient or didn't think before they did something. The Power-hungry do it to torment others and for their ego. Revenge of the nerd may start out defending themselves from traditional bullying only to find that they enjoy being the tough guy or gal. Mean girls do it to help bolster or remind people of their own social standing. And some think they are righting wrong and standing up for others.
  • 5. • Preventing cyberbullying Educating the kids about the consequences Teaching them to respect others and to take a stand against bullying of all kinds helps too. • What's the Parents' Role in This? Parents need to be the one trusted place kids can go when things go wrong online and offline. Yet they often are the one place kids avoid when things go wrong online. Why? Parents tend to overreact. Most children will avoid telling their parents about a cyberbullying incident fearing they will only make things worse. (Calling the other parents, the school, blaming the victim or taking away Internet privileges.) Trust in their kids, it is very important • When schools try and get involved by disciplining the student for cyberbullying actions that took place off-campus and outside of school hours, they are often sued for exceeding their authority and violating the student's free speech right. They also, often lose. Schools can be very effective brokers in working with the parents to stop and remedy cyberbullying situations. They can also educate the students on cyberethics and the law. If schools are creative, they can sometimes avoid the claim that their actions exceeded their legal authority for off-campus cyberbullying actions.
  • 6. • Percentages: How victims felt?
  • 7. To finish this work of cyberbullying we'll give our opinion: we believe that cyberbullying today, with so many technologies, with the slightest action this exists, from a posting on facebook or even a joke. Also another point of view, is that now everyone has access to the media, so we think it is the responsibility of parents to put a limit to the internet, and as we said in the beginning, teach respect to others, because in extreme cases a complete joke can end like a tragedy