SlideShare a Scribd company logo
1 of 14
+
Cyberbullying
Nicole Lippert Andonegui 6ºB L.N.13
Converstion
+
What is cyberbullying??
Cyberbullying is a situation in which a person
is verbally abused or threatened via
electronic media, such as social websites,
email or text messaging. The text can include
insults, threats or harmful rumors.
+
Origins:
Cyberbullying emerged as online
technology became more
accesible to teens. According to
the Christian Science
monitor, After the school shooting
at Columbine High Scool in
1999, many schools began looking
at bullying as a serious
problem, and some instituted zero-
bullying policies. But cyberspace is
a new territory, and schools aren`t
sure how far to extend their
jurisdiction.
+
Causes:
The teen years can be cruel.
Nearly everyone has been part of
some form of bullying during his
life time.
Today, cyberbullying, has become
the newest form of adolescent
hostility. But what causes a teen
to become a cyber-bully?
Results revealed that the teen
with the least amount of parental
supervision engaged in the most
cyberbullying. Also depression,
drug and alchohol use, hostility,
etc.
+
Children in Risk of being Bullied
Generally, children who are bullied have one ore
more of the following risk factors:
·Are perceived as different from their peers, such as
being overweight, underweight, wearing glasses or
different clothing, being new to school, or being
unable to afford what kids consider “cool.”
·Are perceived as weak or unable to defend
themselves.
·Are depressed, anxious, or have low self esteem.
·Are less popular than others and have few friends.
However, even if a child has these risk factors, it
doesn´t mean that the will be bullied.
+
Consequences:
There can be some
consequences like:
·depression.
·victims become cyberbullies.
·Thoughts of suicide and suicide
attempts.
·school performance can be
affected.
·Reputation can be damaged.
Preventing Actions:
Parents and kids can prevent cyberbullying. Together, they can
explore safe ways to use technology.
Beware of what your kids are doing online- have sense of what they
do online and in texts. Learn about the sites they like. Try out the
devices they use. Encourage your kids to tell you immediately if
they, or someone they know, is being cyberbullied.
Establish rules about technology use- Establish rules about
appropiate use of computers, cell phones, and other technology. For
example, be clear about what sites they can visit and what they are
pemitted to do when they´re online.
+
Social Networks
Conversation
+It´s well known that facebook does not permit users
under 13 years old and many kids find a way to use
social networking site anyway. All that could change,
though, now facebook is developing technology that
would allow kids under 13 to use the site under parental
supervision, they would connect children´s accounts to
their parents´, allowing mom and dad to decide whom
their kids can “friend” and what applications they can
use.
Many kids lie about their ages to get accounts. Last
year, Consumer Reports said 7.5 million children under
the age of 13 were using the site, including more than 5
million under the age of 10. And last fall, a study
sponsored by Microsoft Research found 36 percent of
parents were aware that their children joined facebook
before age 13, and many even helped their kids to do
so.
How can social networks be harmful or useful?
Harmful
Social networking is really making us less social. Being social and connected has
become dangerous for both mind and body, because people are becoming less and
less likely to go out to create social situations where they would interact with people
face to face. There is so much that people can learn from their brief interactions
with one another. People are choosing to stay in and stay online versus going out
and being social and doing anything physical.
Useful
In a social networking community, it is easy to share information continously and this
is of huge importance when running an online bussiness. If you have a company
you want to be successful, you have to let others know about it and get them
interested in what you do. When participating in a social networking community, you
can let others know a massive amount of information about your company to attract
attention and develop their interest further.
+
Pros Cons
Social networking sites spread
information faster than any other
media.
Social media enables spread of
unreliable and false information.
Social networking sites allow
people to improve their
relationships and make new
friends.
Students who are heavy social
media users tend to have lower
grades.
Social media sites help employers
find employees and job-seekers
find work.
Social networking sites can lead
stress and offline relationship
problems.
Colleges and universities use
social media to recruit and retain
students.
Using social media can harm job
stability and employment
prospects.
Faster communication. Social media causes people to
spend less time interaction face-
to-face.
Social networking sites facilate
cyberbullying.
+
References from cyberbullying:
www.stopbullying.gov
kidshealth.org/parent/positive/talk/cyberbullying.html
References from social networks:
www.learningdiversity.org/2012/11/is-social-networking-
dangerous-for-teenagers/
socialnetworking.procon.org
+
END!

More Related Content

What's hot

Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and postervictoriahoo
 
Cyberbulling and social networks for children under 13
Cyberbulling and social networks for children under 13Cyberbulling and social networks for children under 13
Cyberbulling and social networks for children under 13Pato Riveroll
 
Parent's e safety presentation 2011
Parent's e safety presentation 2011Parent's e safety presentation 2011
Parent's e safety presentation 2011DHE2008
 
10 Social Media Do's and Don'ts for High School Students
10 Social Media Do's and Don'ts for High School Students10 Social Media Do's and Don'ts for High School Students
10 Social Media Do's and Don'ts for High School StudentsYour College Concierge
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshareLoreto Normanurst
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenHomeGuides
 
Effects of Social Media on Young Adults
Effects of Social Media on Young AdultsEffects of Social Media on Young Adults
Effects of Social Media on Young AdultsRatan Rajpal
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents PresentationToby Treacher
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointhmorrell1
 
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sbSafeChildUAE1
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of TeensKate Gukeisen
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 
Parents Guide to Facebook Updated 2012
Parents Guide to Facebook Updated 2012Parents Guide to Facebook Updated 2012
Parents Guide to Facebook Updated 2012- Mark - Fullbright
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents Jennifer Holena
 
Keeping kids safe in the digital era
Keeping kids safe in the digital eraKeeping kids safe in the digital era
Keeping kids safe in the digital erabns_library
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internetmalissa_1041
 
The social Media & its Impact on socity
The social Media & its Impact on socityThe social Media & its Impact on socity
The social Media & its Impact on socityHasnain Arif
 
Teens, social media and addiction 5.04.16
Teens, social media and addiction 5.04.16Teens, social media and addiction 5.04.16
Teens, social media and addiction 5.04.16Michael Torres
 

What's hot (20)

Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
 
MySpace
MySpaceMySpace
MySpace
 
Cyberbulling and social networks for children under 13
Cyberbulling and social networks for children under 13Cyberbulling and social networks for children under 13
Cyberbulling and social networks for children under 13
 
Parent's e safety presentation 2011
Parent's e safety presentation 2011Parent's e safety presentation 2011
Parent's e safety presentation 2011
 
10 Social Media Do's and Don'ts for High School Students
10 Social Media Do's and Don'ts for High School Students10 Social Media Do's and Don'ts for High School Students
10 Social Media Do's and Don'ts for High School Students
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshare
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Effects of Social Media on Young Adults
Effects of Social Media on Young AdultsEffects of Social Media on Young Adults
Effects of Social Media on Young Adults
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sb
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of Teens
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Parents Guide to Facebook Updated 2012
Parents Guide to Facebook Updated 2012Parents Guide to Facebook Updated 2012
Parents Guide to Facebook Updated 2012
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
 
Keeping kids safe in the digital era
Keeping kids safe in the digital eraKeeping kids safe in the digital era
Keeping kids safe in the digital era
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
 
The social Media & its Impact on socity
The social Media & its Impact on socityThe social Media & its Impact on socity
The social Media & its Impact on socity
 
Teens, social media and addiction 5.04.16
Teens, social media and addiction 5.04.16Teens, social media and addiction 5.04.16
Teens, social media and addiction 5.04.16
 

Viewers also liked

Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersMemorial University
 
Cyberbully Awareness Workshop
Cyberbully Awareness WorkshopCyberbully Awareness Workshop
Cyberbully Awareness Workshopwolfxman
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and securitynikunjandy
 
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti SajibeKanti
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017NRC
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 

Viewers also liked (10)

Buster
BusterBuster
Buster
 
Note on CyberBully
Note on CyberBullyNote on CyberBully
Note on CyberBully
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and Teachers
 
Cyberbully Awareness Workshop
Cyberbully Awareness WorkshopCyberbully Awareness Workshop
Cyberbully Awareness Workshop
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 

Similar to Cyberbullying and Social Networks: Risks and Prevention

Define cyberbullying and use two workable ethical theories to analyz.pdf
Define cyberbullying and use two workable ethical theories to analyz.pdfDefine cyberbullying and use two workable ethical theories to analyz.pdf
Define cyberbullying and use two workable ethical theories to analyz.pdfalshaikhkhanzariarts
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
Social media on child development ppt.pptx
Social media on child development ppt.pptxSocial media on child development ppt.pptx
Social media on child development ppt.pptxsarahfauzna
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying21rahul1999
 
Social media dangers
Social media dangersSocial media dangers
Social media dangersSaman Sara
 
an article.docx social media and pre-teen
an article.docx social media and pre-teenan article.docx social media and pre-teen
an article.docx social media and pre-teenssuser9e60d6
 
EFFECT OF SOCIAL MEDIA ON US
EFFECT OF SOCIAL MEDIA ON USEFFECT OF SOCIAL MEDIA ON US
EFFECT OF SOCIAL MEDIA ON USManish Kumar
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingStemGrade
 
Digital Natives Presentation
Digital Natives PresentationDigital Natives Presentation
Digital Natives Presentationavarry
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGJaveriaZain1
 
How to stop cyber bullying
How to stop cyber bullyingHow to stop cyber bullying
How to stop cyber bullyingBullyvention
 
Social networking sites
Social networking sitesSocial networking sites
Social networking sitesparvez_25
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Impacts Of Social Media.docx
Impacts Of Social Media.docxImpacts Of Social Media.docx
Impacts Of Social Media.docxAanshiSrivastava2
 

Similar to Cyberbullying and Social Networks: Risks and Prevention (18)

Define cyberbullying and use two workable ethical theories to analyz.pdf
Define cyberbullying and use two workable ethical theories to analyz.pdfDefine cyberbullying and use two workable ethical theories to analyz.pdf
Define cyberbullying and use two workable ethical theories to analyz.pdf
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Social media on child development ppt.pptx
Social media on child development ppt.pptxSocial media on child development ppt.pptx
Social media on child development ppt.pptx
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
 
Social media dangers
Social media dangersSocial media dangers
Social media dangers
 
an article.docx social media and pre-teen
an article.docx social media and pre-teenan article.docx social media and pre-teen
an article.docx social media and pre-teen
 
Cyberbullying: Advice for Schools
Cyberbullying: Advice for SchoolsCyberbullying: Advice for Schools
Cyberbullying: Advice for Schools
 
EFFECT OF SOCIAL MEDIA ON US
EFFECT OF SOCIAL MEDIA ON USEFFECT OF SOCIAL MEDIA ON US
EFFECT OF SOCIAL MEDIA ON US
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Digital Natives Presentation
Digital Natives PresentationDigital Natives Presentation
Digital Natives Presentation
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYING
 
How to stop cyber bullying
How to stop cyber bullyingHow to stop cyber bullying
How to stop cyber bullying
 
Social networking sites
Social networking sitesSocial networking sites
Social networking sites
 
Behaviour science project
Behaviour science projectBehaviour science project
Behaviour science project
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Impacts Of Social Media.docx
Impacts Of Social Media.docxImpacts Of Social Media.docx
Impacts Of Social Media.docx
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Cyberbullying and Social Networks: Risks and Prevention

  • 2. + What is cyberbullying?? Cyberbullying is a situation in which a person is verbally abused or threatened via electronic media, such as social websites, email or text messaging. The text can include insults, threats or harmful rumors.
  • 3.
  • 4. + Origins: Cyberbullying emerged as online technology became more accesible to teens. According to the Christian Science monitor, After the school shooting at Columbine High Scool in 1999, many schools began looking at bullying as a serious problem, and some instituted zero- bullying policies. But cyberspace is a new territory, and schools aren`t sure how far to extend their jurisdiction.
  • 5. + Causes: The teen years can be cruel. Nearly everyone has been part of some form of bullying during his life time. Today, cyberbullying, has become the newest form of adolescent hostility. But what causes a teen to become a cyber-bully? Results revealed that the teen with the least amount of parental supervision engaged in the most cyberbullying. Also depression, drug and alchohol use, hostility, etc.
  • 6. + Children in Risk of being Bullied Generally, children who are bullied have one ore more of the following risk factors: ·Are perceived as different from their peers, such as being overweight, underweight, wearing glasses or different clothing, being new to school, or being unable to afford what kids consider “cool.” ·Are perceived as weak or unable to defend themselves. ·Are depressed, anxious, or have low self esteem. ·Are less popular than others and have few friends. However, even if a child has these risk factors, it doesn´t mean that the will be bullied.
  • 7. + Consequences: There can be some consequences like: ·depression. ·victims become cyberbullies. ·Thoughts of suicide and suicide attempts. ·school performance can be affected. ·Reputation can be damaged.
  • 8. Preventing Actions: Parents and kids can prevent cyberbullying. Together, they can explore safe ways to use technology. Beware of what your kids are doing online- have sense of what they do online and in texts. Learn about the sites they like. Try out the devices they use. Encourage your kids to tell you immediately if they, or someone they know, is being cyberbullied. Establish rules about technology use- Establish rules about appropiate use of computers, cell phones, and other technology. For example, be clear about what sites they can visit and what they are pemitted to do when they´re online.
  • 10. +It´s well known that facebook does not permit users under 13 years old and many kids find a way to use social networking site anyway. All that could change, though, now facebook is developing technology that would allow kids under 13 to use the site under parental supervision, they would connect children´s accounts to their parents´, allowing mom and dad to decide whom their kids can “friend” and what applications they can use. Many kids lie about their ages to get accounts. Last year, Consumer Reports said 7.5 million children under the age of 13 were using the site, including more than 5 million under the age of 10. And last fall, a study sponsored by Microsoft Research found 36 percent of parents were aware that their children joined facebook before age 13, and many even helped their kids to do so.
  • 11. How can social networks be harmful or useful? Harmful Social networking is really making us less social. Being social and connected has become dangerous for both mind and body, because people are becoming less and less likely to go out to create social situations where they would interact with people face to face. There is so much that people can learn from their brief interactions with one another. People are choosing to stay in and stay online versus going out and being social and doing anything physical. Useful In a social networking community, it is easy to share information continously and this is of huge importance when running an online bussiness. If you have a company you want to be successful, you have to let others know about it and get them interested in what you do. When participating in a social networking community, you can let others know a massive amount of information about your company to attract attention and develop their interest further.
  • 12. + Pros Cons Social networking sites spread information faster than any other media. Social media enables spread of unreliable and false information. Social networking sites allow people to improve their relationships and make new friends. Students who are heavy social media users tend to have lower grades. Social media sites help employers find employees and job-seekers find work. Social networking sites can lead stress and offline relationship problems. Colleges and universities use social media to recruit and retain students. Using social media can harm job stability and employment prospects. Faster communication. Social media causes people to spend less time interaction face- to-face. Social networking sites facilate cyberbullying.
  • 13. + References from cyberbullying: www.stopbullying.gov kidshealth.org/parent/positive/talk/cyberbullying.html References from social networks: www.learningdiversity.org/2012/11/is-social-networking- dangerous-for-teenagers/ socialnetworking.procon.org