SlideShare uma empresa Scribd logo
1 de 23
How To Keep Safe On The Internet!

Ben Langley
Donatas Vysniauskas
Alex Clark
Melisa Aslan
Coming Up…
• Take appropriate precautions to ensure own
safety and privacy
• Protect personal information online
• Carry out checks on other’s identity
• Forms and features of cyber bullying.
Precautions to ensure
safety and privacy

Ben Langley
Safety and privacy the risks on the
internet
• Cyber bullying
• Scammers
• Hackers
• Fake websites
• Malware

• phishing
Ensuring Your Own Safety on the internet
•

Content Filtering: restricting the type of content which can be viewed.

•

Proxy Servers: using systems to hid your true location.

•

Monitoring and Reporting User Behaviour: keeping an eye on the behaviour of
other users and reporting anything inappropriate.

•

Withholding Personal Information: keeping the amount of information that can be
viewed online to a minimum.

•

Using Non-trivial Usernames and Passwords: avoiding the use of easily-guessed or
easily cracked passwords.
Always be cautious when using the Internet
• Always be cautious about any information you give when using the
Internet eg: if you join a chat room use a suitable nickname and never
give any personal information out such as where you live.
• Use throwaway e-mail addresses, eg: Gmail addresses that you can
simply discard if anyone starts harassing you in any way.
• Always assume that any information and pictures you put on the
Internet can be viewed by the entire world.
Always be cautious when using the Internet
• Beware of giving information about yourself out. The more information
you put on the internet the more there is for someone to put together
about you.
• Always be suspicious of what you are being offered on the Internet, eg:
gifts, prizes and money. There are many dangers. eg: hackers or
Scammers.
• Fake websites
Important to have a strong password
A password is an important element of Internet defence. It is a secret code, known
only to you, that will allow you to access certain resources. You should never tell
anyone your password.
•

It is important to have a strong password that other people cannot easily guess.

•

Try not to use details that could be guessed by people who know you

•

Use a combination of letters, numbers and symbols

•

Never tell your friends or family your password

•

Never email your password to anyone

•

Keep your username and passwords safe
Protect personal information
online

Donatas Vysniauskas
How to protect your personal
information online?
• Never give out identifying information such as,
name, address, school name or telephone
numbers in a public message such as a chat
room - Facebook. This is because they can use
that information against you or share it on
internet widely. Also, this could result in a
scam because someone could use your
information to find out your bank details.
Donatas Vysniauskas
How to make sure your personal
information stays safe?
• Learn how to use the site properly. Use the
privacy features to restrict strangers’ access to
your profile. Be guarded about who you let
join your network (Keep your profile closed
and allow only your friends to view
your profile).

Donatas Vysniauskas
Strong passwords
• The use of strong passwords is therefore
essential in order to protect your security
and identity.
• Make sure your passwords are long and
hard to guess. This will help your social
networking to stay private and
invulnerable to other people.
Donatas Vysniauskas
What is Phishing?
• Phishing is an act of attempting to acquire
information such as usernames, passwords and
credit card details.
• To prevent phishing don’t click on a malicious link or
open a malicious attachment, in which case your
financial information and passwords may then be
stolen.

Donatas Vysniauskas
Carry Out Checks On Other’s
Online Identity!

Alex Clark
Why Is It Important To Check Other’s
Identity?
• It is important to know who the people on the
internet because they may be fake identity’s.
• Also, they may find your information and details
on credit/debit card’s, but they may also be
sexual predators.
• You will have to be very careful when using social
networking, because you may not know the
people or they may be adults pretending to be
children, and you may meet up with them some
time.
Ways To Check Other’s Identity!
Profile Picture
• If you do not know who the person is that is
adding you as a friend on social networks, you
should first go on there profile and see there
pictures.
Mutual Friends
• If you do not know the person that is trying to
add you on social networks, you can always
look at there mutual friends. Then you can see
what friends he has got that you have also
got.
Webcam
• If you do not know the person that is adding
you on social networks, you can always add
them on Skype to see what they look like.
Some people say that they don’t want to do
webcam. They might be someone, that their
not.
Forms and Features
of Cyber Bullying.

Melisa Aslan
What is Cyber Bullying?
Cyber bullying is when a child or teen is
getting threatened, harassed, humiliated or
embarrassed by another child or teen using
the Internet, digital technologies or mobile
phones.

Melisa Aslan
Forms of Cyber Bullying
Cyber stalking: Repeatedly sending messages that include
threats of harm or are highly intimidating that might make a
person afraid for his or her safety.

Outing and Trickery: Sharing someone's secrets or
embarrassing information, or tricking someone into revealing
secrets or embarrassing information and forwarding it to others.

Melisa Aslan
Forms of Cyber Bullying
Impersonation: Breaking into an email or social networking
account and using that person's online identity to send or post
embarrassing material to/about others.

Cyber Stalking: Repeatedly sending messages that include
threats of harm or are highly intimidating, or engaging in other
online activities that make a person afraid for his or her safety.

Melisa Aslan
Features of Cyber Bullying
Cyber bullying can be used to carry out various different types of
bullying, including racist bullying or bullying related to
disabilities. Instead of carrying out bullying in person, cyber
bullies make use of technology, particularly the Internet and
mobile phones to bully others.

Melisa Aslan

Mais conteúdo relacionado

Mais procurados

L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
rowenick
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
stephensc
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
stephensc
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summary
icts-uct
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
Lawrence Fine
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
stephensc
 

Mais procurados (19)

Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Internet safety presentation sv
Internet safety presentation svInternet safety presentation sv
Internet safety presentation sv
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 
Internet safety 2010
Internet safety 2010Internet safety 2010
Internet safety 2010
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summary
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Destaque

common online terminologies
   common online terminologies   common online terminologies
common online terminologies
iyanasayana
 
E&B Oil Company's Legal Letter To The City Og Hermosa Beach About The FEIR
E&B Oil Company's Legal Letter To The City Og Hermosa Beach About The FEIRE&B Oil Company's Legal Letter To The City Og Hermosa Beach About The FEIR
E&B Oil Company's Legal Letter To The City Og Hermosa Beach About The FEIR
StopHermosaBeachOil
 
www.bookajourney.com
www.bookajourney.com www.bookajourney.com
www.bookajourney.com
Kishore Verma
 

Destaque (15)

Blogging for business
Blogging for businessBlogging for business
Blogging for business
 
Elevator pitch Reed Connelly
Elevator pitch Reed ConnellyElevator pitch Reed Connelly
Elevator pitch Reed Connelly
 
common online terminologies
   common online terminologies   common online terminologies
common online terminologies
 
Hermosa Beach Community Dialogue: Phase II - Finance Subgroup
Hermosa Beach Community Dialogue: Phase II - Finance SubgroupHermosa Beach Community Dialogue: Phase II - Finance Subgroup
Hermosa Beach Community Dialogue: Phase II - Finance Subgroup
 
Pass två appen
Pass två appenPass två appen
Pass två appen
 
Baxter's - Transition Pack Instructions
Baxter's - Transition Pack InstructionsBaxter's - Transition Pack Instructions
Baxter's - Transition Pack Instructions
 
Valentine day with Google, Seems another update is underway –Google Update
Valentine day with Google, Seems another update is underway –Google UpdateValentine day with Google, Seems another update is underway –Google Update
Valentine day with Google, Seems another update is underway –Google Update
 
Presidents in Alpha Industries
Presidents in Alpha IndustriesPresidents in Alpha Industries
Presidents in Alpha Industries
 
Repechage records,Karate1 Premier League - Okinawa 2014
Repechage records,Karate1 Premier League - Okinawa 2014Repechage records,Karate1 Premier League - Okinawa 2014
Repechage records,Karate1 Premier League - Okinawa 2014
 
Utbildning interaktiva moten
Utbildning interaktiva motenUtbildning interaktiva moten
Utbildning interaktiva moten
 
E&B Oil Company's Legal Letter To The City Og Hermosa Beach About The FEIR
E&B Oil Company's Legal Letter To The City Og Hermosa Beach About The FEIRE&B Oil Company's Legal Letter To The City Og Hermosa Beach About The FEIR
E&B Oil Company's Legal Letter To The City Og Hermosa Beach About The FEIR
 
Manual: Wiring Harness 1998 – 2002 GM LS1 / LS6 Drive by Cable Electronic Fu...
Manual: Wiring Harness 1998 – 2002 GM LS1 / LS6 Drive by Cable  Electronic Fu...Manual: Wiring Harness 1998 – 2002 GM LS1 / LS6 Drive by Cable  Electronic Fu...
Manual: Wiring Harness 1998 – 2002 GM LS1 / LS6 Drive by Cable Electronic Fu...
 
www.bookajourney.com
www.bookajourney.com www.bookajourney.com
www.bookajourney.com
 
E marketing EyeRecommend Conference, Edmonton Alberta 2014
E marketing   EyeRecommend Conference, Edmonton Alberta 2014E marketing   EyeRecommend Conference, Edmonton Alberta 2014
E marketing EyeRecommend Conference, Edmonton Alberta 2014
 
05 zittartz presentation_ph_v_day_2014
05 zittartz presentation_ph_v_day_201405 zittartz presentation_ph_v_day_2014
05 zittartz presentation_ph_v_day_2014
 

Semelhante a How To Keep Safe On The Internet!

Precautions to ensure safety
Precautions to ensure safetyPrecautions to ensure safety
Precautions to ensure safety
benlangley-efc
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
QEwebAdmin
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
BHUt6
 

Semelhante a How To Keep Safe On The Internet! (20)

Precautions to ensure safety
Precautions to ensure safetyPrecautions to ensure safety
Precautions to ensure safety
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Untitled Presentation.pdf
Untitled Presentation.pdfUntitled Presentation.pdf
Untitled Presentation.pdf
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
E-Safety and Kite Info
E-Safety and Kite InfoE-Safety and Kite Info
E-Safety and Kite Info
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
 
Geek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingGeek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® Cyberbullying
 
Phishing
PhishingPhishing
Phishing
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Digital safety and security for students
Digital safety and security for studentsDigital safety and security for students
Digital safety and security for students
 

Último

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 

Último (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 

How To Keep Safe On The Internet!

  • 1. How To Keep Safe On The Internet! Ben Langley Donatas Vysniauskas Alex Clark Melisa Aslan
  • 2. Coming Up… • Take appropriate precautions to ensure own safety and privacy • Protect personal information online • Carry out checks on other’s identity • Forms and features of cyber bullying.
  • 3. Precautions to ensure safety and privacy Ben Langley
  • 4. Safety and privacy the risks on the internet • Cyber bullying • Scammers • Hackers • Fake websites • Malware • phishing
  • 5. Ensuring Your Own Safety on the internet • Content Filtering: restricting the type of content which can be viewed. • Proxy Servers: using systems to hid your true location. • Monitoring and Reporting User Behaviour: keeping an eye on the behaviour of other users and reporting anything inappropriate. • Withholding Personal Information: keeping the amount of information that can be viewed online to a minimum. • Using Non-trivial Usernames and Passwords: avoiding the use of easily-guessed or easily cracked passwords.
  • 6. Always be cautious when using the Internet • Always be cautious about any information you give when using the Internet eg: if you join a chat room use a suitable nickname and never give any personal information out such as where you live. • Use throwaway e-mail addresses, eg: Gmail addresses that you can simply discard if anyone starts harassing you in any way. • Always assume that any information and pictures you put on the Internet can be viewed by the entire world.
  • 7. Always be cautious when using the Internet • Beware of giving information about yourself out. The more information you put on the internet the more there is for someone to put together about you. • Always be suspicious of what you are being offered on the Internet, eg: gifts, prizes and money. There are many dangers. eg: hackers or Scammers. • Fake websites
  • 8. Important to have a strong password A password is an important element of Internet defence. It is a secret code, known only to you, that will allow you to access certain resources. You should never tell anyone your password. • It is important to have a strong password that other people cannot easily guess. • Try not to use details that could be guessed by people who know you • Use a combination of letters, numbers and symbols • Never tell your friends or family your password • Never email your password to anyone • Keep your username and passwords safe
  • 10. How to protect your personal information online? • Never give out identifying information such as, name, address, school name or telephone numbers in a public message such as a chat room - Facebook. This is because they can use that information against you or share it on internet widely. Also, this could result in a scam because someone could use your information to find out your bank details. Donatas Vysniauskas
  • 11. How to make sure your personal information stays safe? • Learn how to use the site properly. Use the privacy features to restrict strangers’ access to your profile. Be guarded about who you let join your network (Keep your profile closed and allow only your friends to view your profile). Donatas Vysniauskas
  • 12. Strong passwords • The use of strong passwords is therefore essential in order to protect your security and identity. • Make sure your passwords are long and hard to guess. This will help your social networking to stay private and invulnerable to other people. Donatas Vysniauskas
  • 13. What is Phishing? • Phishing is an act of attempting to acquire information such as usernames, passwords and credit card details. • To prevent phishing don’t click on a malicious link or open a malicious attachment, in which case your financial information and passwords may then be stolen. Donatas Vysniauskas
  • 14. Carry Out Checks On Other’s Online Identity! Alex Clark
  • 15. Why Is It Important To Check Other’s Identity? • It is important to know who the people on the internet because they may be fake identity’s. • Also, they may find your information and details on credit/debit card’s, but they may also be sexual predators. • You will have to be very careful when using social networking, because you may not know the people or they may be adults pretending to be children, and you may meet up with them some time.
  • 16. Ways To Check Other’s Identity! Profile Picture • If you do not know who the person is that is adding you as a friend on social networks, you should first go on there profile and see there pictures.
  • 17. Mutual Friends • If you do not know the person that is trying to add you on social networks, you can always look at there mutual friends. Then you can see what friends he has got that you have also got.
  • 18. Webcam • If you do not know the person that is adding you on social networks, you can always add them on Skype to see what they look like. Some people say that they don’t want to do webcam. They might be someone, that their not.
  • 19. Forms and Features of Cyber Bullying. Melisa Aslan
  • 20. What is Cyber Bullying? Cyber bullying is when a child or teen is getting threatened, harassed, humiliated or embarrassed by another child or teen using the Internet, digital technologies or mobile phones. Melisa Aslan
  • 21. Forms of Cyber Bullying Cyber stalking: Repeatedly sending messages that include threats of harm or are highly intimidating that might make a person afraid for his or her safety. Outing and Trickery: Sharing someone's secrets or embarrassing information, or tricking someone into revealing secrets or embarrassing information and forwarding it to others. Melisa Aslan
  • 22. Forms of Cyber Bullying Impersonation: Breaking into an email or social networking account and using that person's online identity to send or post embarrassing material to/about others. Cyber Stalking: Repeatedly sending messages that include threats of harm or are highly intimidating, or engaging in other online activities that make a person afraid for his or her safety. Melisa Aslan
  • 23. Features of Cyber Bullying Cyber bullying can be used to carry out various different types of bullying, including racist bullying or bullying related to disabilities. Instead of carrying out bullying in person, cyber bullies make use of technology, particularly the Internet and mobile phones to bully others. Melisa Aslan