SlideShare uma empresa Scribd logo
1 de 16
Cyberbullying
Brindetta Cook
CSIS 200
April 29, 2013
Source: http://thinkprogress.org/wp-content/uploads/2012/06/Cyberbullying.jpg
What is “Cyberbullying”?
“Cyberbullying is bullying that takes place using
electronic technology. “
Statistics
The Harford County Examiner reported similarly concerning cyber bullying 
statistics:
• Around half of teens have been the victims of cyber bullying
• Only 1 in 10 teens tells a parent if they have been a cyber bully victim
• Fewer than 1 in 5 cyber bullying incidents are reported to law
enforcement
• 1 in 10 adolescents or teens have had embarrassing or damaging
pictures taken of themselves without their permission, often using cell
phone cameras
• About 1 in 5 teens have posted or sent sexually suggestive or nude
pictures of themselves to others
Causes
• revenge of other peers
• for entertainment purposes
• to boost their ego
• to get a laugh from their peers
• help bolster or remind people of their
own social standing
Effects
•Undermining your confidence, self-esteem and sense of
security
•Affecting your performance and attendance at school
•Causing stress and affecting your health
•Affecting your professional reputation and career
•Fueling prejudice in areas such as race, religion and
sexuality
•Leading to suicidal thoughts
Who is affected?
• Ages 15-17
• Females are about twice as likely as
males to be victims and perpetrators of
cyber bullying.
• Males are more likely to be threatened
by cyber bullies than females
• Affects all races
Tyler Clementi
Jessica Logan
Technology’s Role
• Over 80% of teens use a cell phone regularly, making it the
most common medium for cyber bullying
• Cyberbullying can happen 24 hours a day, 7 days a week
• Cyberbullying messages and images can be posted
anonymously and distributed quickly to a very wide
audience.
• Deleting inappropriate or harassing messages, texts, and
pictures is extremely difficult after they have been posted or
sent.
How you can help!
• Don’t engage in or support mean material,
gossip, or rumors posted online, or talk about
it
• Support the victim being targeted online by
posting positive messages!
• Print the evidence to share with an authority
Remember!
• we are not invisible online, and
anything we post can be traced back to
us. Monitor your online reputation
YOU have the power
• If cyberbullying becomes severe and involves
threats of violence, you should contact the
police immediately. Some states have
computer harassment laws to prosecute
offenders.
Governor Cuomo Signs Legislation to
Help Protect Students from
Cyberbullying
• Requires Schools to Act When Cyberbullying Occurs
• Ensures Proper Protocols Are in Place to Deal with
Cyberbullying
• Sets Training Requirements For School Employees to Help
Identify and Prevent Cyberbullying
Have you ever been a victim of cyberbullying?
• A.)YES
• B.) NO
Source:
http://samuelflinn.files.wordpress.com/2012/05/cyber-
bullying-poster.jpg
Resources
Anti Bullying Campaigns and Programs:
• The Great American NO BULL Challenge
• Internet Safety 101
• Olweus Bullying Prevention Program
• Stomp Out Bullying
• Delete Digital Drama
• Cyberbully411
• STOP Cyberbullying
Sources
" What are the effects of cyberbullying? | Cyberbullying | Teacher advice | Teachtoday."
Teachtoday. N.p., n.d. Web. 28 Apr. 2013. <http://www.teachtoday.eu/en/Teacher-
advice/Cyberbullying/What-are-the-effects-of-cyberbullying.aspx>.
"Cyber Bullying Statistics - Bullying Statistics." Bullying Statistics ­ Teen Violence, Anger, 
Bullying, Treatment Options. N.p., n.d. Web. 29 Apr. 2013.
<http://www.bullyingstatistics.org/content/cyber-bullying-statistics.html>.
"Cyberbullying Effects | End Of Bullying." EndofBullying.com. N.p., n.d. Web. 29 Apr. 2013.
<http://endofbullying.com/cyberbullying-effects/>.
Sources cont’d.
"Governor Cuomo Signs Legislation to Help Protect Students from Cyberbullying |
Governor Andrew M. Cuomo." Governor Andrew M. Cuomo. N.p., n.d. Web.
29 Apr. 2013. <http://www.governor.ny.gov/press/07092012cyberbullying>.
"InternetSafety101.org: Statistics." InternetSafety101.org: Home. N.p., n.d. Web.
29 Apr. 2013.
<http://www.internetsafety101.org/cyberbullyingstatistics.htm#_ftnref>.
"What is Cyberbullying | StopBullying.gov." Home | StopBullying.gov. N.p., n.d.
Web. 27 Apr. 2013. <http://www.stopbullying.gov/cyberbullying/what-is-
it/index.html>.
"my Secure Cyberspace:." Cyberbullying. N.p., n.d. Web. 28 Apr. 2013.
<www.mysecurecyberspace.com/encyclopedia/index/cyberbullying.html>.

Mais conteúdo relacionado

Mais procurados

Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
br03wood
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
bolan1jt
 

Mais procurados (20)

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigable
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentation
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parents
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Premarital sex presentations
Premarital sex presentationsPremarital sex presentations
Premarital sex presentations
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 

Destaque (8)

Bullying virtual
Bullying virtualBullying virtual
Bullying virtual
 
Bullying
BullyingBullying
Bullying
 
Bullying verbal
Bullying verbalBullying verbal
Bullying verbal
 
Microsoft Power Point Bullying
Microsoft Power Point   BullyingMicrosoft Power Point   Bullying
Microsoft Power Point Bullying
 
Bullying
BullyingBullying
Bullying
 
Bullying apresentação
Bullying apresentaçãoBullying apresentação
Bullying apresentação
 
Trabalho sobre bullying
Trabalho sobre bullyingTrabalho sobre bullying
Trabalho sobre bullying
 
Research thesis (effects of bullying)
Research thesis (effects of bullying)Research thesis (effects of bullying)
Research thesis (effects of bullying)
 

Semelhante a Cyberbullying

Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jf
John Field
 
Social and Ethical Issues in the Digital Era Presentation
Social and Ethical Issues in the Digital Era Presentation Social and Ethical Issues in the Digital Era Presentation
Social and Ethical Issues in the Digital Era Presentation
courtneyjohnson105
 

Semelhante a Cyberbullying (20)

Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jf
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big Problem
 
Bully
BullyBully
Bully
 
Stop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measuresStop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measures
 
Cabatian & Estrada 1
Cabatian & Estrada 1Cabatian & Estrada 1
Cabatian & Estrada 1
 
Symposium On Anti-Bullying In Schools
Symposium On Anti-Bullying In SchoolsSymposium On Anti-Bullying In Schools
Symposium On Anti-Bullying In Schools
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItCyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent It
 
Cyber-bullying
Cyber-bullyingCyber-bullying
Cyber-bullying
 
Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By Anamika
 
Social and Ethical Issues in the Digital Era Presentation
Social and Ethical Issues in the Digital Era Presentation Social and Ethical Issues in the Digital Era Presentation
Social and Ethical Issues in the Digital Era Presentation
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
MultiMedia Presentation
MultiMedia PresentationMultiMedia Presentation
MultiMedia Presentation
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Cyberbullying

  • 2. What is “Cyberbullying”? “Cyberbullying is bullying that takes place using electronic technology. “
  • 3. Statistics The Harford County Examiner reported similarly concerning cyber bullying  statistics: • Around half of teens have been the victims of cyber bullying • Only 1 in 10 teens tells a parent if they have been a cyber bully victim • Fewer than 1 in 5 cyber bullying incidents are reported to law enforcement • 1 in 10 adolescents or teens have had embarrassing or damaging pictures taken of themselves without their permission, often using cell phone cameras • About 1 in 5 teens have posted or sent sexually suggestive or nude pictures of themselves to others
  • 4. Causes • revenge of other peers • for entertainment purposes • to boost their ego • to get a laugh from their peers • help bolster or remind people of their own social standing
  • 5. Effects •Undermining your confidence, self-esteem and sense of security •Affecting your performance and attendance at school •Causing stress and affecting your health •Affecting your professional reputation and career •Fueling prejudice in areas such as race, religion and sexuality •Leading to suicidal thoughts
  • 6. Who is affected? • Ages 15-17 • Females are about twice as likely as males to be victims and perpetrators of cyber bullying. • Males are more likely to be threatened by cyber bullies than females • Affects all races
  • 8. Technology’s Role • Over 80% of teens use a cell phone regularly, making it the most common medium for cyber bullying • Cyberbullying can happen 24 hours a day, 7 days a week • Cyberbullying messages and images can be posted anonymously and distributed quickly to a very wide audience. • Deleting inappropriate or harassing messages, texts, and pictures is extremely difficult after they have been posted or sent.
  • 9. How you can help! • Don’t engage in or support mean material, gossip, or rumors posted online, or talk about it • Support the victim being targeted online by posting positive messages! • Print the evidence to share with an authority
  • 10. Remember! • we are not invisible online, and anything we post can be traced back to us. Monitor your online reputation
  • 11. YOU have the power • If cyberbullying becomes severe and involves threats of violence, you should contact the police immediately. Some states have computer harassment laws to prosecute offenders.
  • 12. Governor Cuomo Signs Legislation to Help Protect Students from Cyberbullying • Requires Schools to Act When Cyberbullying Occurs • Ensures Proper Protocols Are in Place to Deal with Cyberbullying • Sets Training Requirements For School Employees to Help Identify and Prevent Cyberbullying
  • 13. Have you ever been a victim of cyberbullying? • A.)YES • B.) NO Source: http://samuelflinn.files.wordpress.com/2012/05/cyber- bullying-poster.jpg
  • 14. Resources Anti Bullying Campaigns and Programs: • The Great American NO BULL Challenge • Internet Safety 101 • Olweus Bullying Prevention Program • Stomp Out Bullying • Delete Digital Drama • Cyberbully411 • STOP Cyberbullying
  • 15. Sources " What are the effects of cyberbullying? | Cyberbullying | Teacher advice | Teachtoday." Teachtoday. N.p., n.d. Web. 28 Apr. 2013. <http://www.teachtoday.eu/en/Teacher- advice/Cyberbullying/What-are-the-effects-of-cyberbullying.aspx>. "Cyber Bullying Statistics - Bullying Statistics." Bullying Statistics ­ Teen Violence, Anger,  Bullying, Treatment Options. N.p., n.d. Web. 29 Apr. 2013. <http://www.bullyingstatistics.org/content/cyber-bullying-statistics.html>. "Cyberbullying Effects | End Of Bullying." EndofBullying.com. N.p., n.d. Web. 29 Apr. 2013. <http://endofbullying.com/cyberbullying-effects/>.
  • 16. Sources cont’d. "Governor Cuomo Signs Legislation to Help Protect Students from Cyberbullying | Governor Andrew M. Cuomo." Governor Andrew M. Cuomo. N.p., n.d. Web. 29 Apr. 2013. <http://www.governor.ny.gov/press/07092012cyberbullying>. "InternetSafety101.org: Statistics." InternetSafety101.org: Home. N.p., n.d. Web. 29 Apr. 2013. <http://www.internetsafety101.org/cyberbullyingstatistics.htm#_ftnref>. "What is Cyberbullying | StopBullying.gov." Home | StopBullying.gov. N.p., n.d. Web. 27 Apr. 2013. <http://www.stopbullying.gov/cyberbullying/what-is- it/index.html>. "my Secure Cyberspace:." Cyberbullying. N.p., n.d. Web. 28 Apr. 2013. <www.mysecurecyberspace.com/encyclopedia/index/cyberbullying.html>.

Notas do Editor

  1. http://www.stopbullying.gov/cyberbullying/what-is-it/index.html Examples of cyberbullying include: mean text messages or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles. Being a victim of cyberbullying can be a common and painful experience. Some youth who cyberbully: Pretend they are other people online to trick others Spread lies and rumors about victims Trick people into revealing personal information Send or forward private text messages, pictures, etc. Post pictures of victims without their consent Sending mean messages or threats to a person&apos;s email account or cell phone Spreading rumors online or through texts Posting hurtful or threatening messages on social networking sites or web pages Stealing a person&apos;s account information to break into their account and send damaging messages Pretending to be someone else online to hurt another person Taking unflattering pictures of a person and spreading them through cell phones or the Internet Sexting, or circulating sexually suggestive pictures or messages about a person
  2. Cyber world has become the new way to communicate in today&apos;s society People (students) in particular don’t think they can get caught Can lead to other devastating tragedies (school shootings, suicide, and other harm) http://www.bullyingstatistics.org/content/cyber-bullying-statistics.html
  3. The teen years can be cruel. Nearly everyone has been a part of some form of bullying during his or her lifetime, be it on the giving or receiving end. In general, cyber bullies have their own motives on why they are involved in cyber bullying. Some of their intentions have been identified as power, attention, retaliation, boredom, jealousy, and the pleasure of inflicting pain.
  4. Can have a lasting impression on you for the rest of your life
  5. Cyberbullying has become a prevalent problem globally Homosexual and bisexual teens are more likely to report bullying than heterosexual teens Students with disabilities are more likely to be the victims of bullying Females are more often the victims of bullying than males
  6. Tyler Clementi: jumped to his death from the George Washington Bridge. This occurred after a sexual encounter he had with a man in his dorm room was allegedly video streamed over the internet without Clementi&apos;s knowledge Jessica Logan: committed suicide after sexting a nude photo of herself to her boyfriend. When they broke up, he sent the photo to everyone else at her school. Jessica was cruelly harassed for months by the other girls at her school, Jessica Logan decided to tell her story on a Cincinnati television station. Her purpose was simple: “I just want to make sure no one else will have to go through this again.” The interview was in May 2008. Two months later, on July 3, 2008, Jessie attended the funeral of a boy who committed suicide, then came home and killed herself.
  7. The psychological and emotional outcomes of cyber bullying are similar to those of real-life bullying. The difference is, real-life bullying often ends when school ends. For cyber bullying, there is no escape. And, it’s getting worse. http://www.dosomething.org/tipsandtools/11-facts-about-cyber-bullying
  8. You may be able to sue a cyberbully or the bully&apos;s parents for damages if you can prove defamation, invasion of privacy, or intentional infliction of emotional distress. Damages can include money spent on counseling, limited college opportunities due to failing grades, etc.
  9. The new law goes into effect on July 1, 2013. The new law cracks down on cyberbullying through the following provisions: “ The new law is designed to strengthen a school&apos;s response to harassment and bullying through improved reporting, investigation, intervention, training and prevention. The new law requires schools to take action when students experience cyberbullying or other forms of harassment. It ensures that school districts take immediate steps to end harmful behavior, prevent recurrences, and ensure the safety of the targeted students. The legislation also establishes improved training to help teachers and administrators better prevent and respond to bullying and other harmful acts.” http://www.governor.ny.gov/press/07092012cyberbullying