SlideShare uma empresa Scribd logo
1 de 17
Ethics of Cyber Bullying
By : Jessy Park
• When the majority of people think about ethical issues revolving around technologies,
they think about things like hacking or misuse of personal data. However, despite all
of those problems, cyber bullying is actually one of the biggest concern.
• Technology and the Internet has given everyone in the world the ability to access
innumerable information, which most of them are informative and appropriate, but
others contains inappropriate contents, such as hate speech or pornographic content.
• I would say technology has enabled teenagers to connect themselves with the outside
world. Of course, this may be good if they send text, email, or communicate through
the Internet, wanting to keep in touch with friends or family. However, it becomes a
concern when someone tries to use technology as a way to spread hate and bully
people. Do you think that is ethical? For me, I think cyber bullying or any other
bullying is not ethical at all.
• Today, cyber bullying occurs at home, inside and outside of the classroom, and even
in a wider community. The ethical issue is that the victims of cyber bullying are
severely being humiliated, threatened, and harassed, which often leads to suicide.
Ethical perspective of Cyber bullying
What is Cyber bullying?
• Cyber bulling is a form of bullying where one gets perpetually harassed,
tormented, threatened, or humiliated by another person or group
through the use of Internet or any other technological device. It
basically takes place utilizing electronic technology such as cell phones,
computers, tablets, as well as social media communication tools.
• Sending offensive or harassing messages & using texts or social
network sites to abuse and harass someone. Cyber
bullying is often done anonymously.
• Cyber bulling is still becoming an extremely
common form of bullying throughout the world
in which the victim’s lives have become
distressing and filled with fear.
Cyber bullying: Direct Attacks
• Direct attacks of cyber bullying includes text messaging harassment,
stealing passwords, impersonation, sending various pictures through
emails & social networks, and using blogs & websites.
• Text messaging Harassment- Bullies may send offensive,
threatening, or hateful messages to others without knowing
that it can seriously affect someone because certain words
can be serious and hurtful.
• Passwords stealing- The bully may steal
someone’s password, go into the account, and start to
chat with other people, faking to be the real person of the
account.The bully may even say hurtful or abusive things
and cause anger and hatred to that person’s friends or strangers.
• Blogs & Websites- People sometimes use blogs as a way
to damage others’ privacy and reputation.They create
fake blogs or websites pretending to be the real person and
plan to humiliate them.
Cyber bulling By Proxy:
• When the cyber bully commands other person or someone to abuse or
do the dirty work, it’s called, “ Cyber bullying by proxy”. It is one of the
most harmful cyber bullying because it gets a lot of people involved
and it may be anonymous. The bully may sometimes try to get the
friends of the victim or even complete strangers to be involved to
become a part of the group and harass the victim.
• One serious example of cyber bullying by proxy is where the bullies
take complete control of the victim’s account and send mean
messages to all the friends on the list.The bully may also hack into the
victim’s private account and steal their password so the victim can’t
get into his/her account.After doing that, they can even set up a new
account faking to be the victim.This would cause a lot of problems and
will most likely bring anger to the friends of the victim. Most of the
times, the friends would not know that it was the cyber bully doing it.
Forms of Cyber bullying
• Since all interactions occurs online, it is very easy for the bullies to harass or
abuse someone whenever or wherever they wish.The text messages they send
can also disseminate rapidly and spread to numerous people.
• There are various ways in which cyber bullying can occur – offensive messages,
spreading private information or rumors, impersonation, and many more.
1. Harassment: I would say when the cyber bullying is persistent and personal, it is often
referred as “ Harassment”. This form of cyber bullying is when the bully continuously “ pick
on” someone and repeatedly send offensive and insulting messages to the victim.
2. Flaming: This is a common form of bullying where it is an “ online conflict”.The bully and
the victim would use hurtful and vulgar language to one another through the internet or
social networks.
3. Exclusion & outing: First of all, exclusion is another type of cyber bullying in which the
bully purposely single out and leave a person out from an online groups on social networks
or other sites. After excluding that person, the group would then consistently leave hurtful
and abusive messages and harass the person that they “ singled out”. Outing is another
form of cyber bullying where the bully would share private or personal information,
pictures, or anything that would humiliate the victim publicly. When the information of the
victim has been spread through the internet, the victim is considered as “ outed”.
Reasons for Cyber bullying
• Boredom & Entertainment- Unfortunately, most bullies find bullying others entertaining.They think harassing
and humiliating someone is funny when it’s actually not.The bullies are usually in groups where they target one
specific person and abuse them through the internet.They add excitement and drama in their lives through
cyber bullying.
• Peer Pressure- Cyber bullies generally think that bullying others through social networks or any other site is
normal and acceptable with their friends by their sides.
• Revenge / Frustration- In some cases, cyber bullies don’t see themselves as bullies, but they are just
protecting their friends or someone or help in attempting to get back at someone who maltreated them.
• Power- Bullies tend to bully other people because they think it will show others that they are powerful and have
absolute control of them.They basically want to gain power and want other people to be fearful of them.
Hurting others makes them powerful is their thoughts.
• Anonymity-Since the bullies can easily avoid facing the victims , it provides them with the illusion that they
won’t get caught. Cyber bullying can be anonymous, which makes it more dangerous.
• Ignorance of the consequences- Most of the cyber bullies do not realize the effects of it for themselves.
• You may wonder “Why do people cyber bully others?”
Below are several reasons why:
Effects of Cyber bullying
• Anxiety / Depression: The victims of cyber bullying often makes them doubt their worth and
value. When they get bullied, they experience anxiety and extreme depression, which may also
lead to other illnesses. Not only does the victim experience these effects, the bullied often face
depression & anxiety too.
• Bullying others: Cyber bullying victims may sometimes receive too much pain that they would
do the same thing that they received to harm others.
• Poor academic performance: Cyber bullying victims tend to avoid school
because they don’t want to face the people bullying them or because they
feel humiliated and embarrassed by the messages that were shared.Their
grades will be poor too because they may experience stress and anxiety that
they can’t concentrate on studying.
• Suicide: Cyber bullying increase the rates of suicide. When the victims are seriously threatened
and tormented by the bullies through text messages, social media, and instant messaging, they
often feel worthless and hopeless. As a result, they end their life by suiciding to stop the pain
from the tormentors.
• Anyone can be the victims of cyber bullying – young children, teenagers, and even adults.
More Consequences of
Cyber bullying
• Mood changes: Cyber bullying have to often face mood swings where they can’t
control themselves.Their behavior may change instantly and they will most
likely have a negative mood that lasts throughout the day and on other days.
They can also experience insomnia, headaches, and extreme fatigue.The
continuation of the changes in their moods can increase the risks of leading
them to other severe illnesses.
• Stress-related disorders & other disorders: Due to the harsh messages and
pain the victims get from the cyber bullies, cyber bullying causes intense stress
for most of the victims.
• Isolation from friends and family: Cyber bulling mostly exclude the victims of
the bullying from friends at school. Some people who were the victims’ best
friends may start to avoid the victim and school.Also , the victim will most likely
spend less time with his / her family at home .
How Cyber- bullied victims react?
Real Life Examples
• Ryan Halligan is a 13 year old boy fromVermont who was a victim of cyber
bullying in 2013. At the time, he was harassed and humiliated by his friends online
in which he received many messages questioning his sexual orientation. Due to
the continuation of his peers cyber bullying on him, he decided to kill himself. He
is not the only victim.There are countless teenagers being cyber bullied and 80 %
of them chooses suicide as a way to escape.
• Another depressing example was a 17 year old girl named, Rachael Neblett. She
was a student at Bullitt East school who was less than 5 feet tall. Even though her
height was an advantage for her in gymnastics and cheerleading, she was often a
target for the bullies.Through her MySpace account, she began to continually
receive threatening emails by an anonymous in 2006. Despite this happening, she
kept it as secrets from her parents because she didn’t want to worry them.
Extreme desperation and depression came to her and soon, she decided to take
her life.
• Cyber bullying has caused numerous deaths by leading the victims to suffer
and at the end, choose suicide as a way to end the bullying.
• More than half of the teenagers and young adolescents said that they
have been bullied online. 1 out of 4 has said it has occurred more than
once for them.
• 81 % of people think that cyber bullying is an easier way to harass others
than bullying in person because you can easily get away with it.
• 90% of people who experiences cyber bullying tends to not report the
abuse but rather keep to themselves until it completely destroys them or
they choose to suicide.
• Girls are twice the victims and perpetrators of cyber bullying compared to
boys.
• Most cyber bullying victims experience low self esteem & other disorders
and even considers suicide.
Graph on Cyber bullying
Ways to Alleviate Cyber bullying
( Prevention)
• Schools can take actions where they teach the children about the seriousness and
awareness of cyber bullying.
• If you know anyone or someone who is being bullied, I recommend you to go tell
an adult about the situation. If you are the victim, do not be afraid to inform any
adult.You shouldn’t be keeping it to yourself and letting the pain cut you deep.
• Remember that it won’t get resolved if you just ignore the situation. Also, if you
are being bullied, make sure you stay calm before you take any action and do
anything wrong. You can also try to block the cyber bullying person or group of
people .
• You should never share personal information online to anyone or
to meet someone that you only know through the internet.
• Keep the records as evidences and always try to reach for help.Also,
keep in mind that it is not your fault that the bullying situation is
happening.
References
• "Effects of Cyberbullying – Family Lives." N.p., n.d.Web. 10 Oct. 2016.
• "10 Forms of Cyberbullying | Kids Safety." N.p., n.d.Web. 10 Oct. 2016.
• "STOP Cyberbullying: Cyberbullying by Proxy." N.p., n.d.Web. 12 Oct. 2016.
• "11 FactsAboutCyber Bullying | DoSomething.org ..." N.p., n.d.Web. 15 Oct. 2016.
• "Reasons People Cyber-bully -Your Self Series." N.p., n.d.Web. 15 Oct. 2016.
• "8 ReasonsWhy Kids Cyberbully Others -Verywell." N.p., n.d.Web. 13 Oct. 2016.
• "Cyber Ethics and Cyber Bullying - Blogspot.com." N.p., n.d.Web. 18 Oct. 2016.
• "Ethics and Cyberbullying | MediaSmarts." N.p., n.d.Web. 18 Oct. 2016.
• "Cyber Bully : Ethical Perspective of Cyber Bullying." N.p., n.d.Web. 19 Oct. 2016.
• "STOP Cyberbullying: Direct Attacks." N.p., n.d.Web. 19 Oct. 2016.
https://www.google.co.th/search?q=isolation+from+friends+and+family&espv=2&biw=839
&bih=596&source=lnms&tbm=isch&sa=X&ved=0ahUKEwjZj5blgPDPAhXEr48KHQRSDTkQ
_AUIBigB#imgrc=yS49On6bj_8EcM%3A
• Digital image.The Princess in theTower. N.p., n.d.Web. 19 Oct. 2016.
• Http://www.youtube.com/channel/UChSMfTiCVrFHBMiAS51z54Q. "#CreateNoHate - A Campaign Against
Cyberbullying."YouTube.YouTube, 18 July 2016.Web. 19 Oct. 2016.
<https://www.youtube.com/watch?v=bzc2yjdNgho>.
More References
• Picture fromYoutube. Digital image.Youtube.com. N.p., n.d.Web. 19 Oct. 2016.
https://www.google.co.th/search?q=twitter+logo&espv=2&biw=839&bih=596&source=lnms&tbm=isch&sa=
X&ved=0ahUKEwiN1a7tn-
7PAhWDvI8KHZOzA58Q_AUIBigB#tbm=isch&q=password+stealing&imgrc=4vR7SWCPfEeEdM%3A
• Cell phones on wirefly.com. Digital image.Wirefly.com. N.p., n.d.Web. 15 Oct. 2016.
https://www.google.co.th/search?q=cell
+phone&espv=2&biw=839&bih=596&source=lnms&tbm=isch&sa=X&ved=0ahUKEwiYscmqoO7PAhULRo8K
HZcfBYwQ_AUIBigB#imgrc=g392-Ewu6KxQBM%3A
https://www.google.co.th/search?q=cyberbullying+pictures&espv=2&biw=839&bih=596&source=lnms&tbm
=isch&sa=X&ved=0ahUKEwjTwvvfou7PAhXKu48KHTU6ApEQ_AUIBigB#imgrc=myVvxEMfAhi05M%3A
https://www.google.co.th/search?q=lock+key&espv=2&biw=839&bih=596&source=lnms&tbm=isch&sa=X&v
ed=0ahUKEwicsM6zpu7PAhVIvY8KHYeIDvQQ_AUIBigB#tbm=isch&q=lock+key+clipart&imgrc=KFpGO-
wBpUQmJM%3A
• Picture from Pininterest. Digital image. Pininterest. N.p., n.d.Web. 21 Oct. 2016.
• Lock and KeyClipart. Digital image. Cliparts. N.p., n.d.Web. 20 Oct. 2016.
• Digital image. Examined Existence. N.p., n.d.Web. 22 Oct. 2016.
https://www.google.co.th/search?q=isolation+from+friends+and+family&espv=2&biw=839&bih=596&sourc
e=lnms&tbm=isch&sa=X&ved=0ahUKEwjZj5blgPDPAhXEr48KHQRSDTkQ_AUIBigB#tbm=isch&q=stress+i
mages&imgrc=x_eKGbIVvsRAPM%3A
https://www.google.co.th/search?q=poor+academic+performance&espv=2&biw=839&bih=596&source=lnms&tbm=isch
&sa=X&ved=0ahUKEwitsaW5_O_PAhUILI8KHd1TCwMQ_AUIBigB#tbm=isch&q=anxiety+&imgrc=FqH1ZO3v4wDsKM%
3A
• Digital image. Lifestyle. N.p., n.d.Web. 20 Oct. 2016.
More References
https://www.google.co.th/search?q=graph+of+cyber+bullying+statistics&espv=2&biw=839&bih=596&source=lnms&tbm=
isch&sa=X&ved=0ahUKEwiZ8Ou1r-7PAhWFn5QKHfI-
CIwQ_AUIBigB#tbm=isch&q=cyber+bullying+statistics+2016&imgrc=IPbihwLRBDnFmM%3A
https://www.google.co.th/search?q=graph+of+cyber+bullying+statistics&espv=2&biw=839&bih=596&source=lnms&tbm=
isch&sa=X&ved=0ahUKEwiZ8Ou1r-7PAhWFn5QKHfI-CIwQ_AUIBigB#imgrc=TEmo7PG0f3FrYM%3A
• Digital image.Wordpress.com. N.p., n.d.Web. 19 Oct. 2016.
• Digital image. US News. N.p., n.d.Web. 19 Oct. 2016.
https://www.google.co.th/search?q=boredom+clipart&espv=2&biw=839&bih=596&source=lnms&tbm=isch&sa=X&ved=0ahUK
EwiRmc-Pw-
7PAhVNtJQKHeKAB0wQ_AUIBigB#tbm=isch&q=peer+pressure+cyberbullying+clipart&imgdii=iF3LWE7t94n7YM%3A%3BiF3L
WE7t94n7YM%3A%3B8bMsrLk7-d2c-M%3A&imgrc=iF3LWE7t94n7YM%3A
https://www.google.co.th/search?q=boredom+clipart&espv=2&biw=839&bih=596&source=lnms&tbm=isch&sa=X&ved=0ahUK
EwiRmcPw-7PAhVNtJQKHeKAB0wQ_AUIBigB#tbm=isch&q=revengecyberbullying+clipart&imgrc=wGkmYultBrYI0M%3A
https://www.google.co.th/search?q=boredom+clipart&espv=2&biw=839&bih=596&source=lnms&tbm=isch&sa=X&ved=0ahUK
EwiRmc-Pw-7PAhVNtJQKHeKAB0wQ_AUIBigB#tbm=isch&q=revenge+clipart&imgrc=KNywmJ2tquCuCM%3A
https://www.google.co.th/search?q=poor+academic+performance&espv=2&biw=839&bih=596&source=lnm
s&tbm=isch&sa=X&ved=0ahUKEwitsaW5_O_PAhUILI8KHd1TCwMQ_AUIBigB#imgrc=xY1d4dTbbicjkM%3A
• Peer Pressure Clipart. Digital image. Cliparts. N.p., n.d.Web. 19 Oct. 2016.
• Digital image. Frank DavidGreene. N.p., n.d.Web. 19 Oct. 2016.
• Digital image. Gograph. N.p., n.d.Web. 20 Oct. 2016.
• Digital image. Ongiantsshoulders.org. N.p., n.d.Web. 20 Oct. 2016.

Mais conteúdo relacionado

Mais procurados

Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation introkscheidy
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpointjosiebrookeday
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying caitlynx48
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying CarlosE15
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power pointmb29thom
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentationSally Garza
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying griehl
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentationclifforddyyy
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationpamelazuley
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointHannahMorrell
 
School Bullying: toward Better Mitigation and Response
School Bullying: toward Better Mitigation and ResponseSchool Bullying: toward Better Mitigation and Response
School Bullying: toward Better Mitigation and ResponseJason Atherton
 

Mais procurados (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Effects of bullying
Effects of bullyingEffects of bullying
Effects of bullying
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power point
 
Social media addiction
Social media addictionSocial media addiction
Social media addiction
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentation
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
School Bullying: toward Better Mitigation and Response
School Bullying: toward Better Mitigation and ResponseSchool Bullying: toward Better Mitigation and Response
School Bullying: toward Better Mitigation and Response
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Destaque

391 nasilje na internetu strip
391 nasilje na internetu strip391 nasilje na internetu strip
391 nasilje na internetu stripPogled kroz prozor
 
Cyber Bulling On School Grounds
Cyber Bulling On School GroundsCyber Bulling On School Grounds
Cyber Bulling On School Groundskerr1va
 
Cyber Bulling Presentation
Cyber Bulling PresentationCyber Bulling Presentation
Cyber Bulling Presentationvasta1sk
 
Cyberbullying ppt
Cyberbullying pptCyberbullying ppt
Cyberbullying pptRida Khan
 
Rezime nalaza DIGITALNO NASILJE
Rezime nalaza DIGITALNO NASILJERezime nalaza DIGITALNO NASILJE
Rezime nalaza DIGITALNO NASILJEluq16
 
Elektronsko nasilje
Elektronsko nasiljeElektronsko nasilje
Elektronsko nasiljeAllex Babic
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingsirine2012
 
Business ethics C3 theories principles in_business_ethics
Business ethics C3 theories principles in_business_ethicsBusiness ethics C3 theories principles in_business_ethics
Business ethics C3 theories principles in_business_ethicsIzah Asmadi
 
Group dynamics and Ethics
Group dynamics and EthicsGroup dynamics and Ethics
Group dynamics and EthicsMaymay Lindayao
 
business ethics in a global economy
business ethics in a global economybusiness ethics in a global economy
business ethics in a global economyjcpham
 
Digitalno nasilje - vodič za roditelje
Digitalno nasilje - vodič za roditeljeDigitalno nasilje - vodič za roditelje
Digitalno nasilje - vodič za roditeljePogimnazija
 

Destaque (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Lucy cyberbullying[1]
Lucy cyberbullying[1]Lucy cyberbullying[1]
Lucy cyberbullying[1]
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
 
391 nasilje na internetu strip
391 nasilje na internetu strip391 nasilje na internetu strip
391 nasilje na internetu strip
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
 
Cyber bulling
Cyber bulling Cyber bulling
Cyber bulling
 
Elektronsko nasilje
Elektronsko nasiljeElektronsko nasilje
Elektronsko nasilje
 
cyber bulling
cyber bullingcyber bulling
cyber bulling
 
Cyber Bulling On School Grounds
Cyber Bulling On School GroundsCyber Bulling On School Grounds
Cyber Bulling On School Grounds
 
Cyber Bulling Presentation
Cyber Bulling PresentationCyber Bulling Presentation
Cyber Bulling Presentation
 
Cyberbullying ppt
Cyberbullying pptCyberbullying ppt
Cyberbullying ppt
 
Rezime nalaza DIGITALNO NASILJE
Rezime nalaza DIGITALNO NASILJERezime nalaza DIGITALNO NASILJE
Rezime nalaza DIGITALNO NASILJE
 
Elektronsko nasilje
Elektronsko nasiljeElektronsko nasilje
Elektronsko nasilje
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Business ethics C3 theories principles in_business_ethics
Business ethics C3 theories principles in_business_ethicsBusiness ethics C3 theories principles in_business_ethics
Business ethics C3 theories principles in_business_ethics
 
Group dynamics and Ethics
Group dynamics and EthicsGroup dynamics and Ethics
Group dynamics and Ethics
 
business ethics in a global economy
business ethics in a global economybusiness ethics in a global economy
business ethics in a global economy
 
Digitalno nasilje - vodič za roditelje
Digitalno nasilje - vodič za roditeljeDigitalno nasilje - vodič za roditelje
Digitalno nasilje - vodič za roditelje
 

Semelhante a Cyberbullying ppt.

Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By AnamikaGisha Mathyari
 
Cyberbullying and internent addiction
Cyberbullying  and internent addictionCyberbullying  and internent addiction
Cyberbullying and internent addictionChristopher Mejia
 
Cabatian & Estrada 1
Cabatian & Estrada 1Cabatian & Estrada 1
Cabatian & Estrada 1Samphiriane
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingNuraySmat
 
Cyberbullying by david siaborret
Cyberbullying by david siaborretCyberbullying by david siaborret
Cyberbullying by david siaborretdavid terrobias
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentationSally Garza
 
Cyberbullying and social media
Cyberbullying and social mediaCyberbullying and social media
Cyberbullying and social mediaevieasmedia
 
Cyberbullying full
Cyberbullying fullCyberbullying full
Cyberbullying fullLiam1997
 
Ppt cyberbullying nelson mandela school
Ppt cyberbullying nelson mandela schoolPpt cyberbullying nelson mandela school
Ppt cyberbullying nelson mandela schoolAnnemieke Akkermans
 
DigitalSkills Presentation: Cyberbullying
DigitalSkills Presentation: CyberbullyingDigitalSkills Presentation: Cyberbullying
DigitalSkills Presentation: Cyberbullyingdigitalskills
 
Media power point 3
Media power point 3Media power point 3
Media power point 3kelsietune
 
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose ManlinconCYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlinconkatrinarose14
 
Current Issues Powerpt
Current Issues PowerptCurrent Issues Powerpt
Current Issues Powerptdulud2lm
 
CYBER BULLYING AND INTERNET ADDICTION by Mia Rose Pantaleon
CYBER BULLYING AND INTERNET ADDICTION by Mia Rose PantaleonCYBER BULLYING AND INTERNET ADDICTION by Mia Rose Pantaleon
CYBER BULLYING AND INTERNET ADDICTION by Mia Rose PantaleonMiarose12
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The InternetDebra Boardman
 

Semelhante a Cyberbullying ppt. (20)

Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By Anamika
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying and internent addiction
Cyberbullying  and internent addictionCyberbullying  and internent addiction
Cyberbullying and internent addiction
 
Cabatian & Estrada 1
Cabatian & Estrada 1Cabatian & Estrada 1
Cabatian & Estrada 1
 
Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying by david siaborret
Cyberbullying by david siaborretCyberbullying by david siaborret
Cyberbullying by david siaborret
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentation
 
Ciberbullying
CiberbullyingCiberbullying
Ciberbullying
 
Cyberbullying and social media
Cyberbullying and social mediaCyberbullying and social media
Cyberbullying and social media
 
Cyberbullying full
Cyberbullying fullCyberbullying full
Cyberbullying full
 
Ppt cyberbullying nelson mandela school
Ppt cyberbullying nelson mandela schoolPpt cyberbullying nelson mandela school
Ppt cyberbullying nelson mandela school
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
DigitalSkills Presentation: Cyberbullying
DigitalSkills Presentation: CyberbullyingDigitalSkills Presentation: Cyberbullying
DigitalSkills Presentation: Cyberbullying
 
Media power point 3
Media power point 3Media power point 3
Media power point 3
 
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose ManlinconCYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Current Issues Powerpt
Current Issues PowerptCurrent Issues Powerpt
Current Issues Powerpt
 
CYBER BULLYING AND INTERNET ADDICTION by Mia Rose Pantaleon
CYBER BULLYING AND INTERNET ADDICTION by Mia Rose PantaleonCYBER BULLYING AND INTERNET ADDICTION by Mia Rose Pantaleon
CYBER BULLYING AND INTERNET ADDICTION by Mia Rose Pantaleon
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The Internet
 

Último

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

Cyberbullying ppt.

  • 1. Ethics of Cyber Bullying By : Jessy Park
  • 2. • When the majority of people think about ethical issues revolving around technologies, they think about things like hacking or misuse of personal data. However, despite all of those problems, cyber bullying is actually one of the biggest concern. • Technology and the Internet has given everyone in the world the ability to access innumerable information, which most of them are informative and appropriate, but others contains inappropriate contents, such as hate speech or pornographic content. • I would say technology has enabled teenagers to connect themselves with the outside world. Of course, this may be good if they send text, email, or communicate through the Internet, wanting to keep in touch with friends or family. However, it becomes a concern when someone tries to use technology as a way to spread hate and bully people. Do you think that is ethical? For me, I think cyber bullying or any other bullying is not ethical at all. • Today, cyber bullying occurs at home, inside and outside of the classroom, and even in a wider community. The ethical issue is that the victims of cyber bullying are severely being humiliated, threatened, and harassed, which often leads to suicide. Ethical perspective of Cyber bullying
  • 3. What is Cyber bullying? • Cyber bulling is a form of bullying where one gets perpetually harassed, tormented, threatened, or humiliated by another person or group through the use of Internet or any other technological device. It basically takes place utilizing electronic technology such as cell phones, computers, tablets, as well as social media communication tools. • Sending offensive or harassing messages & using texts or social network sites to abuse and harass someone. Cyber bullying is often done anonymously. • Cyber bulling is still becoming an extremely common form of bullying throughout the world in which the victim’s lives have become distressing and filled with fear.
  • 4. Cyber bullying: Direct Attacks • Direct attacks of cyber bullying includes text messaging harassment, stealing passwords, impersonation, sending various pictures through emails & social networks, and using blogs & websites. • Text messaging Harassment- Bullies may send offensive, threatening, or hateful messages to others without knowing that it can seriously affect someone because certain words can be serious and hurtful. • Passwords stealing- The bully may steal someone’s password, go into the account, and start to chat with other people, faking to be the real person of the account.The bully may even say hurtful or abusive things and cause anger and hatred to that person’s friends or strangers. • Blogs & Websites- People sometimes use blogs as a way to damage others’ privacy and reputation.They create fake blogs or websites pretending to be the real person and plan to humiliate them.
  • 5. Cyber bulling By Proxy: • When the cyber bully commands other person or someone to abuse or do the dirty work, it’s called, “ Cyber bullying by proxy”. It is one of the most harmful cyber bullying because it gets a lot of people involved and it may be anonymous. The bully may sometimes try to get the friends of the victim or even complete strangers to be involved to become a part of the group and harass the victim. • One serious example of cyber bullying by proxy is where the bullies take complete control of the victim’s account and send mean messages to all the friends on the list.The bully may also hack into the victim’s private account and steal their password so the victim can’t get into his/her account.After doing that, they can even set up a new account faking to be the victim.This would cause a lot of problems and will most likely bring anger to the friends of the victim. Most of the times, the friends would not know that it was the cyber bully doing it.
  • 6. Forms of Cyber bullying • Since all interactions occurs online, it is very easy for the bullies to harass or abuse someone whenever or wherever they wish.The text messages they send can also disseminate rapidly and spread to numerous people. • There are various ways in which cyber bullying can occur – offensive messages, spreading private information or rumors, impersonation, and many more. 1. Harassment: I would say when the cyber bullying is persistent and personal, it is often referred as “ Harassment”. This form of cyber bullying is when the bully continuously “ pick on” someone and repeatedly send offensive and insulting messages to the victim. 2. Flaming: This is a common form of bullying where it is an “ online conflict”.The bully and the victim would use hurtful and vulgar language to one another through the internet or social networks. 3. Exclusion & outing: First of all, exclusion is another type of cyber bullying in which the bully purposely single out and leave a person out from an online groups on social networks or other sites. After excluding that person, the group would then consistently leave hurtful and abusive messages and harass the person that they “ singled out”. Outing is another form of cyber bullying where the bully would share private or personal information, pictures, or anything that would humiliate the victim publicly. When the information of the victim has been spread through the internet, the victim is considered as “ outed”.
  • 7. Reasons for Cyber bullying • Boredom & Entertainment- Unfortunately, most bullies find bullying others entertaining.They think harassing and humiliating someone is funny when it’s actually not.The bullies are usually in groups where they target one specific person and abuse them through the internet.They add excitement and drama in their lives through cyber bullying. • Peer Pressure- Cyber bullies generally think that bullying others through social networks or any other site is normal and acceptable with their friends by their sides. • Revenge / Frustration- In some cases, cyber bullies don’t see themselves as bullies, but they are just protecting their friends or someone or help in attempting to get back at someone who maltreated them. • Power- Bullies tend to bully other people because they think it will show others that they are powerful and have absolute control of them.They basically want to gain power and want other people to be fearful of them. Hurting others makes them powerful is their thoughts. • Anonymity-Since the bullies can easily avoid facing the victims , it provides them with the illusion that they won’t get caught. Cyber bullying can be anonymous, which makes it more dangerous. • Ignorance of the consequences- Most of the cyber bullies do not realize the effects of it for themselves. • You may wonder “Why do people cyber bully others?” Below are several reasons why:
  • 8. Effects of Cyber bullying • Anxiety / Depression: The victims of cyber bullying often makes them doubt their worth and value. When they get bullied, they experience anxiety and extreme depression, which may also lead to other illnesses. Not only does the victim experience these effects, the bullied often face depression & anxiety too. • Bullying others: Cyber bullying victims may sometimes receive too much pain that they would do the same thing that they received to harm others. • Poor academic performance: Cyber bullying victims tend to avoid school because they don’t want to face the people bullying them or because they feel humiliated and embarrassed by the messages that were shared.Their grades will be poor too because they may experience stress and anxiety that they can’t concentrate on studying. • Suicide: Cyber bullying increase the rates of suicide. When the victims are seriously threatened and tormented by the bullies through text messages, social media, and instant messaging, they often feel worthless and hopeless. As a result, they end their life by suiciding to stop the pain from the tormentors. • Anyone can be the victims of cyber bullying – young children, teenagers, and even adults.
  • 9. More Consequences of Cyber bullying • Mood changes: Cyber bullying have to often face mood swings where they can’t control themselves.Their behavior may change instantly and they will most likely have a negative mood that lasts throughout the day and on other days. They can also experience insomnia, headaches, and extreme fatigue.The continuation of the changes in their moods can increase the risks of leading them to other severe illnesses. • Stress-related disorders & other disorders: Due to the harsh messages and pain the victims get from the cyber bullies, cyber bullying causes intense stress for most of the victims. • Isolation from friends and family: Cyber bulling mostly exclude the victims of the bullying from friends at school. Some people who were the victims’ best friends may start to avoid the victim and school.Also , the victim will most likely spend less time with his / her family at home .
  • 10. How Cyber- bullied victims react?
  • 11. Real Life Examples • Ryan Halligan is a 13 year old boy fromVermont who was a victim of cyber bullying in 2013. At the time, he was harassed and humiliated by his friends online in which he received many messages questioning his sexual orientation. Due to the continuation of his peers cyber bullying on him, he decided to kill himself. He is not the only victim.There are countless teenagers being cyber bullied and 80 % of them chooses suicide as a way to escape. • Another depressing example was a 17 year old girl named, Rachael Neblett. She was a student at Bullitt East school who was less than 5 feet tall. Even though her height was an advantage for her in gymnastics and cheerleading, she was often a target for the bullies.Through her MySpace account, she began to continually receive threatening emails by an anonymous in 2006. Despite this happening, she kept it as secrets from her parents because she didn’t want to worry them. Extreme desperation and depression came to her and soon, she decided to take her life. • Cyber bullying has caused numerous deaths by leading the victims to suffer and at the end, choose suicide as a way to end the bullying.
  • 12. • More than half of the teenagers and young adolescents said that they have been bullied online. 1 out of 4 has said it has occurred more than once for them. • 81 % of people think that cyber bullying is an easier way to harass others than bullying in person because you can easily get away with it. • 90% of people who experiences cyber bullying tends to not report the abuse but rather keep to themselves until it completely destroys them or they choose to suicide. • Girls are twice the victims and perpetrators of cyber bullying compared to boys. • Most cyber bullying victims experience low self esteem & other disorders and even considers suicide.
  • 13. Graph on Cyber bullying
  • 14. Ways to Alleviate Cyber bullying ( Prevention) • Schools can take actions where they teach the children about the seriousness and awareness of cyber bullying. • If you know anyone or someone who is being bullied, I recommend you to go tell an adult about the situation. If you are the victim, do not be afraid to inform any adult.You shouldn’t be keeping it to yourself and letting the pain cut you deep. • Remember that it won’t get resolved if you just ignore the situation. Also, if you are being bullied, make sure you stay calm before you take any action and do anything wrong. You can also try to block the cyber bullying person or group of people . • You should never share personal information online to anyone or to meet someone that you only know through the internet. • Keep the records as evidences and always try to reach for help.Also, keep in mind that it is not your fault that the bullying situation is happening.
  • 15. References • "Effects of Cyberbullying – Family Lives." N.p., n.d.Web. 10 Oct. 2016. • "10 Forms of Cyberbullying | Kids Safety." N.p., n.d.Web. 10 Oct. 2016. • "STOP Cyberbullying: Cyberbullying by Proxy." N.p., n.d.Web. 12 Oct. 2016. • "11 FactsAboutCyber Bullying | DoSomething.org ..." N.p., n.d.Web. 15 Oct. 2016. • "Reasons People Cyber-bully -Your Self Series." N.p., n.d.Web. 15 Oct. 2016. • "8 ReasonsWhy Kids Cyberbully Others -Verywell." N.p., n.d.Web. 13 Oct. 2016. • "Cyber Ethics and Cyber Bullying - Blogspot.com." N.p., n.d.Web. 18 Oct. 2016. • "Ethics and Cyberbullying | MediaSmarts." N.p., n.d.Web. 18 Oct. 2016. • "Cyber Bully : Ethical Perspective of Cyber Bullying." N.p., n.d.Web. 19 Oct. 2016. • "STOP Cyberbullying: Direct Attacks." N.p., n.d.Web. 19 Oct. 2016. https://www.google.co.th/search?q=isolation+from+friends+and+family&espv=2&biw=839 &bih=596&source=lnms&tbm=isch&sa=X&ved=0ahUKEwjZj5blgPDPAhXEr48KHQRSDTkQ _AUIBigB#imgrc=yS49On6bj_8EcM%3A • Digital image.The Princess in theTower. N.p., n.d.Web. 19 Oct. 2016. • Http://www.youtube.com/channel/UChSMfTiCVrFHBMiAS51z54Q. "#CreateNoHate - A Campaign Against Cyberbullying."YouTube.YouTube, 18 July 2016.Web. 19 Oct. 2016. <https://www.youtube.com/watch?v=bzc2yjdNgho>.
  • 16. More References • Picture fromYoutube. Digital image.Youtube.com. N.p., n.d.Web. 19 Oct. 2016. https://www.google.co.th/search?q=twitter+logo&espv=2&biw=839&bih=596&source=lnms&tbm=isch&sa= X&ved=0ahUKEwiN1a7tn- 7PAhWDvI8KHZOzA58Q_AUIBigB#tbm=isch&q=password+stealing&imgrc=4vR7SWCPfEeEdM%3A • Cell phones on wirefly.com. Digital image.Wirefly.com. N.p., n.d.Web. 15 Oct. 2016. https://www.google.co.th/search?q=cell +phone&espv=2&biw=839&bih=596&source=lnms&tbm=isch&sa=X&ved=0ahUKEwiYscmqoO7PAhULRo8K HZcfBYwQ_AUIBigB#imgrc=g392-Ewu6KxQBM%3A https://www.google.co.th/search?q=cyberbullying+pictures&espv=2&biw=839&bih=596&source=lnms&tbm =isch&sa=X&ved=0ahUKEwjTwvvfou7PAhXKu48KHTU6ApEQ_AUIBigB#imgrc=myVvxEMfAhi05M%3A https://www.google.co.th/search?q=lock+key&espv=2&biw=839&bih=596&source=lnms&tbm=isch&sa=X&v ed=0ahUKEwicsM6zpu7PAhVIvY8KHYeIDvQQ_AUIBigB#tbm=isch&q=lock+key+clipart&imgrc=KFpGO- wBpUQmJM%3A • Picture from Pininterest. Digital image. Pininterest. N.p., n.d.Web. 21 Oct. 2016. • Lock and KeyClipart. Digital image. Cliparts. N.p., n.d.Web. 20 Oct. 2016. • Digital image. Examined Existence. N.p., n.d.Web. 22 Oct. 2016. https://www.google.co.th/search?q=isolation+from+friends+and+family&espv=2&biw=839&bih=596&sourc e=lnms&tbm=isch&sa=X&ved=0ahUKEwjZj5blgPDPAhXEr48KHQRSDTkQ_AUIBigB#tbm=isch&q=stress+i mages&imgrc=x_eKGbIVvsRAPM%3A https://www.google.co.th/search?q=poor+academic+performance&espv=2&biw=839&bih=596&source=lnms&tbm=isch &sa=X&ved=0ahUKEwitsaW5_O_PAhUILI8KHd1TCwMQ_AUIBigB#tbm=isch&q=anxiety+&imgrc=FqH1ZO3v4wDsKM% 3A • Digital image. Lifestyle. N.p., n.d.Web. 20 Oct. 2016.
  • 17. More References https://www.google.co.th/search?q=graph+of+cyber+bullying+statistics&espv=2&biw=839&bih=596&source=lnms&tbm= isch&sa=X&ved=0ahUKEwiZ8Ou1r-7PAhWFn5QKHfI- CIwQ_AUIBigB#tbm=isch&q=cyber+bullying+statistics+2016&imgrc=IPbihwLRBDnFmM%3A https://www.google.co.th/search?q=graph+of+cyber+bullying+statistics&espv=2&biw=839&bih=596&source=lnms&tbm= isch&sa=X&ved=0ahUKEwiZ8Ou1r-7PAhWFn5QKHfI-CIwQ_AUIBigB#imgrc=TEmo7PG0f3FrYM%3A • Digital image.Wordpress.com. N.p., n.d.Web. 19 Oct. 2016. • Digital image. US News. N.p., n.d.Web. 19 Oct. 2016. https://www.google.co.th/search?q=boredom+clipart&espv=2&biw=839&bih=596&source=lnms&tbm=isch&sa=X&ved=0ahUK EwiRmc-Pw- 7PAhVNtJQKHeKAB0wQ_AUIBigB#tbm=isch&q=peer+pressure+cyberbullying+clipart&imgdii=iF3LWE7t94n7YM%3A%3BiF3L WE7t94n7YM%3A%3B8bMsrLk7-d2c-M%3A&imgrc=iF3LWE7t94n7YM%3A https://www.google.co.th/search?q=boredom+clipart&espv=2&biw=839&bih=596&source=lnms&tbm=isch&sa=X&ved=0ahUK EwiRmcPw-7PAhVNtJQKHeKAB0wQ_AUIBigB#tbm=isch&q=revengecyberbullying+clipart&imgrc=wGkmYultBrYI0M%3A https://www.google.co.th/search?q=boredom+clipart&espv=2&biw=839&bih=596&source=lnms&tbm=isch&sa=X&ved=0ahUK EwiRmc-Pw-7PAhVNtJQKHeKAB0wQ_AUIBigB#tbm=isch&q=revenge+clipart&imgrc=KNywmJ2tquCuCM%3A https://www.google.co.th/search?q=poor+academic+performance&espv=2&biw=839&bih=596&source=lnm s&tbm=isch&sa=X&ved=0ahUKEwitsaW5_O_PAhUILI8KHd1TCwMQ_AUIBigB#imgrc=xY1d4dTbbicjkM%3A • Peer Pressure Clipart. Digital image. Cliparts. N.p., n.d.Web. 19 Oct. 2016. • Digital image. Frank DavidGreene. N.p., n.d.Web. 19 Oct. 2016. • Digital image. Gograph. N.p., n.d.Web. 20 Oct. 2016. • Digital image. Ongiantsshoulders.org. N.p., n.d.Web. 20 Oct. 2016.