SlideShare uma empresa Scribd logo
1 de 12
By Mitchell Shannon
This presentation is about bullying in social media and
will cover the following topics;
 What is it and why does it happen?
 How does bullying online affect the victim?
 Processes that major outlets take to prevent bullying online
 Closing thoughts
 About me
 References
Social Media is a critical part of society today, the ability to contact people instantly, share photos with friends
and family, read trending articles that your friends have also read and the ability to connect with each other
in a way that was unheard of as little as 10 years ago is truly incredible. But with all good, there is always
something bad. To some social media can be a great tool and fun past time, but to others it can be a cruel way
to be criticized, harassed and bullied in a way that everyone can see, often times going unreported with no
one stepping in to stop the abuse. Although bullying online can happen to anyone, it is most commonly
found with young people both male and female. With the introduction of commenting, liking and sharing
photos on popular outlets like Facebook, YouTube and Twitter, online bullies are able to harass and bully
their victims at virtually any time of the day and any day of the month essentially leaving the victim with no
“safe zone” or place to go where they won’t be faced with some form of bullying.
Although comments, likes and shares are fairly direct forms of bulling, there are also much scarier but
less direct forms of bullying online. Victims have reported finding fake profiles that share all their
personal information online, including school information, home address and contact information.
Others have reported finding fake “groups” dedicated to bullying them, allowing multiple people to
gang up on the victim. According to statistics 1 in 5 incidents get reported to law officials, regardless
of the fact that bullying online is punishable by law.
Bullying online can create a variety of different mental problems amount young people, some of
which including depression, panic disorder, agoraphobia in females, and increased likeliness of
suicide in males. Teen suicide rates have been on the rise since the invention of social media and
bullying online, with statistics showing that 28% of people bullied online have considered suicide.
With the ease of access and partial anonymity of being online every user of social media is at risk in
one way or another of being bullied online.
Being bullied online often leaves the victim powerless, especially in a situation where multiple
people have joined in to publically ridicule and harass them. Statistics show that only 1 in 10
young people report online bullying to parental authorities – often due to embarrassment and
fear that the perpetrator will retaliate in a physical way. Being that 85% of people bullied online
know their bully in real life, the chances of face to face confrontation increase dramatically
compared to the 15% rate where the bully doesn’t know their victim (often seem on
anonymous websites like public forums or YouTube).
Using Facebook as an example, they have a variety of different approaches that individual users can
take when they feel they are being bullied online. When someone presses the “Report” button on
Facebook, someone or group of people at Facebook review the reported material and delete at their
discretion. Facebook, YouTube, Twitter and all other forms of social media have lengthy terms of
use that their users must abide by. Along with measures put in place to report and delete online
harassment, social media outlets have stepped up their policies to now allow temporary or
permanent banning on their sites to prevent reoccurrences.
 Fake profiles of themselves or public figures
 Harassing/threatening messages about them or others
 Hate speech, spam and pornography
 Embarrassing or suggestive photos
 Hurtful comments or posts
Although major social media outlets take steps to prevent online bullying and
harassment, online bullying continues to happen every single day. With so
many people at risk of being bullied online and the risk of severe mental
disorders including extreme isolation, panic disorders and tragically suicide
all users of social media are encouraged to report malicious behavior as soon
as it happens and work together to create a safer experience for other people
online.
My name is Mitchell Shannon, a 21 year old Ontario born and raised student studying
Business – Operations at Durham College. When I was in grade 10 of high school I
experienced bullying online. I was notified by a friend that some classmates made a
group about me on Facebook that had some very hateful things posted in it – including
pictures taken from my profile page. At the time I felt very hurt and powerless, after
reporting it several times to Facebook the page was eventually deleted but I
experienced firsthand what others report feeling after experiencing that kind of abuse –
isolation, increased panic and fear, and depression. It wasn’t until just recently that I
even told my parents that the events happened online because I was embarrassed by
what had happened. At the time I felt very alone and I would say that the events that
perspired have really changed who I am online. The reason that this is so important to
me is because I feel that no person should have to experience unpleasantness online,
things like Facebook and YouTube should be enjoyed instead of feared for what could
happen. I also feel that until you understand something you can’t work to make it any
better and also that everything you release to the digital world represents you forever,
so I strive to only release things that actually represent who I am.
- Mitchell Shannon
1. (n.d.). Retrieved from http://www.internetsafety101.org/cyberbullyingstatistics.htm
2. Elizabeth , L. (n.d.). Retrieved from http://www.cnn.com/2013/02/27/health/cyberbullying-
online-bully-victims
3. Schurgin-O, G., & Clarke-Pearson, K. (n.d.). Retrieved from
http://www.pediatricsdigest.mobi/content/127/4/800.full
4. Salmivalli, C. S. (n.d.). Retrieved from
http://onlinelibrary.wiley.com/doi/10.1002/(SICI)1098-2337(1996)22:1<1::AID-AB1>3.0.CO;2-
T/abstract
5. Webster, R. (n.d.). Retrieved from http://www.bullyingstatistics.org/content/cyber-bullying-
statistics.html

Mais conteúdo relacionado

Mais procurados

Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...HDCH
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Cyberbullying and social media
Cyberbullying and social mediaCyberbullying and social media
Cyberbullying and social mediaevieasmedia
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*Amber Dee
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullyingZiar Khan
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying PresentationCourtney Cole
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying griehl
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableKhy Amigable
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpointjosiebrookeday
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationpamelazuley
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointHannahMorrell
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Effects of social media on Youth
Effects of social media on YouthEffects of social media on Youth
Effects of social media on YouthSubham Dwivedi
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation introkscheidy
 

Mais procurados (20)

Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Cyberbullying and social media
Cyberbullying and social mediaCyberbullying and social media
Cyberbullying and social media
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigable
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Effects of social media on Youth
Effects of social media on YouthEffects of social media on Youth
Effects of social media on Youth
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
 

Semelhante a Bullying in social media presentation

Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxIs Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxchristiandean12115
 
Cyberbullying- Lacson, Espinosa.pdf
Cyberbullying- Lacson, Espinosa.pdfCyberbullying- Lacson, Espinosa.pdf
Cyberbullying- Lacson, Espinosa.pdfYnigoXaviLacson
 
Paper of social media
Paper of social mediaPaper of social media
Paper of social mediajoey_hazael
 
Current Issues Powerpt
Current Issues PowerptCurrent Issues Powerpt
Current Issues Powerptdulud2lm
 
Cyberbullying full
Cyberbullying fullCyberbullying full
Cyberbullying fullLiam1997
 
The Effects of Twitter.docx
                                          The Effects of Twitter.docx                                          The Effects of Twitter.docx
The Effects of Twitter.docxjoyjonna282
 
Kiwanis Essay
Kiwanis EssayKiwanis Essay
Kiwanis EssayBuksipi
 
The modern day bully
The modern day bully The modern day bully
The modern day bully meganct
 
The modern day bully part 2
The modern day bully part 2The modern day bully part 2
The modern day bully part 2Fran1234cesca
 
Surname 1NameInstructorCourseDateThe Effec.docx
Surname     1NameInstructorCourseDateThe Effec.docxSurname     1NameInstructorCourseDateThe Effec.docx
Surname 1NameInstructorCourseDateThe Effec.docxmattinsonjanel
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The InternetDebra Boardman
 
Social networking by jarin
Social networking by jarinSocial networking by jarin
Social networking by jarinjarin651
 
Media bullying presentation
Media bullying presentationMedia bullying presentation
Media bullying presentationnehanda123
 

Semelhante a Bullying in social media presentation (20)

Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxIs Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
 
Cyberbullying- Lacson, Espinosa.pdf
Cyberbullying- Lacson, Espinosa.pdfCyberbullying- Lacson, Espinosa.pdf
Cyberbullying- Lacson, Espinosa.pdf
 
Paper of social media
Paper of social mediaPaper of social media
Paper of social media
 
Presentation1
Presentation1Presentation1
Presentation1
 
Essays On Cyber Bullying
Essays On Cyber BullyingEssays On Cyber Bullying
Essays On Cyber Bullying
 
Current Issues Powerpt
Current Issues PowerptCurrent Issues Powerpt
Current Issues Powerpt
 
Krsh.pptx
Krsh.pptxKrsh.pptx
Krsh.pptx
 
Cyberbullying full
Cyberbullying fullCyberbullying full
Cyberbullying full
 
My media presentation
My media presentationMy media presentation
My media presentation
 
Fys paper
Fys paperFys paper
Fys paper
 
The Effects of Twitter.docx
                                          The Effects of Twitter.docx                                          The Effects of Twitter.docx
The Effects of Twitter.docx
 
Kiwanis Essay
Kiwanis EssayKiwanis Essay
Kiwanis Essay
 
The modern day bully
The modern day bully The modern day bully
The modern day bully
 
The modern day bully part 2
The modern day bully part 2The modern day bully part 2
The modern day bully part 2
 
Surname 1NameInstructorCourseDateThe Effec.docx
Surname     1NameInstructorCourseDateThe Effec.docxSurname     1NameInstructorCourseDateThe Effec.docx
Surname 1NameInstructorCourseDateThe Effec.docx
 
Week 5
Week 5Week 5
Week 5
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The Internet
 
Social networking by jarin
Social networking by jarinSocial networking by jarin
Social networking by jarin
 
Media bullying presentation
Media bullying presentationMedia bullying presentation
Media bullying presentation
 

Último

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Bullying in social media presentation

  • 2. This presentation is about bullying in social media and will cover the following topics;  What is it and why does it happen?  How does bullying online affect the victim?  Processes that major outlets take to prevent bullying online  Closing thoughts  About me  References
  • 3. Social Media is a critical part of society today, the ability to contact people instantly, share photos with friends and family, read trending articles that your friends have also read and the ability to connect with each other in a way that was unheard of as little as 10 years ago is truly incredible. But with all good, there is always something bad. To some social media can be a great tool and fun past time, but to others it can be a cruel way to be criticized, harassed and bullied in a way that everyone can see, often times going unreported with no one stepping in to stop the abuse. Although bullying online can happen to anyone, it is most commonly found with young people both male and female. With the introduction of commenting, liking and sharing photos on popular outlets like Facebook, YouTube and Twitter, online bullies are able to harass and bully their victims at virtually any time of the day and any day of the month essentially leaving the victim with no “safe zone” or place to go where they won’t be faced with some form of bullying.
  • 4. Although comments, likes and shares are fairly direct forms of bulling, there are also much scarier but less direct forms of bullying online. Victims have reported finding fake profiles that share all their personal information online, including school information, home address and contact information. Others have reported finding fake “groups” dedicated to bullying them, allowing multiple people to gang up on the victim. According to statistics 1 in 5 incidents get reported to law officials, regardless of the fact that bullying online is punishable by law.
  • 5. Bullying online can create a variety of different mental problems amount young people, some of which including depression, panic disorder, agoraphobia in females, and increased likeliness of suicide in males. Teen suicide rates have been on the rise since the invention of social media and bullying online, with statistics showing that 28% of people bullied online have considered suicide. With the ease of access and partial anonymity of being online every user of social media is at risk in one way or another of being bullied online.
  • 6. Being bullied online often leaves the victim powerless, especially in a situation where multiple people have joined in to publically ridicule and harass them. Statistics show that only 1 in 10 young people report online bullying to parental authorities – often due to embarrassment and fear that the perpetrator will retaliate in a physical way. Being that 85% of people bullied online know their bully in real life, the chances of face to face confrontation increase dramatically compared to the 15% rate where the bully doesn’t know their victim (often seem on anonymous websites like public forums or YouTube).
  • 7. Using Facebook as an example, they have a variety of different approaches that individual users can take when they feel they are being bullied online. When someone presses the “Report” button on Facebook, someone or group of people at Facebook review the reported material and delete at their discretion. Facebook, YouTube, Twitter and all other forms of social media have lengthy terms of use that their users must abide by. Along with measures put in place to report and delete online harassment, social media outlets have stepped up their policies to now allow temporary or permanent banning on their sites to prevent reoccurrences.
  • 8.  Fake profiles of themselves or public figures  Harassing/threatening messages about them or others  Hate speech, spam and pornography  Embarrassing or suggestive photos  Hurtful comments or posts
  • 9. Although major social media outlets take steps to prevent online bullying and harassment, online bullying continues to happen every single day. With so many people at risk of being bullied online and the risk of severe mental disorders including extreme isolation, panic disorders and tragically suicide all users of social media are encouraged to report malicious behavior as soon as it happens and work together to create a safer experience for other people online.
  • 10. My name is Mitchell Shannon, a 21 year old Ontario born and raised student studying Business – Operations at Durham College. When I was in grade 10 of high school I experienced bullying online. I was notified by a friend that some classmates made a group about me on Facebook that had some very hateful things posted in it – including pictures taken from my profile page. At the time I felt very hurt and powerless, after reporting it several times to Facebook the page was eventually deleted but I experienced firsthand what others report feeling after experiencing that kind of abuse – isolation, increased panic and fear, and depression. It wasn’t until just recently that I even told my parents that the events happened online because I was embarrassed by what had happened. At the time I felt very alone and I would say that the events that perspired have really changed who I am online. The reason that this is so important to me is because I feel that no person should have to experience unpleasantness online, things like Facebook and YouTube should be enjoyed instead of feared for what could happen. I also feel that until you understand something you can’t work to make it any better and also that everything you release to the digital world represents you forever, so I strive to only release things that actually represent who I am. - Mitchell Shannon
  • 11.
  • 12. 1. (n.d.). Retrieved from http://www.internetsafety101.org/cyberbullyingstatistics.htm 2. Elizabeth , L. (n.d.). Retrieved from http://www.cnn.com/2013/02/27/health/cyberbullying- online-bully-victims 3. Schurgin-O, G., & Clarke-Pearson, K. (n.d.). Retrieved from http://www.pediatricsdigest.mobi/content/127/4/800.full 4. Salmivalli, C. S. (n.d.). Retrieved from http://onlinelibrary.wiley.com/doi/10.1002/(SICI)1098-2337(1996)22:1<1::AID-AB1>3.0.CO;2- T/abstract 5. Webster, R. (n.d.). Retrieved from http://www.bullyingstatistics.org/content/cyber-bullying- statistics.html