SlideShare uma empresa Scribd logo
1 de 10
 When it comes to talk about
SAFETY one cannot forget
MASLOW HIERARCHY OF
NEEDS where we can see the a
direct link between Offline
(Maslow) and Online link and
which has been added by
Transmedia Hierarchy of
Needs by Gary Heighs (2010)
Cyber bulling is when a
   child, preteen or teen is
tormented,harassed,threate
        ned or humiliated by
 another child or teen using
the internet, interactive and
      digital technologies or
              mobile phones.
There have been more and more
        cases of CYBERBULLING
 Keeping  in view of
 CYBERBULLYING there has to
 be a child on each side or have
 been instigated against a
 minor against another minor.
 Once adults become involved
 it is a cyber harassment or
 cyber stalking
   Sending mean messages or threats to a person’s
    email account or a cell phone.
   Posting hurtful or threatening messages or social
    networking sites or messages.
   Stealing a persons account or information to
    break into another account and send damaging
    messages.
   Taking unflattering pictures of a person and
    spreading the on the cell phones and the internet
   Sexting or circulating sexually suggestive
    pictures or messages about a person.
   Teachers need to monitor internet activity
    and discuss the dangers of Cyber bullying
   Parents need to be more aware of their
    children's internet activity and talk about
    their proper online behaviour.
    Schools must have program in place to
    educate students on Cyber bullying and
    enforce consequences when it occurs.
   http://cybersmartcurriculum.org/
   http://www.ncpc.org/cyberbu
   http://www.stopcyberbullying.org/
   http://www.cyberbullyalert.com/
   http://www.pbs.org/wgbh/pages/frontline/kidsonline/saf
    e/
    http://www.360kid.com/blog/2007/08/a-survey-of-
    kids-social-networking-sites/
   http://dmlcentral.net/blog/danah-boyd/bullying-has-
    little-resonance-
    teenagersllyinhttp://well.blogs.nytimes.com/2009/03/30/
    when-dad-banned-text-messaging/?emg
   PICTURES AND IMAGES TAKEN FROM COMPFIGHT/LICENSE WITH CREATIVE
    COMMONS

Mais conteúdo relacionado

Mais procurados

Online Safety Tips for Parents
Online Safety Tips for ParentsOnline Safety Tips for Parents
Online Safety Tips for ParentsKristi Richburg
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingsamhauck
 
Ciberbullying alfio el mas raro
Ciberbullying alfio el mas raroCiberbullying alfio el mas raro
Ciberbullying alfio el mas raroAlfio Alfieri
 
Cyber bullying on social networking sites
Cyber bullying on social networking sitesCyber bullying on social networking sites
Cyber bullying on social networking sitesGerard1990
 
Cyberbullying. It's here.
Cyberbullying. It's here. Cyberbullying. It's here.
Cyberbullying. It's here. Your eKavach
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingwirsi
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technologyijtsrd
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorialtutorialsruby
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Laura Dunkley
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sitesner1eje
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensAndrew Kohl
 
Internet Safety 2013 update for parents
Internet Safety 2013 update for parentsInternet Safety 2013 update for parents
Internet Safety 2013 update for parentsAl Rowell
 
Geek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingGeek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingMelissa McDonald
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overviewJohn Woodring
 

Mais procurados (20)

Online Safety Tips for Parents
Online Safety Tips for ParentsOnline Safety Tips for Parents
Online Safety Tips for Parents
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Ciberbullying alfio el mas raro
Ciberbullying alfio el mas raroCiberbullying alfio el mas raro
Ciberbullying alfio el mas raro
 
Cyber bullying on social networking sites
Cyber bullying on social networking sitesCyber bullying on social networking sites
Cyber bullying on social networking sites
 
Cyberbullying. It's here.
Cyberbullying. It's here. Cyberbullying. It's here.
Cyberbullying. It's here.
 
Cyberbullying and Cybercrime
Cyberbullying and CybercrimeCyberbullying and Cybercrime
Cyberbullying and Cybercrime
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sites
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital Citizens
 
Internet Safety 2013 update for parents
Internet Safety 2013 update for parentsInternet Safety 2013 update for parents
Internet Safety 2013 update for parents
 
Geek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingGeek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® Cyberbullying
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overview
 

Destaque

RYLU Class Guide
RYLU Class GuideRYLU Class Guide
RYLU Class GuideDvorsCak
 
Facebookアプリ「モニプラ」を使用した
Facebookアプリ「モニプラ」を使用したFacebookアプリ「モニプラ」を使用した
Facebookアプリ「モニプラ」を使用したMasami Uekusa
 
informe de suelos relacion gabimetrica y volumetrica
informe de suelos relacion gabimetrica y volumetricainforme de suelos relacion gabimetrica y volumetrica
informe de suelos relacion gabimetrica y volumetricaEmerxitoo Cq
 
Alcotrade Catalog version 2011.10
Alcotrade Catalog version 2011.10Alcotrade Catalog version 2011.10
Alcotrade Catalog version 2011.10ntkanit
 
Iskierki w oczekiwaniu na Święta Bożego Narodzenia
Iskierki w oczekiwaniu na Święta Bożego NarodzeniaIskierki w oczekiwaniu na Święta Bożego Narodzenia
Iskierki w oczekiwaniu na Święta Bożego Narodzeniaiskierki
 
Manual usuarioempleador
Manual usuarioempleadorManual usuarioempleador
Manual usuarioempleadorEmerxitoo Cq
 
De cuong chinh sach tghd trung quoc
De cuong chinh sach tghd trung quocDe cuong chinh sach tghd trung quoc
De cuong chinh sach tghd trung quocBella Roll
 
Ayuda de como hacer
Ayuda de como hacerAyuda de como hacer
Ayuda de como hacerEmerxitoo Cq
 
Proses Kreatif dan Proses pemilihan Target Audience
Proses Kreatif dan Proses pemilihan Target AudienceProses Kreatif dan Proses pemilihan Target Audience
Proses Kreatif dan Proses pemilihan Target AudienceAdza Aldhi
 
informe Relaciones gravimetricas
informe Relaciones gravimetricasinforme Relaciones gravimetricas
informe Relaciones gravimetricasEmerxitoo Cq
 
Risk Your Life Underground Guide by DvorsCak
Risk Your Life Underground Guide by DvorsCakRisk Your Life Underground Guide by DvorsCak
Risk Your Life Underground Guide by DvorsCakDvorsCak
 
Transportasi dki jakarta.
Transportasi dki jakarta.Transportasi dki jakarta.
Transportasi dki jakarta.Astri Ratnasari
 
HỢP ĐỒNG NGOẠI THƯƠNG, HÓA ĐƠN THƯƠNG MẠI, PHIẾU ĐÓNG GÓI SONG NGỮ ANH VIỆT!!!
HỢP ĐỒNG NGOẠI THƯƠNG, HÓA ĐƠN THƯƠNG MẠI, PHIẾU ĐÓNG GÓI SONG NGỮ ANH VIỆT!!!HỢP ĐỒNG NGOẠI THƯƠNG, HÓA ĐƠN THƯƠNG MẠI, PHIẾU ĐÓNG GÓI SONG NGỮ ANH VIỆT!!!
HỢP ĐỒNG NGOẠI THƯƠNG, HÓA ĐƠN THƯƠNG MẠI, PHIẾU ĐÓNG GÓI SONG NGỮ ANH VIỆT!!!Vũ Phong Nguyễn
 

Destaque (17)

RYLU Class Guide
RYLU Class GuideRYLU Class Guide
RYLU Class Guide
 
Facebookアプリ「モニプラ」を使用した
Facebookアプリ「モニプラ」を使用したFacebookアプリ「モニプラ」を使用した
Facebookアプリ「モニプラ」を使用した
 
informe de suelos relacion gabimetrica y volumetrica
informe de suelos relacion gabimetrica y volumetricainforme de suelos relacion gabimetrica y volumetrica
informe de suelos relacion gabimetrica y volumetrica
 
Alcotrade Catalog version 2011.10
Alcotrade Catalog version 2011.10Alcotrade Catalog version 2011.10
Alcotrade Catalog version 2011.10
 
Iskierki w oczekiwaniu na Święta Bożego Narodzenia
Iskierki w oczekiwaniu na Święta Bożego NarodzeniaIskierki w oczekiwaniu na Święta Bożego Narodzenia
Iskierki w oczekiwaniu na Święta Bożego Narodzenia
 
Manual usuarioempleador
Manual usuarioempleadorManual usuarioempleador
Manual usuarioempleador
 
De cuong chinh sach tghd trung quoc
De cuong chinh sach tghd trung quocDe cuong chinh sach tghd trung quoc
De cuong chinh sach tghd trung quoc
 
111108user
111108user111108user
111108user
 
Ayuda de como hacer
Ayuda de como hacerAyuda de como hacer
Ayuda de como hacer
 
Proses Kreatif dan Proses pemilihan Target Audience
Proses Kreatif dan Proses pemilihan Target AudienceProses Kreatif dan Proses pemilihan Target Audience
Proses Kreatif dan Proses pemilihan Target Audience
 
informe Relaciones gravimetricas
informe Relaciones gravimetricasinforme Relaciones gravimetricas
informe Relaciones gravimetricas
 
Risk Your Life Underground Guide by DvorsCak
Risk Your Life Underground Guide by DvorsCakRisk Your Life Underground Guide by DvorsCak
Risk Your Life Underground Guide by DvorsCak
 
Transportasi dki jakarta.
Transportasi dki jakarta.Transportasi dki jakarta.
Transportasi dki jakarta.
 
Mpk bahasa inggris
Mpk bahasa inggrisMpk bahasa inggris
Mpk bahasa inggris
 
Ppt revisi hg 1
Ppt revisi hg 1Ppt revisi hg 1
Ppt revisi hg 1
 
HỢP ĐỒNG NGOẠI THƯƠNG, HÓA ĐƠN THƯƠNG MẠI, PHIẾU ĐÓNG GÓI SONG NGỮ ANH VIỆT!!!
HỢP ĐỒNG NGOẠI THƯƠNG, HÓA ĐƠN THƯƠNG MẠI, PHIẾU ĐÓNG GÓI SONG NGỮ ANH VIỆT!!!HỢP ĐỒNG NGOẠI THƯƠNG, HÓA ĐƠN THƯƠNG MẠI, PHIẾU ĐÓNG GÓI SONG NGỮ ANH VIỆT!!!
HỢP ĐỒNG NGOẠI THƯƠNG, HÓA ĐƠN THƯƠNG MẠI, PHIẾU ĐÓNG GÓI SONG NGỮ ANH VIỆT!!!
 
Patriarchal agenda
Patriarchal agendaPatriarchal agenda
Patriarchal agenda
 

Semelhante a Cyberbullying and the Impact on Maslow's Hierarchy of Needs

Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenHomeGuides
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safetyRay Brannon
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and schoolGrant Ward
 
Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Joyce Hirsh
 
Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Karen Brooks
 
The Prevention of Cyberbullying
The Prevention of CyberbullyingThe Prevention of Cyberbullying
The Prevention of CyberbullyingRRGraph Design
 
Social justice
Social justiceSocial justice
Social justicekm03john
 
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sbSafeChildUAE1
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptNaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptpurush203
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointshannonmf
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying21rahul1999
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullyingseswear9388
 
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxIs Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxchristiandean12115
 
How to stop cyber bullying
How to stop cyber bullyingHow to stop cyber bullying
How to stop cyber bullyingBullyvention
 
Powerpoint SB
Powerpoint SBPowerpoint SB
Powerpoint SBbrawl1sl
 

Semelhante a Cyberbullying and the Impact on Maslow's Hierarchy of Needs (20)

Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and school
 
Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02
 
Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31
 
The Prevention of Cyberbullying
The Prevention of CyberbullyingThe Prevention of Cyberbullying
The Prevention of Cyberbullying
 
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
 
Social justice
Social justiceSocial justice
Social justice
 
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sb
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
 
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxIs Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 
How to stop cyber bullying
How to stop cyber bullyingHow to stop cyber bullying
How to stop cyber bullying
 
Powerpoint SB
Powerpoint SBPowerpoint SB
Powerpoint SB
 

Último

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Cyberbullying and the Impact on Maslow's Hierarchy of Needs

  • 1.
  • 2.  When it comes to talk about SAFETY one cannot forget MASLOW HIERARCHY OF NEEDS where we can see the a direct link between Offline (Maslow) and Online link and which has been added by Transmedia Hierarchy of Needs by Gary Heighs (2010)
  • 3.
  • 4.
  • 5. Cyber bulling is when a child, preteen or teen is tormented,harassed,threate ned or humiliated by another child or teen using the internet, interactive and digital technologies or mobile phones.
  • 6. There have been more and more cases of CYBERBULLING
  • 7.  Keeping in view of CYBERBULLYING there has to be a child on each side or have been instigated against a minor against another minor. Once adults become involved it is a cyber harassment or cyber stalking
  • 8. Sending mean messages or threats to a person’s email account or a cell phone.  Posting hurtful or threatening messages or social networking sites or messages.  Stealing a persons account or information to break into another account and send damaging messages.  Taking unflattering pictures of a person and spreading the on the cell phones and the internet  Sexting or circulating sexually suggestive pictures or messages about a person.
  • 9. Teachers need to monitor internet activity and discuss the dangers of Cyber bullying  Parents need to be more aware of their children's internet activity and talk about their proper online behaviour.  Schools must have program in place to educate students on Cyber bullying and enforce consequences when it occurs.
  • 10. http://cybersmartcurriculum.org/  http://www.ncpc.org/cyberbu  http://www.stopcyberbullying.org/  http://www.cyberbullyalert.com/  http://www.pbs.org/wgbh/pages/frontline/kidsonline/saf e/  http://www.360kid.com/blog/2007/08/a-survey-of- kids-social-networking-sites/  http://dmlcentral.net/blog/danah-boyd/bullying-has- little-resonance- teenagersllyinhttp://well.blogs.nytimes.com/2009/03/30/ when-dad-banned-text-messaging/?emg  PICTURES AND IMAGES TAKEN FROM COMPFIGHT/LICENSE WITH CREATIVE COMMONS