SlideShare una empresa de Scribd logo
1 de 10
Cyberbullying is the use of technology to harass, threaten, embarrass, or target
another person. By definition, it occurs among young people. When an adult is
involved, it may meet the definition of cyber-harassment or cyber-stalking, a
crime that can have legal consequences and involve jail time.
Sometimes cyberbullying can be easy to spot — for example, if your child shows
you a text message, tweet, or response to a status update on Facebook that is
harsh, mean, or cruel. Other acts are less obvious, like impersonating a victim
online or posting personal information, photos, or videos designed to hurt or
embarrass another person. Some kids report that a fake account, web page, or
online persona has been created with the sole intention to harass and bully.
Cyberbullying also can happen accidentally. The impersonal nature of text
messages, IMs, and emails make it very hard to detect the sender's tone — one
person's joke could be another's hurtful insult. Nevertheless, a repeated pattern
of emails, text messages, and online posts is rarely accidental.
Efects of cyberbullying


No longer limited to schoolyards or street corners, modern-day bullying can
happen at home as well as at school — essentially 24 hours a day. As long as
kids have access to a phone, computer, or other device (such as an I Touch),
they are at risk.
Severe or chronic cyberbullying can leave victims at greater risk for anxiety,
depression, and other stress-related disorders. In some rare but highly
publicized cases, some kids have turned to suicide.
The punishment for cyberbullies can include being suspended from school or
kicked off of sports teams. Certain types of cyberbullying also may violate
school codes or even anti-discrimination or sexual harassment laws.
How Parents Can Help
If you discover that your child is being cyberbullied, talk to him or her about any experiences you have
had in your childhood. This can help your child feel less alone. Let your child know that it's not his or
her fault, and that bullying says more about the bully than the victim. Talking to teachers or school
administrators also may help, but take cues from your child.
Many schools, school districts, and after-school clubs have established protocols for responding to
cyberbullying; these vary by district and state. But before reporting the problem, let your child know
that you plan to do so, as he or she could have concerns about "tattling" and might prefer that the
problem be handled privately.
Other measures to try:
Block the bully. Most devices have settings that allow you to electronically block emails, IMs, or text
messages from specific people.
Limit access to technology. Although it's hurtful, many kids who are bullied can't resist the temptation
to check websites or phones to see if there are new messages. Keep the computer in a public place in
the house (no laptops in children's bedrooms, for example) and limit the use of cell phones and games.
Some companies allow you to turn off text messaging services during certain hours. And, most
websites and phones provide the option for parental controls, which provide parents with access to
their children’s messages and online life.
Know your kids' online world. Check their postings and the sites kids visit, and be aware of how they
spend their time online. Talk to them about the importance of privacy and why it's a bad idea to share
personal information online, even with friends. Encourage them to safeguard passwords. Write up cell
phone and social media contracts that you are willing to enforce.
Look to the web for resource and support information about cyberbullying.
If your son or daughter agrees, you may also arrange for mediation with a therapist or counselor at
school who can work with your child and/or the bully.
When Your Child Is the Bully
Finding out that your kid is the one who is behaving inappropriately can be upsetting and
heartbreaking. It's important to address the problem head on and not wait for it to go away.
Talk to your child firmly about his or her actions and explain the negative impact it has on others.
Joking and teasing might seem OK, but it can hurt people's feelings and lead to getting in trouble.
Bullying — in any form — is unacceptable; there can be serious (and sometimes irrevocable)
consequences at home, school, and in the community if it continues.
Remind your child that the use of cell phones and computers is a privilege. Sometimes it helps to
restrict the use of these devices until behavior improves. If you feel your child should have a cell
phone for safety reasons, make sure it is a phone that can only be used for emergency purposes.
Insist on strict parental controls on all devices if there is any history of your child making impulsive
decisions when they are online.
To get to the heart of the matter, sometimes talking to teachers, guidance counselors, and other
school officials can help identify situations that lead a kid to bully others. If your child has trouble
managing anger, talk to a therapist about helping your son or daughter learn to cope with anger,
hurt, frustration, and other strong emotions in a healthy way.
Professional counseling often helps kids learn to deal with their feelings and improve their
confidence and social skills, which in turn can reduce the risk of bullying. If you're tech-savvy
yourself, model good online habits to help your kids understand the benefits and the dangers of life
in the digital world.
How Are Teens Cyberbullied?
Being a victim of cyberbullying can be a common and painful experience. Some
youth who cyberbully
Pretend they are other people online to trick others
Spread lies and rumors about victims
Trick people into revealing personal information
Send or forward mean text messages
Post pictures of victims without their consent
When teens were asked why they think others cyberbully, 81 percent said
that cyberbullies think it’s funny. Other teens believe that youth who cyberbully
Don’t think it’s a big deal
Don’t think about the consequences
Are encouraged by friends
Think everybody cyberbullies
Think they won’t get caught
How Do Victims React?
Contrary to what cyberbullies may believe, cyberbullying is a big deal, and can cause a
variety of reactions in teens. Some teens have reacted in positive ways to try to
prevent cyberbullying by
Blocking communication with the cyberbully
Deleting messages without reading them
Talking to a friend about the bullying
Reporting the problem to an Internet service provider or website moderator
Many youth experience a variety of emotions when they are cyberbullied. Youth who
are cyberbullied report feeling angry, hurt, embarrassed, or scared. These emotions
can cause victims to react in ways such as
Seeking revenge on the bully
Avoiding friends and activities
Cyberbullying back
Some teens feel threatened because they may not know who is cyberbullying them.
Although cyberbullies may think they are anonymous, they can be found. If you
are cyberbullied or harassed and need help, save all communication with
the cyberbully and talk to a parent, teacher, law enforcement officer, or other adult
you trust.
How Can I Prevent Cyber bullying?
Teens have figured out ways to prevent cyber bullying. Follow in the footsteps of other
quick-thinking teens and
Refuse to pass along cyber bullying messages
Tell friends to stop cyber bullying
Block communication with cyber bullies
Report cyber bullying to a trusted adult
You can also help prevent cyber bullying by
Speaking with other students, as well as teachers and school administrators, to develop
rules against cyber bullying
Raising awareness of the cyber bullying problem in your community by holding an
assembly and creating fliers to give to younger kids or parents
Sharing NCPC’s anti-cyber bullying message with friends
Don’t forget that even though you can’t see a cyber bully or the bully’s victim, cyber
bullying causes real problems. If you wouldn’t say it in person, don’t say it online.
Delete cyber bullying. Don’t write it. Don’t forward it.
Understanding Cyberbullying: Its Effects and How to Prevent It
Understanding Cyberbullying: Its Effects and How to Prevent It

Más contenido relacionado

La actualidad más candente

Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying griehl
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingpscl
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying PresentationMegan Townes
 
Cyber Bullying Questionnaire Results
Cyber Bullying Questionnaire ResultsCyber Bullying Questionnaire Results
Cyber Bullying Questionnaire Resultsa2columnd12
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingwrhawkins
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointshannonmf
 
savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)Chris Jagger
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
PPT Year 9 Parent Presentation Evening Feb 2011
PPT Year 9 Parent Presentation Evening Feb 2011PPT Year 9 Parent Presentation Evening Feb 2011
PPT Year 9 Parent Presentation Evening Feb 2011Loreto Normanurst
 

La actualidad más candente (17)

Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Parents must know about cyber bullying 2
Parents must know about cyber bullying  2Parents must know about cyber bullying  2
Parents must know about cyber bullying 2
 
Cyberbullying assignment
Cyberbullying assignmentCyberbullying assignment
Cyberbullying assignment
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying Presentation
 
Cyber Bullying Questionnaire Results
Cyber Bullying Questionnaire ResultsCyber Bullying Questionnaire Results
Cyber Bullying Questionnaire Results
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)
 
NetSmart [English]
NetSmart [English]NetSmart [English]
NetSmart [English]
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
PPT Year 9 Parent Presentation Evening Feb 2011
PPT Year 9 Parent Presentation Evening Feb 2011PPT Year 9 Parent Presentation Evening Feb 2011
PPT Year 9 Parent Presentation Evening Feb 2011
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 

Destacado

Arreglos En C ++
Arreglos En C ++Arreglos En C ++
Arreglos En C ++tacubomx
 
Análise da Viabilidade para a produção de Biocombustíveis...
Análise da Viabilidade para a produção de Biocombustíveis...Análise da Viabilidade para a produção de Biocombustíveis...
Análise da Viabilidade para a produção de Biocombustíveis...ProjetoBr
 
Formato de autoevaluacion sesion 13 y 14
Formato de autoevaluacion sesion 13 y 14Formato de autoevaluacion sesion 13 y 14
Formato de autoevaluacion sesion 13 y 14VOon Juarez Texis
 
Actividades con el listado ortográfico
Actividades con el listado ortográficoActividades con el listado ortográfico
Actividades con el listado ortográficofrangober
 
Weaving the Food Web: Community Food Security in California
Weaving the Food Web: Community Food Security in CaliforniaWeaving the Food Web: Community Food Security in California
Weaving the Food Web: Community Food Security in CaliforniaJohn Smith
 
Set Your Goals And Take Action, 16 Feb
Set Your Goals And Take Action, 16 FebSet Your Goals And Take Action, 16 Feb
Set Your Goals And Take Action, 16 Febguest27f8ddf
 

Destacado (8)

Meh
MehMeh
Meh
 
Arreglos En C ++
Arreglos En C ++Arreglos En C ++
Arreglos En C ++
 
Análise da Viabilidade para a produção de Biocombustíveis...
Análise da Viabilidade para a produção de Biocombustíveis...Análise da Viabilidade para a produção de Biocombustíveis...
Análise da Viabilidade para a produção de Biocombustíveis...
 
Las tics en el aula
Las tics en el aulaLas tics en el aula
Las tics en el aula
 
Formato de autoevaluacion sesion 13 y 14
Formato de autoevaluacion sesion 13 y 14Formato de autoevaluacion sesion 13 y 14
Formato de autoevaluacion sesion 13 y 14
 
Actividades con el listado ortográfico
Actividades con el listado ortográficoActividades con el listado ortográfico
Actividades con el listado ortográfico
 
Weaving the Food Web: Community Food Security in California
Weaving the Food Web: Community Food Security in CaliforniaWeaving the Food Web: Community Food Security in California
Weaving the Food Web: Community Food Security in California
 
Set Your Goals And Take Action, 16 Feb
Set Your Goals And Take Action, 16 FebSet Your Goals And Take Action, 16 Feb
Set Your Goals And Take Action, 16 Feb
 

Similar a Understanding Cyberbullying: Its Effects and How to Prevent It

Similar a Understanding Cyberbullying: Its Effects and How to Prevent It (20)

C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Bullying
BullyingBullying
Bullying
 
Bullying vs cyber bullying italy
Bullying vs cyber bullying italyBullying vs cyber bullying italy
Bullying vs cyber bullying italy
 
Cyber bullying-and-internet-addiction
Cyber bullying-and-internet-addictionCyber bullying-and-internet-addiction
Cyber bullying-and-internet-addiction
 
Cyber bullying-and-internet-addiction
Cyber bullying-and-internet-addictionCyber bullying-and-internet-addiction
Cyber bullying-and-internet-addiction
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Digital abuse
Digital abuseDigital abuse
Digital abuse
 
Preventing Cyberbullying
Preventing CyberbullyingPreventing Cyberbullying
Preventing Cyberbullying
 
Cyberbullying and internent addiction
Cyberbullying  and internent addictionCyberbullying  and internent addiction
Cyberbullying and internent addiction
 
Cyberbullying and Internet Addiction
Cyberbullying and Internet AddictionCyberbullying and Internet Addiction
Cyberbullying and Internet Addiction
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican Guard
 
Bullying In School Essay
Bullying In School EssayBullying In School Essay
Bullying In School Essay
 

Último

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Último (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Understanding Cyberbullying: Its Effects and How to Prevent It

  • 1.
  • 2. Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. By definition, it occurs among young people. When an adult is involved, it may meet the definition of cyber-harassment or cyber-stalking, a crime that can have legal consequences and involve jail time. Sometimes cyberbullying can be easy to spot — for example, if your child shows you a text message, tweet, or response to a status update on Facebook that is harsh, mean, or cruel. Other acts are less obvious, like impersonating a victim online or posting personal information, photos, or videos designed to hurt or embarrass another person. Some kids report that a fake account, web page, or online persona has been created with the sole intention to harass and bully. Cyberbullying also can happen accidentally. The impersonal nature of text messages, IMs, and emails make it very hard to detect the sender's tone — one person's joke could be another's hurtful insult. Nevertheless, a repeated pattern of emails, text messages, and online posts is rarely accidental.
  • 3. Efects of cyberbullying No longer limited to schoolyards or street corners, modern-day bullying can happen at home as well as at school — essentially 24 hours a day. As long as kids have access to a phone, computer, or other device (such as an I Touch), they are at risk. Severe or chronic cyberbullying can leave victims at greater risk for anxiety, depression, and other stress-related disorders. In some rare but highly publicized cases, some kids have turned to suicide. The punishment for cyberbullies can include being suspended from school or kicked off of sports teams. Certain types of cyberbullying also may violate school codes or even anti-discrimination or sexual harassment laws.
  • 4. How Parents Can Help If you discover that your child is being cyberbullied, talk to him or her about any experiences you have had in your childhood. This can help your child feel less alone. Let your child know that it's not his or her fault, and that bullying says more about the bully than the victim. Talking to teachers or school administrators also may help, but take cues from your child. Many schools, school districts, and after-school clubs have established protocols for responding to cyberbullying; these vary by district and state. But before reporting the problem, let your child know that you plan to do so, as he or she could have concerns about "tattling" and might prefer that the problem be handled privately. Other measures to try: Block the bully. Most devices have settings that allow you to electronically block emails, IMs, or text messages from specific people. Limit access to technology. Although it's hurtful, many kids who are bullied can't resist the temptation to check websites or phones to see if there are new messages. Keep the computer in a public place in the house (no laptops in children's bedrooms, for example) and limit the use of cell phones and games. Some companies allow you to turn off text messaging services during certain hours. And, most websites and phones provide the option for parental controls, which provide parents with access to their children’s messages and online life. Know your kids' online world. Check their postings and the sites kids visit, and be aware of how they spend their time online. Talk to them about the importance of privacy and why it's a bad idea to share personal information online, even with friends. Encourage them to safeguard passwords. Write up cell phone and social media contracts that you are willing to enforce. Look to the web for resource and support information about cyberbullying. If your son or daughter agrees, you may also arrange for mediation with a therapist or counselor at school who can work with your child and/or the bully.
  • 5. When Your Child Is the Bully Finding out that your kid is the one who is behaving inappropriately can be upsetting and heartbreaking. It's important to address the problem head on and not wait for it to go away. Talk to your child firmly about his or her actions and explain the negative impact it has on others. Joking and teasing might seem OK, but it can hurt people's feelings and lead to getting in trouble. Bullying — in any form — is unacceptable; there can be serious (and sometimes irrevocable) consequences at home, school, and in the community if it continues. Remind your child that the use of cell phones and computers is a privilege. Sometimes it helps to restrict the use of these devices until behavior improves. If you feel your child should have a cell phone for safety reasons, make sure it is a phone that can only be used for emergency purposes. Insist on strict parental controls on all devices if there is any history of your child making impulsive decisions when they are online. To get to the heart of the matter, sometimes talking to teachers, guidance counselors, and other school officials can help identify situations that lead a kid to bully others. If your child has trouble managing anger, talk to a therapist about helping your son or daughter learn to cope with anger, hurt, frustration, and other strong emotions in a healthy way. Professional counseling often helps kids learn to deal with their feelings and improve their confidence and social skills, which in turn can reduce the risk of bullying. If you're tech-savvy yourself, model good online habits to help your kids understand the benefits and the dangers of life in the digital world.
  • 6. How Are Teens Cyberbullied? Being a victim of cyberbullying can be a common and painful experience. Some youth who cyberbully Pretend they are other people online to trick others Spread lies and rumors about victims Trick people into revealing personal information Send or forward mean text messages Post pictures of victims without their consent When teens were asked why they think others cyberbully, 81 percent said that cyberbullies think it’s funny. Other teens believe that youth who cyberbully Don’t think it’s a big deal Don’t think about the consequences Are encouraged by friends Think everybody cyberbullies Think they won’t get caught
  • 7. How Do Victims React? Contrary to what cyberbullies may believe, cyberbullying is a big deal, and can cause a variety of reactions in teens. Some teens have reacted in positive ways to try to prevent cyberbullying by Blocking communication with the cyberbully Deleting messages without reading them Talking to a friend about the bullying Reporting the problem to an Internet service provider or website moderator Many youth experience a variety of emotions when they are cyberbullied. Youth who are cyberbullied report feeling angry, hurt, embarrassed, or scared. These emotions can cause victims to react in ways such as Seeking revenge on the bully Avoiding friends and activities Cyberbullying back Some teens feel threatened because they may not know who is cyberbullying them. Although cyberbullies may think they are anonymous, they can be found. If you are cyberbullied or harassed and need help, save all communication with the cyberbully and talk to a parent, teacher, law enforcement officer, or other adult you trust.
  • 8. How Can I Prevent Cyber bullying? Teens have figured out ways to prevent cyber bullying. Follow in the footsteps of other quick-thinking teens and Refuse to pass along cyber bullying messages Tell friends to stop cyber bullying Block communication with cyber bullies Report cyber bullying to a trusted adult You can also help prevent cyber bullying by Speaking with other students, as well as teachers and school administrators, to develop rules against cyber bullying Raising awareness of the cyber bullying problem in your community by holding an assembly and creating fliers to give to younger kids or parents Sharing NCPC’s anti-cyber bullying message with friends Don’t forget that even though you can’t see a cyber bully or the bully’s victim, cyber bullying causes real problems. If you wouldn’t say it in person, don’t say it online. Delete cyber bullying. Don’t write it. Don’t forward it.