SlideShare una empresa de Scribd logo
1 de 21
PROTECTING ONESELF
FROM CYBER BULLYING
ON SOCIAL MEDIA SITES
By
Swapnil Shahade
CONTENT
 INTRODUCTION
 STRUCTURE OF THE STUDY
 METHOD
 Participants
 Procedure
 Data analysis
 RESULTS
 LIMITATIONS AND FUTURE WORK
INTRODUCTION
Social Media
Social media is computer-mediated tool that allow people to
create, share or exchange information, career interests, ideas, and
pictures/videos in virtual communities and networks.
INTRODUCTION
Cyber Bullying
Cyberbullying is an action of harming or harassing via
information technology networks.
Use of communication technologies for the intention of harming
another person or group of people who have difficulty defending
themselves.
The intention is to embarrass, hurt, humiliate, offend, get
revenge, have fun, and exert power over others.
 Through Texting, Email, using offensive symbols, sexual
harassment.
STRUCTURE
Research question
 Protecting oneself from cyber bullying on social networking
sites.
 Staying safe online by limiting exposure.
 Identifying cyber safety protection on social media sites.
METHOD
• Participants
• Procedure
• Data analysis
PARTICIPANTS
• Participants were 259 undergraduate students
• Of the 259 participants who registered for the internet-based self
report measure, 254 had a sufficient completion rate to be
retained for further analysis.
PARTICIPANTS
51.60%
48.40%
SEX OF PARTICIPANTS
Male Female
PARTICIPANTS
72.90%
24.90%
2.20%
ETHNICITY
Chinese Indian Malaysian
PROCEDURE
Participants were recruited to the study via the university’s Face
Book page, student email accounts, and advertisements placed
on campus.
This measure remained live for four weeks and tool
approximately 30 minutes to complete.
 The measure was pilot tested for format, clarity, length, and ease
of administration.
Incentives for completing the self report measure included an
iPad and 10 x $10 Starbuck vouchers.
DATAANALYSIS
 The data was analysed theoretically according to a constructivist
grounded theory methodology.
 Participants recorded their perceptions of protecting themselves
from cyber bulling on social media sites.
 Comparative analysis, participants responses were compared,
connected and incorporated as themes.
RESULTS
Findings encompassed three groups
Bullies
Victims
Third party observers
 This infiltration encompassed four themes:
 Internet service providers
 Public education and media awareness
 Formal and informal supports
 Reporting.
BULLIES
Participants reported that bullies could protect themselves online
by ceasing to dialogue disrespectfully and being polite and
assertive in their interactions with the victim.
Rehabilitation in the form of giving public talks on anti-bullying.
 Thinking on a more positive note of the person.
Reduce the number of saying negative comments about people.
 Stop bullying and make some other activities that are not related
to negative effects.
VICTIM
 Victim cyber safety behaviours concentrated on individuals not
placing themselves in a vulnerable position, possessing a strong
identity, believing in and honouring themselves.
 Strategies included upgrading online security monitoring and
limiting access to networking sites
 Ignoring the bait of the bully and investing oneself in life
energizing activities
 Upgrading security system, use weird password, changing
password regularly
THIRD PARTY OBSERVERS
 Being a third party observer was viewed more in the role of
defender of internet safety rather than encourager and supporter
of bullying.
 Empowering and educating third party observers to take a stand
and be proactive in providing assistance to victims was proposed
as a needs satisfying behaviour
 Third party observers should be able to flag bullies secretly.
 Recognizing and addressing the solution early by approaching
either bully or victim and approaching external sources.
INTERNET SERVICE PROVIDERS
 Plan or invent stricter online privacy settings and routinely
changing username and e-mail address.
 Installing reporting device applications on all sites to raise
awareness of internet safety and reporting cyber bullying events.
 Internet Service Provider (ISP) account closure and/or
banishment.
 Lock his IP address so that he will not be able to access the
social media sites any more.
PUBLIC EDUCATION AND MEDIA
AWARENESS
 Using the media to promote and educate the public about self-
protection online.
 Educate public on cyber bullying and its consequences on the
victims and the social community.
 Increasing public awareness about actions which are considered
as cyber bullying.
 Make bullies understand that a comment online may leave a
scare that never heals just like real life bullying can.
FORMALAND INFORMAL SUPPORT
 Online and offline support was recommended
 Counselling represent formal support, and peer and family input
represent informal support.
 Informal support encompassed online forums and chat rooms,
with advice.
 Online chat groups to disclose problems if talking to someone is
hard.
REPORTING
 The system and process for reporting cyber bullying was raised
repeatedly by participants.
 Contact hotline for reporting cyber bullying.
Many aligned reporting bullying with protecting oneself online,
and maintained responsibility resided in the jurisdiction of the
Internet Service Provider, the victims themselves and third party
observers.
LIMITATIONS AND FUTURE WORK
 One limitation of this study is the participant size and adult
undergraduate cohort.
 Including youths and elders perspectives of self-protection
online would build upon this study.
 As cyber bullying is a relatively new phenomenon, future
studies need to explore how individuals learn help seeking
behaviours on social media sites – self-taught, observations,
advise or train.
 The jurisdiction of internet service providers in promoting
online safety and privacy needs to be evaluated in the research.
THANK YOU…

Más contenido relacionado

La actualidad más candente

Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
Department of Defense
 

La actualidad más candente (20)

Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against property
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime And Cyber Security
Cyber Crime And Cyber SecurityCyber Crime And Cyber Security
Cyber Crime And Cyber Security
 
Cybersecurity: Dos and Dont's
Cybersecurity: Dos and Dont'sCybersecurity: Dos and Dont's
Cybersecurity: Dos and Dont's
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 

Destacado

"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?""Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
DefinetheLine
 
Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meeting
anniebee3509
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
kscheidy
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
shannonmf
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
anugent_13
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
tburdzy1
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
TeamBanana
 
Cyber Bullying Presentation
Cyber Bullying PresentationCyber Bullying Presentation
Cyber Bullying Presentation
amate1cl
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
buech1cj
 

Destacado (20)

"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?""Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
 
Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meeting
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parents
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
What Happens Online in 60 Seconds?
What Happens Online in 60 Seconds?What Happens Online in 60 Seconds?
What Happens Online in 60 Seconds?
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Nos blessures intérieures
Nos blessures intérieuresNos blessures intérieures
Nos blessures intérieures
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying Presentation 2008
Cyberbullying Presentation 2008Cyberbullying Presentation 2008
Cyberbullying Presentation 2008
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Aet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingAet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullying
 
Cyber Bullying Presentation
Cyber Bullying PresentationCyber Bullying Presentation
Cyber Bullying Presentation
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 

Similar a Cyber Bullying on Social Media Sites

Research Methodology.pdf
Research Methodology.pdfResearch Methodology.pdf
Research Methodology.pdf
JioAhuja
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
ITIIIndustries
 
2 social media awareness for schools tec leadership institute
2 social media awareness for schools tec leadership institute2 social media awareness for schools tec leadership institute
2 social media awareness for schools tec leadership institute
tecleadership
 
Identifying and dealing with online bullying
Identifying and dealing with online bullyingIdentifying and dealing with online bullying
Identifying and dealing with online bullying
Jisc RSC East Midlands
 

Similar a Cyber Bullying on Social Media Sites (20)

Cyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdfCyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdf
 
SEG AT2.pptx
SEG AT2.pptxSEG AT2.pptx
SEG AT2.pptx
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYING
 
Report presentation electivelyjsksksk_073645.pptx
Report presentation electivelyjsksksk_073645.pptxReport presentation electivelyjsksksk_073645.pptx
Report presentation electivelyjsksksk_073645.pptx
 
Internet Safety and Cyberbullying Awareness for Middle Schoolers.
Internet Safety and Cyberbullying Awareness for Middle Schoolers.Internet Safety and Cyberbullying Awareness for Middle Schoolers.
Internet Safety and Cyberbullying Awareness for Middle Schoolers.
 
Chandan kumar
Chandan kumarChandan kumar
Chandan kumar
 
Social media, Technology, and Youth
Social media, Technology, and YouthSocial media, Technology, and Youth
Social media, Technology, and Youth
 
SEG AT2 final update
SEG AT2 final updateSEG AT2 final update
SEG AT2 final update
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Dwe m4 cyber bullying and conflict resolution
Dwe m4   cyber bullying and conflict resolutionDwe m4   cyber bullying and conflict resolution
Dwe m4 cyber bullying and conflict resolution
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
Research Methodology.pdf
Research Methodology.pdfResearch Methodology.pdf
Research Methodology.pdf
 
Social Media Policy for our School District
Social Media Policy for our School DistrictSocial Media Policy for our School District
Social Media Policy for our School District
 
final campaign
final campaignfinal campaign
final campaign
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
 
2 social media awareness for schools tec leadership institute
2 social media awareness for schools tec leadership institute2 social media awareness for schools tec leadership institute
2 social media awareness for schools tec leadership institute
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
 
Identifying and dealing with online bullying
Identifying and dealing with online bullyingIdentifying and dealing with online bullying
Identifying and dealing with online bullying
 
Enhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital WorldEnhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital World
 

Más de Swapnil Shahade (8)

CAD CAE CAM Lecture
CAD CAE CAM LectureCAD CAE CAM Lecture
CAD CAE CAM Lecture
 
Power Generating Shock Absorber
Power Generating Shock AbsorberPower Generating Shock Absorber
Power Generating Shock Absorber
 
Experimental Heat Transfer Analysis of Different PCM Material used in Concret...
Experimental Heat Transfer Analysis of Different PCM Material used in Concret...Experimental Heat Transfer Analysis of Different PCM Material used in Concret...
Experimental Heat Transfer Analysis of Different PCM Material used in Concret...
 
APPLICATION OF PCM IN CONSTRUCTION OF BUILDINGS
APPLICATION OF PCM IN CONSTRUCTION OF BUILDINGSAPPLICATION OF PCM IN CONSTRUCTION OF BUILDINGS
APPLICATION OF PCM IN CONSTRUCTION OF BUILDINGS
 
Swapnil Shahade
Swapnil  ShahadeSwapnil  Shahade
Swapnil Shahade
 
APPLICATION OF MECHATRONICS IN DEFENCE
APPLICATION OF MECHATRONICS IN DEFENCE APPLICATION OF MECHATRONICS IN DEFENCE
APPLICATION OF MECHATRONICS IN DEFENCE
 
Genetic Algorithm for task scheduling in Cloud Computing Environment
Genetic Algorithm for task scheduling in Cloud Computing EnvironmentGenetic Algorithm for task scheduling in Cloud Computing Environment
Genetic Algorithm for task scheduling in Cloud Computing Environment
 
Industrial Capacity Planning & Queue Management
Industrial Capacity Planning & Queue ManagementIndustrial Capacity Planning & Queue Management
Industrial Capacity Planning & Queue Management
 

Último

Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Último (20)

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 

Cyber Bullying on Social Media Sites

  • 1. PROTECTING ONESELF FROM CYBER BULLYING ON SOCIAL MEDIA SITES By Swapnil Shahade
  • 2. CONTENT  INTRODUCTION  STRUCTURE OF THE STUDY  METHOD  Participants  Procedure  Data analysis  RESULTS  LIMITATIONS AND FUTURE WORK
  • 3. INTRODUCTION Social Media Social media is computer-mediated tool that allow people to create, share or exchange information, career interests, ideas, and pictures/videos in virtual communities and networks.
  • 4. INTRODUCTION Cyber Bullying Cyberbullying is an action of harming or harassing via information technology networks. Use of communication technologies for the intention of harming another person or group of people who have difficulty defending themselves. The intention is to embarrass, hurt, humiliate, offend, get revenge, have fun, and exert power over others.  Through Texting, Email, using offensive symbols, sexual harassment.
  • 5. STRUCTURE Research question  Protecting oneself from cyber bullying on social networking sites.  Staying safe online by limiting exposure.  Identifying cyber safety protection on social media sites.
  • 7. PARTICIPANTS • Participants were 259 undergraduate students • Of the 259 participants who registered for the internet-based self report measure, 254 had a sufficient completion rate to be retained for further analysis.
  • 10. PROCEDURE Participants were recruited to the study via the university’s Face Book page, student email accounts, and advertisements placed on campus. This measure remained live for four weeks and tool approximately 30 minutes to complete.  The measure was pilot tested for format, clarity, length, and ease of administration. Incentives for completing the self report measure included an iPad and 10 x $10 Starbuck vouchers.
  • 11. DATAANALYSIS  The data was analysed theoretically according to a constructivist grounded theory methodology.  Participants recorded their perceptions of protecting themselves from cyber bulling on social media sites.  Comparative analysis, participants responses were compared, connected and incorporated as themes.
  • 12. RESULTS Findings encompassed three groups Bullies Victims Third party observers  This infiltration encompassed four themes:  Internet service providers  Public education and media awareness  Formal and informal supports  Reporting.
  • 13. BULLIES Participants reported that bullies could protect themselves online by ceasing to dialogue disrespectfully and being polite and assertive in their interactions with the victim. Rehabilitation in the form of giving public talks on anti-bullying.  Thinking on a more positive note of the person. Reduce the number of saying negative comments about people.  Stop bullying and make some other activities that are not related to negative effects.
  • 14. VICTIM  Victim cyber safety behaviours concentrated on individuals not placing themselves in a vulnerable position, possessing a strong identity, believing in and honouring themselves.  Strategies included upgrading online security monitoring and limiting access to networking sites  Ignoring the bait of the bully and investing oneself in life energizing activities  Upgrading security system, use weird password, changing password regularly
  • 15. THIRD PARTY OBSERVERS  Being a third party observer was viewed more in the role of defender of internet safety rather than encourager and supporter of bullying.  Empowering and educating third party observers to take a stand and be proactive in providing assistance to victims was proposed as a needs satisfying behaviour  Third party observers should be able to flag bullies secretly.  Recognizing and addressing the solution early by approaching either bully or victim and approaching external sources.
  • 16. INTERNET SERVICE PROVIDERS  Plan or invent stricter online privacy settings and routinely changing username and e-mail address.  Installing reporting device applications on all sites to raise awareness of internet safety and reporting cyber bullying events.  Internet Service Provider (ISP) account closure and/or banishment.  Lock his IP address so that he will not be able to access the social media sites any more.
  • 17. PUBLIC EDUCATION AND MEDIA AWARENESS  Using the media to promote and educate the public about self- protection online.  Educate public on cyber bullying and its consequences on the victims and the social community.  Increasing public awareness about actions which are considered as cyber bullying.  Make bullies understand that a comment online may leave a scare that never heals just like real life bullying can.
  • 18. FORMALAND INFORMAL SUPPORT  Online and offline support was recommended  Counselling represent formal support, and peer and family input represent informal support.  Informal support encompassed online forums and chat rooms, with advice.  Online chat groups to disclose problems if talking to someone is hard.
  • 19. REPORTING  The system and process for reporting cyber bullying was raised repeatedly by participants.  Contact hotline for reporting cyber bullying. Many aligned reporting bullying with protecting oneself online, and maintained responsibility resided in the jurisdiction of the Internet Service Provider, the victims themselves and third party observers.
  • 20. LIMITATIONS AND FUTURE WORK  One limitation of this study is the participant size and adult undergraduate cohort.  Including youths and elders perspectives of self-protection online would build upon this study.  As cyber bullying is a relatively new phenomenon, future studies need to explore how individuals learn help seeking behaviours on social media sites – self-taught, observations, advise or train.  The jurisdiction of internet service providers in promoting online safety and privacy needs to be evaluated in the research.