SlideShare una empresa de Scribd logo
1 de 18
Yumna Ali
 Bullying is used to humiliate, threaten, oppress,
torment, and tyrannize someone. It can be
defined as a continuous misuse of power or
authority against a person or a group of people
that causes physical, emotional, and social harm
to that person or group. If this kind of attitude
and behavior happens online, it is called
cyberbullying.
 With over 100 million
users of smart phones in
Pakistan, Pakistan has been
included in the list of the
fastest growing countries
that are using internet
which only open the doors
for the fact that cyber
bullying is increasing as
well, yet there isn’t any
legislation for cyber crimes
in Pakistan.
 Harassment: Repeatedly sending offensive, rude, and insulting
messages
 Denigration: Distributing information about another that is
derogatory and untrue through posting it on a Web page,
sending it to others through email or instant messaging, or
posting or sending digitally altered photos of someone
 Flaming: Online "fighting" using electronic messages with
angry, vulgar language
 Impersonation: Breaking into an email or social networking
account and using that person's online identity to send or
post vicious or embarrassing material to/about others.
 Outing and Trickery: Sharing someone's secrets or
embarrassing information, or tricking someone into revealing
secrets or embarrassing information and forwarding it to
others
 Cyber Stalking: Repeatedly sending messages that include
threats of harm or are highly intimidating, or engaging in
other online activities that make a person afraid for his or
her safety (depending on the content of the message, it
may be illegal)
Common Forms of Cyber Bullying
 In Pakistan it seems that women are the easiest targets to be
bullied online, because the National Response Center for Cyber Crimes
(NR3C) does not have any legislation for cyber crimes such as hacking
and online stalking, there were several incidents that faced women
regarding these issues.
 Whoever with malicious intent gains unauthorized access to
any information system or data shall be punished with
imprisonment for a term which may extend to six months or
with fine which may extend to one hundred thousand rupees
or with both
• Cyber terrorism:
(a) the use or threat is designed to
coerce, intimidate, overawe or create
a sense of fear, panic or insecurity in
the Government or the public or a
section of the public or community or
sect or create a sense of fear or
insecurity in society; or
• (b) the use or threat is made for
the purpose or motive of advancing a
religious, ethnic or sectarian
cause; shall be punished with
imprisonment of either description for
a term which may extend to fourteen
years or with fine which may extend
to fifty million rupees or with both.
 You Can be Randomly Picked Up by LEAs
LEAs Can Come and Confiscate Your Laptop/Mobile or
anything They Want
Your Website Can Get Blocked, if Someone
Thinks its immoral
Spamming Can Cause You a Fine of Rs. 1 Million
Publishing a Meme on Facebook can Fine you With Rs. 1
Million
 How to prevent cyberbullying:
 Teenagers should take the effort to educate themselves on proper
“Internet etiquette.” This includes the proper use of emails, texts
and other forms of electronic messaging. Many negative posts or
messages sent online may simply have been sent accidentally or
misinterpreted, leaving either the sender, the receiver, or both
embarrassed, humiliated, hurt, or harassed.
 1. Use Computer Courtesy:
 Whether sending an email, chatting in a chat room, or speaking in a
forum, it is important to be courteous and respectful of others
onlineone should treat others the way he or she would like to be
treated. Likewise, just as you treat others with respect in the real
world, it is important that you apply these same basic rules online
as well.
 4. Keep Personal Information Private:
 Posting private and personal information
in the wrong locations can have serious
consequences. Identity theft is a rapidly
growing concern and divulging too much
information could give predators and
those with bad intentions valuable
information about yourself. When you
post your personal information on sites
such as Facebook, Twitter, and other
social networking sites, it is best to
restrict your privacy settings so that
only your friends can view personal
information. If private information is
posted in a group setting, read the
guidelines prior to posting to ensure that
such information will not be disclosed to
others.
 2. Think Before Posting:
 . Remember that once entered into the
Internet, online messages, posts, pictures,
or videos, will remain there forever, and
can be viewed by a massive, unknown
online audience. With cyberbullying, one
cannot just turn off the computer and
expect everything to return back to
normal. Even if the victim disconnects
himself from the Internet or other
electronic devices, cyberbullying can weave
itself back into the victim’s school,
workplace, or home environment.
 Password Safety
 1. Never, ever give your password on Facebook, MySpace, Aim, network, email, or
any similar service or cell phone unlock code to a friend. Friendships sometimes don’t
last, and that password or PIN can be used against you.
 2. Remember your secret answer. When you create an online account, and it asks
you to provide an accurate answer to a question you should know ‐ don’t treat it
lightly or as a joke. Make sure it’s something you will remember months and years
from now in case you have a problem at that time.
 3. Do not use passwords based on personal information (your login name, birthdate,
address, phone number, middle name, pet’s name, etc.).
 4. Use a mixture of upper and lowercase letters, numbers, and nonalphabetic
characters (symbols) if possible.
 . Help New Internet Users:
 Everyone was an Internet “newbie” at one
time. Many children and teen users that
gain access to social networking sites,
electronic devices, or the Internet for the
first time are unaware about how dangerous
these devices can be if abused or used
inappropriately. Although it is normal to be
excited about connecting with all of your
friends and classmates online, please be
mindful of the fact that there are others
on the Internet that abuse their privileges.
 You’ve been told “don’t talk to strangers.”
Well, people you meet on the Internet are
strangers. Other than friends you know in
“real life,” people online are not classified as
friends.
 Never agree to meet an online friend in
person. If someone asks to meet you, talk
to your parents about it.
 Do not lie about your age so you can go
somewhere on the Internet that is for
adults only.
 Do not spend excessive time on the
computer. You should partake in other
activities, exercise, and set aside time for
leisure.
 Something you see on the Internet might
make you uncomfortable or confused. Tell
your teacher or parent right away.
 Be Aware of What Your Kids are Doing Online
 Talk with your kids about cyberbullying and
other online issues regularly.
 Know the sites your kids visit and their
online activities. Ask where they’re going,
what they’re doing, and who they’re doing it
with.
 Tell your kids that as a responsible parent
you may review their online communications
if you think there is reason for concern.
Installing parental control filtering software
or monitoring programs are one option for
monitoring your child’s online behavior, but
do not rely solely on these tools.
 Have a sense of what they do online and in
texts. Learn about the sites they like. Try
out the devices they use.
 Ask for their passwords, but tell them you’ll
only use them in case of emergency.
 Ask to “friend” or “follow” your kids on
social media sites or ask another trusted
adult to do so.
 Encourage your kids to tell you immediately
if they, or someone they know, is being
cyberbullied. Explain that you will not take
away their computers or cell phones if they
confide in you about a problem they are
having.
 8. Be An Active Bystander:
 Bystanders play a key role in stopping and preventing cyberbullying. Cyberbullies depend on
bystanders to support them or do nothing to stop them. The real leaders are those who choose to
take an active role when they witness bullying and decide not go along with the crowd.
 If you witness cyberbullying, do not join in, nor stand by idly.
 Document if you see cyberbullying online, and when
 Don’t encourage the behavior, it is easy to fall under the peer pressure, but stand up for yourself!
 Don’t forward hurtful messages
 Don’t laugh at inappropriate jokes
 Tell an adult they trust
 Do not support cyberbullies, stand up for what is right and report cyberbullying cases to reliable
sources – “report center”.
 Educate yourself on effective preventative measures you can take
 What to do if you are a cyberbullying victim:
 . You CANNOT Just Turn Off the Computer:
 Those who do not completely understand the
phenomenon often wonder, “What’s the big deal?
Why don’t kids just turn off their computers?”
However, those who make this statement do not
realize that the process is not so simple. There
are a number of reasons why “clicking the exit
button” or “turning off the computer” simply
aren’t viable options for those being cyberbullied.
 First, why should a victim be required to
interrupt an online experience because of someone
else’s maliciousness? It is not appropriate to
blame the victim for another’s aggressive actions.
No one should have to turn off his or her
computer due to harassment received online, just
like no one should avoid going to school because
of school bullying.
 Cyberbullying can continue regardless of whether
the target is online. For example, a bully could
set up a defamatory Web page or spread rumors
via social networking sites. Unfortunately,
mistreatment still continues and the bully
perpetuates his assaults and cruelty, even when
the victim is offline.
 Ignore CyberBullies:
 Do not reply to his or her posts,
texts, etc. Along these same lines,
teens that experience cyberbullying
online are encouraged to keep a log
of journal of all their experiences.
Note specific incidents with as much
detail as possible, including who was
involved, where and when it
happened, how they responded, who
witnessed the incident, and what
was done to prevent its
reoccurrence. If the cyberbullying is
supplemented with bullying offline,
be sure to record all of these
activities as well.
3. Protect Yourself:
Block the cyberbully on social
networking sites, emails, electronic
devices, and so on. The less contact
you have with the cyberbully, the less
damage he or she can do
Change your emails, screen names, or
other usernames that the cyberbully is
contacting you via. Take care in giving
them out to family and friends whom
you know you can trust, so that you
will not need to worry about receiving
additional antagonizing messages from
those who are cyberbullying you.
Keep your social networking profiles on
private: make sure not to add anyone
you do not know or do not trust to
your profile
 . Educate Yourself About Cyberbullying
 It is important, and in some cases required, that schools educates their
students and staff on a regular basis regarding the nature, and
consequences of, and prohibitions and penalties associated with, all forms
of cyberbullying, and bullying, so that constant and updated awareness of
the problem is promoted. Education should occur through the attendance
of training workshops and seminars, as well as formalized continuing
education initiatives for all members of the school community. Educate
yourself on cyberbullying prevention strategies!
Cyber bullying

Más contenido relacionado

La actualidad más candente

Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpointjosiebrookeday
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...HDCH
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingMarc Kuhn
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingCoachElrod
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide sharebr03wood
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying griehl
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingQazi Anwar
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation introkscheidy
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying CarlosE15
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingringw1sl
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.jessy0121
 

La actualidad más candente (20)

Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 

Destacado

*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*Amber Dee
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingpscl
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingQuirky Kid
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointshannonmf
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointtburdzy1
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parentsdamarissepulveda
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingzackkay
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingbl03cook
 
Gracious Jesus 21 Do not Judge
Gracious Jesus 21 Do not JudgeGracious Jesus 21 Do not Judge
Gracious Jesus 21 Do not JudgeDr. Bella Pillai
 
Aet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingAet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingcschoeneman
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullyingMelissa
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?AJ Tivol
 
Cyber Bullying Presentation
Cyber Bullying PresentationCyber Bullying Presentation
Cyber Bullying Presentationamate1cl
 

Destacado (20)

*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parents
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
CyberBullying
CyberBullyingCyberBullying
CyberBullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Olmv cyberbullying
Olmv cyberbullyingOlmv cyberbullying
Olmv cyberbullying
 
Gracious Jesus 21 Do not Judge
Gracious Jesus 21 Do not JudgeGracious Jesus 21 Do not Judge
Gracious Jesus 21 Do not Judge
 
Zaštita-na-internetu
Zaštita-na-internetuZaštita-na-internetu
Zaštita-na-internetu
 
Elektronsko nasilje
Elektronsko nasiljeElektronsko nasilje
Elektronsko nasilje
 
Stage 6 fraction
Stage 6  fractionStage 6  fraction
Stage 6 fraction
 
Aet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingAet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullying
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullying
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?
 
Cyber Bullying Presentation
Cyber Bullying PresentationCyber Bullying Presentation
Cyber Bullying Presentation
 

Similar a Cyber bullying

Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet SafetyMark Deming
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptNaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptpurush203
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GArissa Ablao
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Week7assgn2KwanHoY
Week7assgn2KwanHoYWeek7assgn2KwanHoY
Week7assgn2KwanHoYYipKwanHo
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingSuphaphonP
 
Week7 assgn2suphaphonp
Week7 assgn2suphaphonpWeek7 assgn2suphaphonp
Week7 assgn2suphaphonpJingboWang9
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTTeacherNicaPrintable
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentationrenumann
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
CyberbullyingspecR Smith
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxRahuljain40418
 

Similar a Cyber bullying (20)

Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Week7assgn2KwanHoY
Week7assgn2KwanHoYWeek7assgn2KwanHoY
Week7assgn2KwanHoY
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Week7 assgn2suphaphonp
Week7 assgn2suphaphonpWeek7 assgn2suphaphonp
Week7 assgn2suphaphonp
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentation
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Parents must know about cyber bullying 2
Parents must know about cyber bullying  2Parents must know about cyber bullying  2
Parents must know about cyber bullying 2
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 

Más de Yumna Ali

Multiple sclerosis
Multiple sclerosisMultiple sclerosis
Multiple sclerosisYumna Ali
 
Reproductive Endocrinology
Reproductive EndocrinologyReproductive Endocrinology
Reproductive EndocrinologyYumna Ali
 
The role of HDL cholesterol in preventing atherosclerotic disease
The role of HDL cholesterol in preventing atherosclerotic diseaseThe role of HDL cholesterol in preventing atherosclerotic disease
The role of HDL cholesterol in preventing atherosclerotic diseaseYumna Ali
 
Diet and physical activity application
Diet and physical activity applicationDiet and physical activity application
Diet and physical activity applicationYumna Ali
 
Targeting white, brown and perivascular adipose tissue in Atherosclerosis
Targeting white, brown and perivascular adipose tissue in AtherosclerosisTargeting white, brown and perivascular adipose tissue in Atherosclerosis
Targeting white, brown and perivascular adipose tissue in AtherosclerosisYumna Ali
 
Gait biomechanics
Gait biomechanicsGait biomechanics
Gait biomechanicsYumna Ali
 

Más de Yumna Ali (6)

Multiple sclerosis
Multiple sclerosisMultiple sclerosis
Multiple sclerosis
 
Reproductive Endocrinology
Reproductive EndocrinologyReproductive Endocrinology
Reproductive Endocrinology
 
The role of HDL cholesterol in preventing atherosclerotic disease
The role of HDL cholesterol in preventing atherosclerotic diseaseThe role of HDL cholesterol in preventing atherosclerotic disease
The role of HDL cholesterol in preventing atherosclerotic disease
 
Diet and physical activity application
Diet and physical activity applicationDiet and physical activity application
Diet and physical activity application
 
Targeting white, brown and perivascular adipose tissue in Atherosclerosis
Targeting white, brown and perivascular adipose tissue in AtherosclerosisTargeting white, brown and perivascular adipose tissue in Atherosclerosis
Targeting white, brown and perivascular adipose tissue in Atherosclerosis
 
Gait biomechanics
Gait biomechanicsGait biomechanics
Gait biomechanics
 

Último

CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service 👖
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service  👖CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service  👖
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service 👖anilsa9823
 
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779Delhi Call girls
 
9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings RepublikGenuineGirls
 
Lucknow 💋 Dating Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Serv...
Lucknow 💋 Dating Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Serv...Lucknow 💋 Dating Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Serv...
Lucknow 💋 Dating Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Serv...anilsa9823
 
Film the city investagation powerpoint :)
Film the city investagation powerpoint :)Film the city investagation powerpoint :)
Film the city investagation powerpoint :)AshtonCains
 
Film show production powerpoint for site
Film show production powerpoint for siteFilm show production powerpoint for site
Film show production powerpoint for siteAshtonCains
 
Your LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence PackageYour LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence PackageSocioCosmos
 
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxDickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxednyonat
 
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779Night 7k Call Girls Atta Market Escorts Call Me: 8448380779
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779Delhi Call girls
 
This is a Powerpoint about research into the codes and conventions of a film ...
This is a Powerpoint about research into the codes and conventions of a film ...This is a Powerpoint about research into the codes and conventions of a film ...
This is a Powerpoint about research into the codes and conventions of a film ...samuelcoulson30
 
Website research Powerpoint for Bauer magazine
Website research Powerpoint for Bauer magazineWebsite research Powerpoint for Bauer magazine
Website research Powerpoint for Bauer magazinesamuelcoulson30
 
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Delhi Call girls
 
VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our EscortsVIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escortssonatiwari757
 
SELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANYSELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANYdizinfo
 
Film show post-production powerpoint for site
Film show post-production powerpoint for siteFilm show post-production powerpoint for site
Film show post-production powerpoint for siteAshtonCains
 
Film show investigation powerpoint for the site
Film show investigation powerpoint for the siteFilm show investigation powerpoint for the site
Film show investigation powerpoint for the siteAshtonCains
 
Film show pre-production powerpoint for site
Film show pre-production powerpoint for siteFilm show pre-production powerpoint for site
Film show pre-production powerpoint for siteAshtonCains
 

Último (20)

CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service 👖
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service  👖CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service  👖
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service 👖
 
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
 
9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik
 
Lucknow 💋 Dating Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Serv...
Lucknow 💋 Dating Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Serv...Lucknow 💋 Dating Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Serv...
Lucknow 💋 Dating Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Serv...
 
Film the city investagation powerpoint :)
Film the city investagation powerpoint :)Film the city investagation powerpoint :)
Film the city investagation powerpoint :)
 
Film show production powerpoint for site
Film show production powerpoint for siteFilm show production powerpoint for site
Film show production powerpoint for site
 
Your LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence PackageYour LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence Package
 
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxDickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
 
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779Night 7k Call Girls Atta Market Escorts Call Me: 8448380779
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779
 
This is a Powerpoint about research into the codes and conventions of a film ...
This is a Powerpoint about research into the codes and conventions of a film ...This is a Powerpoint about research into the codes and conventions of a film ...
This is a Powerpoint about research into the codes and conventions of a film ...
 
Website research Powerpoint for Bauer magazine
Website research Powerpoint for Bauer magazineWebsite research Powerpoint for Bauer magazine
Website research Powerpoint for Bauer magazine
 
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
🔝9953056974 🔝Call Girls In Mehrauli Escort Service Delhi NCR
🔝9953056974 🔝Call Girls In Mehrauli  Escort Service Delhi NCR🔝9953056974 🔝Call Girls In Mehrauli  Escort Service Delhi NCR
🔝9953056974 🔝Call Girls In Mehrauli Escort Service Delhi NCR
 
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
 
VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our EscortsVIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escorts
 
SELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANYSELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANY
 
Film show post-production powerpoint for site
Film show post-production powerpoint for siteFilm show post-production powerpoint for site
Film show post-production powerpoint for site
 
Film show investigation powerpoint for the site
Film show investigation powerpoint for the siteFilm show investigation powerpoint for the site
Film show investigation powerpoint for the site
 
Film show pre-production powerpoint for site
Film show pre-production powerpoint for siteFilm show pre-production powerpoint for site
Film show pre-production powerpoint for site
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Masudpur
Delhi  99530 vip 56974  Genuine Escort Service Call Girls in MasudpurDelhi  99530 vip 56974  Genuine Escort Service Call Girls in Masudpur
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Masudpur
 

Cyber bullying

  • 2.  Bullying is used to humiliate, threaten, oppress, torment, and tyrannize someone. It can be defined as a continuous misuse of power or authority against a person or a group of people that causes physical, emotional, and social harm to that person or group. If this kind of attitude and behavior happens online, it is called cyberbullying.
  • 3.  With over 100 million users of smart phones in Pakistan, Pakistan has been included in the list of the fastest growing countries that are using internet which only open the doors for the fact that cyber bullying is increasing as well, yet there isn’t any legislation for cyber crimes in Pakistan.
  • 4.  Harassment: Repeatedly sending offensive, rude, and insulting messages  Denigration: Distributing information about another that is derogatory and untrue through posting it on a Web page, sending it to others through email or instant messaging, or posting or sending digitally altered photos of someone  Flaming: Online "fighting" using electronic messages with angry, vulgar language  Impersonation: Breaking into an email or social networking account and using that person's online identity to send or post vicious or embarrassing material to/about others.  Outing and Trickery: Sharing someone's secrets or embarrassing information, or tricking someone into revealing secrets or embarrassing information and forwarding it to others  Cyber Stalking: Repeatedly sending messages that include threats of harm or are highly intimidating, or engaging in other online activities that make a person afraid for his or her safety (depending on the content of the message, it may be illegal) Common Forms of Cyber Bullying
  • 5.  In Pakistan it seems that women are the easiest targets to be bullied online, because the National Response Center for Cyber Crimes (NR3C) does not have any legislation for cyber crimes such as hacking and online stalking, there were several incidents that faced women regarding these issues.
  • 6.
  • 7.  Whoever with malicious intent gains unauthorized access to any information system or data shall be punished with imprisonment for a term which may extend to six months or with fine which may extend to one hundred thousand rupees or with both • Cyber terrorism: (a) the use or threat is designed to coerce, intimidate, overawe or create a sense of fear, panic or insecurity in the Government or the public or a section of the public or community or sect or create a sense of fear or insecurity in society; or • (b) the use or threat is made for the purpose or motive of advancing a religious, ethnic or sectarian cause; shall be punished with imprisonment of either description for a term which may extend to fourteen years or with fine which may extend to fifty million rupees or with both.
  • 8.  You Can be Randomly Picked Up by LEAs LEAs Can Come and Confiscate Your Laptop/Mobile or anything They Want Your Website Can Get Blocked, if Someone Thinks its immoral Spamming Can Cause You a Fine of Rs. 1 Million Publishing a Meme on Facebook can Fine you With Rs. 1 Million
  • 9.  How to prevent cyberbullying:  Teenagers should take the effort to educate themselves on proper “Internet etiquette.” This includes the proper use of emails, texts and other forms of electronic messaging. Many negative posts or messages sent online may simply have been sent accidentally or misinterpreted, leaving either the sender, the receiver, or both embarrassed, humiliated, hurt, or harassed.  1. Use Computer Courtesy:  Whether sending an email, chatting in a chat room, or speaking in a forum, it is important to be courteous and respectful of others onlineone should treat others the way he or she would like to be treated. Likewise, just as you treat others with respect in the real world, it is important that you apply these same basic rules online as well.
  • 10.  4. Keep Personal Information Private:  Posting private and personal information in the wrong locations can have serious consequences. Identity theft is a rapidly growing concern and divulging too much information could give predators and those with bad intentions valuable information about yourself. When you post your personal information on sites such as Facebook, Twitter, and other social networking sites, it is best to restrict your privacy settings so that only your friends can view personal information. If private information is posted in a group setting, read the guidelines prior to posting to ensure that such information will not be disclosed to others.  2. Think Before Posting:  . Remember that once entered into the Internet, online messages, posts, pictures, or videos, will remain there forever, and can be viewed by a massive, unknown online audience. With cyberbullying, one cannot just turn off the computer and expect everything to return back to normal. Even if the victim disconnects himself from the Internet or other electronic devices, cyberbullying can weave itself back into the victim’s school, workplace, or home environment.
  • 11.  Password Safety  1. Never, ever give your password on Facebook, MySpace, Aim, network, email, or any similar service or cell phone unlock code to a friend. Friendships sometimes don’t last, and that password or PIN can be used against you.  2. Remember your secret answer. When you create an online account, and it asks you to provide an accurate answer to a question you should know ‐ don’t treat it lightly or as a joke. Make sure it’s something you will remember months and years from now in case you have a problem at that time.  3. Do not use passwords based on personal information (your login name, birthdate, address, phone number, middle name, pet’s name, etc.).  4. Use a mixture of upper and lowercase letters, numbers, and nonalphabetic characters (symbols) if possible.
  • 12.  . Help New Internet Users:  Everyone was an Internet “newbie” at one time. Many children and teen users that gain access to social networking sites, electronic devices, or the Internet for the first time are unaware about how dangerous these devices can be if abused or used inappropriately. Although it is normal to be excited about connecting with all of your friends and classmates online, please be mindful of the fact that there are others on the Internet that abuse their privileges.  You’ve been told “don’t talk to strangers.” Well, people you meet on the Internet are strangers. Other than friends you know in “real life,” people online are not classified as friends.  Never agree to meet an online friend in person. If someone asks to meet you, talk to your parents about it.  Do not lie about your age so you can go somewhere on the Internet that is for adults only.  Do not spend excessive time on the computer. You should partake in other activities, exercise, and set aside time for leisure.  Something you see on the Internet might make you uncomfortable or confused. Tell your teacher or parent right away.
  • 13.  Be Aware of What Your Kids are Doing Online  Talk with your kids about cyberbullying and other online issues regularly.  Know the sites your kids visit and their online activities. Ask where they’re going, what they’re doing, and who they’re doing it with.  Tell your kids that as a responsible parent you may review their online communications if you think there is reason for concern. Installing parental control filtering software or monitoring programs are one option for monitoring your child’s online behavior, but do not rely solely on these tools.  Have a sense of what they do online and in texts. Learn about the sites they like. Try out the devices they use.  Ask for their passwords, but tell them you’ll only use them in case of emergency.  Ask to “friend” or “follow” your kids on social media sites or ask another trusted adult to do so.  Encourage your kids to tell you immediately if they, or someone they know, is being cyberbullied. Explain that you will not take away their computers or cell phones if they confide in you about a problem they are having.
  • 14.  8. Be An Active Bystander:  Bystanders play a key role in stopping and preventing cyberbullying. Cyberbullies depend on bystanders to support them or do nothing to stop them. The real leaders are those who choose to take an active role when they witness bullying and decide not go along with the crowd.  If you witness cyberbullying, do not join in, nor stand by idly.  Document if you see cyberbullying online, and when  Don’t encourage the behavior, it is easy to fall under the peer pressure, but stand up for yourself!  Don’t forward hurtful messages  Don’t laugh at inappropriate jokes  Tell an adult they trust  Do not support cyberbullies, stand up for what is right and report cyberbullying cases to reliable sources – “report center”.  Educate yourself on effective preventative measures you can take
  • 15.  What to do if you are a cyberbullying victim:  . You CANNOT Just Turn Off the Computer:  Those who do not completely understand the phenomenon often wonder, “What’s the big deal? Why don’t kids just turn off their computers?” However, those who make this statement do not realize that the process is not so simple. There are a number of reasons why “clicking the exit button” or “turning off the computer” simply aren’t viable options for those being cyberbullied.  First, why should a victim be required to interrupt an online experience because of someone else’s maliciousness? It is not appropriate to blame the victim for another’s aggressive actions. No one should have to turn off his or her computer due to harassment received online, just like no one should avoid going to school because of school bullying.  Cyberbullying can continue regardless of whether the target is online. For example, a bully could set up a defamatory Web page or spread rumors via social networking sites. Unfortunately, mistreatment still continues and the bully perpetuates his assaults and cruelty, even when the victim is offline.
  • 16.  Ignore CyberBullies:  Do not reply to his or her posts, texts, etc. Along these same lines, teens that experience cyberbullying online are encouraged to keep a log of journal of all their experiences. Note specific incidents with as much detail as possible, including who was involved, where and when it happened, how they responded, who witnessed the incident, and what was done to prevent its reoccurrence. If the cyberbullying is supplemented with bullying offline, be sure to record all of these activities as well. 3. Protect Yourself: Block the cyberbully on social networking sites, emails, electronic devices, and so on. The less contact you have with the cyberbully, the less damage he or she can do Change your emails, screen names, or other usernames that the cyberbully is contacting you via. Take care in giving them out to family and friends whom you know you can trust, so that you will not need to worry about receiving additional antagonizing messages from those who are cyberbullying you. Keep your social networking profiles on private: make sure not to add anyone you do not know or do not trust to your profile
  • 17.  . Educate Yourself About Cyberbullying  It is important, and in some cases required, that schools educates their students and staff on a regular basis regarding the nature, and consequences of, and prohibitions and penalties associated with, all forms of cyberbullying, and bullying, so that constant and updated awareness of the problem is promoted. Education should occur through the attendance of training workshops and seminars, as well as formalized continuing education initiatives for all members of the school community. Educate yourself on cyberbullying prevention strategies!

Notas del editor

  1. Cyber bullying can take many forms. However, there are six forms that are the most common.*
  2. Unauthorized access to critical infrastructure information system or data: Whoever with malicious intent gains unauthorized access to any critical infrastructure information system or data shall be punished with imprisonment upto three years or with fine which may extend to one million rupees or with both. If you are wondering what this “Critical Infrastructure” is, then here’s how it is defined in the bill: “critical infrastructure” includes the infrastructures so designated by any Government in Pakistan and such other assets, systems and networks, whether physical or virtual, so vital to the State or its organs including judicature that their incapacitation or destruction may have a debilitating effect on national security, economy, public health,safety or matters related thereto;
  3. Section 5: Unauthorized access to critical infrastructure information system or data: Whoever with malicious intent gains unauthorized access to any critical infrastructure information system or data shall be punished with imprisonment upto three years or with fine which may extend to one million rupees or with both. https://propakistani.pk/2015/04/17/see-what-cyber-crime-law-can-do-to-you-a-must-read-for-all-internet-users-in-pakistan Expedited Preservation of data. (1) If an investigating officer is satisfied that (a) data stored in any information system or by means of an information system, is reasonably required for the purposes of a criminal investigation; and (b) there is a risk or vulnerability that the data may be modified, lost, destroyed or rendered inaccessible, the investigating officer may, by written notice given to a person in control of the information system, require the person to ensure that the data specified in the notice be preserved and the integrity thereof is maintained for a period not exceeding ninety days as specified in the notice. Here are reason that PTA can give to block a website if its content is: Against Islam or its integrity, Against security or defence of Pakistan Against friendly relations with foreign states Against a public order If content is indecent or immoral Or if it incites an offenc (2) The period provided in sub-section (1) for preservation of data may be extended by the Magistrate if so deemed necessary upon receipt of an application from the investigating officer in this behalf. Section 7: Criminal Interference with critical infrastructure information system or data: Whoever with malicious intent and without authorization interferes with or damages, or causes to be inferred with or damaged, any critical information system or any part thereof, or critical infrastructure data or any part thereof, shall be punished with imprisonment which may extend to seven years or with fine which may extend to five million rupees or with both 1) No person whether a police officer, investigation officer or otherwise, other than an investigating officer of the special investigation agency shall investigate an offence under this Act: Provided that the Federal Government or the Provincial Government may, as the case may be, constitute joint investigation team comprising of the officers of special investigation agency and any other law enforcement agency including Police for investigation of events involving commission of offences under this Act and any other law for the time being in force. (2) No person other than a prosecutor designated as such by the special investigating agency shall prosecute any offence under this Act.
  4. . In any circumstance, no matter how simple, Internet users can observe the Golden rule: It is important to note that what is posted online today may come back and haunt the writer tomorrow or later in the future. That silly or funny photograph posted on a social networking site may preclude job acquisition for that person years later. Many colleges and employers are now searching social networking sites prior to hiring
  5. Never give out personal information about yourself, your family or your friends, no matter how well you think you know your cyberpals. This includes names, addresses, telephone numbers, school locations and names, and not even which city you live in. Be careful who you send pictures to, as well as monitor and ensure your password safety.
  6. 5. Change your password often. It takes time and is a bit of a chore, but do it anyway. It takes more time and is more of a chore to try to recover from a hacked account or from identity theft. 6. Never provide your password over email or in response to an email request. 7. Make your own acronym by creating a phrase that means something to you, and group together the first letter of each word. Use numbers and symbols when you can. Make sure the acronym you create has at least seven characters. For example: • “Last week I fell down thirty stairs” (Lw1fd30$) • “It’s 3 AM, I must be lonely” (I3amimbL) • “My boyfriend got me a dog for Christmas” (mBFgm@d4C) • Use short words separated by characters (d0g%d00r, c@ndystr1p). 8. Do not place a written copy of your password on the side of your monitor, under your keyboard, under your mouse pad, etc. Figure out a secure place where you can store the passwords you write down – or, if possible – never write down any passwords; it is best to commit them to memory.
  7. Do not do anything on the Internet that may cost money without your parent’s permission. Never give out credit card information. If you are upset or angry about something, do not use the Internet to vent your feelings. Go to a friend, a relative, or teacher you are comfortable talking to instead. Passwords must be kept secret from everyone but your parents.
  8. Many teens who are cyberbullied online are often overwhelmed by the emotional pain due to either the continuity, or intensity of the harassment. Therefore, responding to the cyberbully’s attacks in a productive manner often seems extraordinarily difficult. The anticipatory anxiety often prevents a teenager from reporting the bully. Since the distress seems unbearable, the victim cannot muster up the strength to confide in a trusted adult. Of course, there is always a fear that a victim may be labeled a “tattletale” or a “snitch.” However, if the victim attempts to cope with the bullying without external assistance, the intensity and frequency of the bullying online may increases, which usually exacerbates the pre-existing situation. Victimized adolescents first must realize that they are not to blame for the way they have been treated. NO ONE deserves to be harassed in any environment, whether it is on the Internet or in the real world. Effective strategies can be implemented to help fend off cyberbullies. 1
  9. An effective and simple response is to not respond, interact, or engage with cyberbullies. However, this is not as easy as it sounds. It’s natural to elicit a defensive response and attempt to deal some “well-deserved” payback on the cyberbully. Many cyberbullies simply crave attention; it does not matter what type of attention they receive, whether it be positive or negative, as long as they can provoke someone into paying them the attention they desire. It is similar to a 2-year-old child throwing a temper tantrum to get attention from a parent: once the child’s needs are catered to, he or she will continue to act in the same manner in the future. . Do not leave the bully un-blocked just so that you can get another response later or to inflict some source of payback on the cyberbully. This is only inviting the cyberbully to continue, and you do not have to stoop down to their level! Block the individual from having communications with you as best as you can. It is imperative that cyberbullying victims take swift action if the cyberbullying incidents continue or escalate in gravity. Teenagers must learn to exercise due diligence in reducing their vulnerability to online aggression.