SlideShare una empresa de Scribd logo
1 de 11
Cyber Bullying
BY: ZT SITHOLE
What is cyber bullying?
 Bullying- Is generally understood as an aggressive and intentional act or
behaviour carried out by a group or an individual repeatedly and over time
against a victim who cannot defend him or herself
 Cyber bullying is used to describe bullying that takes lace on the internet
mostly through mobile phones and social media.
Means Used
 Cyber bullying can be carried out through
different means, such as mobile devices, internet,
messaging (e.g. chat programs, text/audio/video
programs, multimedia messages, gaming devices
and social networks)
 The initial research in this area showed that the
most common channels to perpetrate cyber
bullying were phone calls and text messages.
 However, the rapid pace of ICT innovation
determined changes in patterns. Nowadays
cyberbullying is performed through social
networks (mostly Facebook, followed by Twitter,
Instagram, Tumblr and YouTube)
Why should we keep an eye on cyber
bullying?
 We should be aware of cyber bullying because:
 1/3 children are victims of cyber bullying
 Nearly half of suicides among 10 to 14 year olds
are due to cyber bullying.
 1 in 7 teachers is a victim of cyber bullying.
 50% of children admit to being scared of their
online bullies.
 Cyber bullying also takes place in other places
of work.
 Only 2 in 10 victims will inform their parents and
teachers of online attacks
The two types of cyber bullying
 Direct attacks
 Messages sent directly to the victim
 Cyber bullying by proxy
 Using someone else to cyber bully a victim, this proxy may know they are cyber
bullying and they may not.
Ways to prevent cyber bullying
1. Establish a climate of communication with your child
 One of the best ways to help your child/learner be able to open-up to you is having
communication which builds trust.
 It is not enough to be “willing” to talk to your child/learner or only “hope” they come to
you when they experience any kind of bullying(any kind) but trying your best like
opening up to them can help the communication pattern grow.
2.Define it
 Give them a formal definition of cyber-bullying. Give them examples they might
experience using the online activities they are most likely to use.
3.Give them strategies to respond
 Since bullying is often done in front of their friends and peers, make sure the strategy to
prevent cyber bullying has credibility with their peers.( that is, that allows them to ‘save
face’ and direct the attention back to the bully.) Ironically, the wrong response could
encourage more bullying.
Ways to prevent cyber bullying
continued
4. Use celebrity cards
 Modern children choose role models and are influenced by them. These
role models can be YouTubers, actors, musicians, e.t.c and they discuss
bullying, advocate for victims, and encourage each one of us to create new
social norms where bullying is not just tolerated but shamed as a
behaviour.
5. Monitor online activity
Luckily, cyber bullying has one advantage or ‘traditional’ bullying: you can
notice it and save the evidence. This helps adults know what children are
doing and when they are doing it with whom.
Cyber bullying images
Way to prevent cyber bullying
continued
6.Know the apps and platforms
 It is most difficult to prevent cyber bullying if you do not understand how the apps work. You should
familiarise yourself with the apps to help prevent cyber bullying.
7.Engage parents and youth
 Create a community for adults and pupils to send a unified message against cyberbullying. teachers and
administrators can create policies and rules, including a cyberbullying reporting system, just as there are
now laws against cyber bullying.
8.Emphasize positivity
 School staff can do a big deal to prevent cyberbullying. As a teacher, you can use staff and parent
meetings and even send newsletters. Use your school website to create a page and forum, where parents
can discuss the problem. You can also engage bullies and victims by giving them mutual tasks, so they can
try to see each other from a different perspective
9. Remember the big idea
 Remember that the ultimate goal is to protect and restore the victim’s self-respect and empower them
with a mindset, tools and strategies to protect themselves online and offline in the future!
Cyber bullying
 All in all, working together as one(the
young and the old) cyber bullying can
be stopped and prevented if the
measures to it are discussed at an early
stage in life.
Image references
 Relevance
 Depositphotos
 Secure.avaaz.org
 MentalUp.co
 Economictimes.Indiatimes.com
 123RF

Más contenido relacionado

La actualidad más candente

Navegar por internet de forma segura
Navegar por internet de forma seguraNavegar por internet de forma segura
Navegar por internet de forma segurarosa de sharon
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementaryjaimejoyh
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingzackkay
 
Cyberbullying presentation Xander Cole
Cyberbullying presentation Xander ColeCyberbullying presentation Xander Cole
Cyberbullying presentation Xander ColeXanderCole
 
Anti-bullying presentation #4
Anti-bullying presentation #4Anti-bullying presentation #4
Anti-bullying presentation #4itunaschool
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying PresentationCourtney Cole
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety PresentationMichael Richards
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableKhy Amigable
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpointjosiebrookeday
 
riesgos en el mal uso de internet
riesgos en el mal uso de internetriesgos en el mal uso de internet
riesgos en el mal uso de internetanabella pautasso
 
Navegar por internet de forma segura.pdf
Navegar por internet de forma segura.pdfNavegar por internet de forma segura.pdf
Navegar por internet de forma segura.pdfSplashGaming1
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computerAbdullah Khosa
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
Stoning of soraya
Stoning of sorayaStoning of soraya
Stoning of sorayaSunny Gupta
 

La actualidad más candente (20)

Navegar por internet de forma segura
Navegar por internet de forma seguraNavegar por internet de forma segura
Navegar por internet de forma segura
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying presentation Xander Cole
Cyberbullying presentation Xander ColeCyberbullying presentation Xander Cole
Cyberbullying presentation Xander Cole
 
Anti-bullying presentation #4
Anti-bullying presentation #4Anti-bullying presentation #4
Anti-bullying presentation #4
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Prevención sexting
Prevención sextingPrevención sexting
Prevención sexting
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigable
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
riesgos en el mal uso de internet
riesgos en el mal uso de internetriesgos en el mal uso de internet
riesgos en el mal uso de internet
 
Navegar por internet de forma segura.pdf
Navegar por internet de forma segura.pdfNavegar por internet de forma segura.pdf
Navegar por internet de forma segura.pdf
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Ciberbullying
CiberbullyingCiberbullying
Ciberbullying
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Stoning of soraya
Stoning of sorayaStoning of soraya
Stoning of soraya
 
Bullying in schools
Bullying in schoolsBullying in schools
Bullying in schools
 

Similar a Cyber Bullying

Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenHomeGuides
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversationlippertnicole
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingStemGrade
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullyingseswear9388
 
Parents guide to cyberbullying
Parents guide to cyberbullyingParents guide to cyberbullying
Parents guide to cyberbullyingSaraMitchell40
 
Digital Citizenship.pptx
Digital Citizenship.pptxDigital Citizenship.pptx
Digital Citizenship.pptxSaraMitchell40
 
Digital Citizenship.pptx
Digital Citizenship.pptxDigital Citizenship.pptx
Digital Citizenship.pptxSaraMitchell40
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying griehl
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingpscl
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying21rahul1999
 
Unit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docxUnit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docxmarilucorr
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointhmorrell1
 

Similar a Cyber Bullying (20)

Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
 
Parents guide to cyberbullying
Parents guide to cyberbullyingParents guide to cyberbullying
Parents guide to cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Digital Citizenship.pptx
Digital Citizenship.pptxDigital Citizenship.pptx
Digital Citizenship.pptx
 
Digital Citizenship.pptx
Digital Citizenship.pptxDigital Citizenship.pptx
Digital Citizenship.pptx
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyberbullying: Advice for Schools
Cyberbullying: Advice for SchoolsCyberbullying: Advice for Schools
Cyberbullying: Advice for Schools
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
 
Unit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docxUnit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docx
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Edp 279 unit 2.4
Edp 279 unit 2.4Edp 279 unit 2.4
Edp 279 unit 2.4
 
SEG AT2.pptx
SEG AT2.pptxSEG AT2.pptx
SEG AT2.pptx
 

Último

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Último (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Cyber Bullying

  • 2. What is cyber bullying?  Bullying- Is generally understood as an aggressive and intentional act or behaviour carried out by a group or an individual repeatedly and over time against a victim who cannot defend him or herself  Cyber bullying is used to describe bullying that takes lace on the internet mostly through mobile phones and social media.
  • 3. Means Used  Cyber bullying can be carried out through different means, such as mobile devices, internet, messaging (e.g. chat programs, text/audio/video programs, multimedia messages, gaming devices and social networks)  The initial research in this area showed that the most common channels to perpetrate cyber bullying were phone calls and text messages.  However, the rapid pace of ICT innovation determined changes in patterns. Nowadays cyberbullying is performed through social networks (mostly Facebook, followed by Twitter, Instagram, Tumblr and YouTube)
  • 4. Why should we keep an eye on cyber bullying?  We should be aware of cyber bullying because:  1/3 children are victims of cyber bullying  Nearly half of suicides among 10 to 14 year olds are due to cyber bullying.  1 in 7 teachers is a victim of cyber bullying.  50% of children admit to being scared of their online bullies.  Cyber bullying also takes place in other places of work.  Only 2 in 10 victims will inform their parents and teachers of online attacks
  • 5. The two types of cyber bullying  Direct attacks  Messages sent directly to the victim  Cyber bullying by proxy  Using someone else to cyber bully a victim, this proxy may know they are cyber bullying and they may not.
  • 6. Ways to prevent cyber bullying 1. Establish a climate of communication with your child  One of the best ways to help your child/learner be able to open-up to you is having communication which builds trust.  It is not enough to be “willing” to talk to your child/learner or only “hope” they come to you when they experience any kind of bullying(any kind) but trying your best like opening up to them can help the communication pattern grow. 2.Define it  Give them a formal definition of cyber-bullying. Give them examples they might experience using the online activities they are most likely to use. 3.Give them strategies to respond  Since bullying is often done in front of their friends and peers, make sure the strategy to prevent cyber bullying has credibility with their peers.( that is, that allows them to ‘save face’ and direct the attention back to the bully.) Ironically, the wrong response could encourage more bullying.
  • 7. Ways to prevent cyber bullying continued 4. Use celebrity cards  Modern children choose role models and are influenced by them. These role models can be YouTubers, actors, musicians, e.t.c and they discuss bullying, advocate for victims, and encourage each one of us to create new social norms where bullying is not just tolerated but shamed as a behaviour. 5. Monitor online activity Luckily, cyber bullying has one advantage or ‘traditional’ bullying: you can notice it and save the evidence. This helps adults know what children are doing and when they are doing it with whom.
  • 9. Way to prevent cyber bullying continued 6.Know the apps and platforms  It is most difficult to prevent cyber bullying if you do not understand how the apps work. You should familiarise yourself with the apps to help prevent cyber bullying. 7.Engage parents and youth  Create a community for adults and pupils to send a unified message against cyberbullying. teachers and administrators can create policies and rules, including a cyberbullying reporting system, just as there are now laws against cyber bullying. 8.Emphasize positivity  School staff can do a big deal to prevent cyberbullying. As a teacher, you can use staff and parent meetings and even send newsletters. Use your school website to create a page and forum, where parents can discuss the problem. You can also engage bullies and victims by giving them mutual tasks, so they can try to see each other from a different perspective 9. Remember the big idea  Remember that the ultimate goal is to protect and restore the victim’s self-respect and empower them with a mindset, tools and strategies to protect themselves online and offline in the future!
  • 10. Cyber bullying  All in all, working together as one(the young and the old) cyber bullying can be stopped and prevented if the measures to it are discussed at an early stage in life.
  • 11. Image references  Relevance  Depositphotos  Secure.avaaz.org  MentalUp.co  Economictimes.Indiatimes.com  123RF