SlideShare una empresa de Scribd logo
1 de 7
Descargar para leer sin conexión
The following content will be presented in the form of a Prezi and a poster.
1. What is cyber bullying?
Cyber bullying involves the use of Internet and communication technologies to deliberately and
repeatedly inflict harm on an individual or a group of people through harassment, embarrassment
and/or threats. (http://www.endcyberbullying.org/what-is-cyber-bullying/)
Examples of cyber bullying:
● Forwarding embarrassing picture, videos or messages without the consent of the owner.
● Using a false identity to post hurtful entries on social networking sites.
● Sending emails or text messages to harass others.
2. Why does cyber bullying occur?
● For revenge or out of anger
● As a source of entertainment
● Peer pressure
● Being able to hide behind false identities, they are more bold to say things that they won’t say in
person.
● For the feeling of superiority
● To garner attention
● Cyber bullies do not see the impacts their actions can have on their victims.
3. Is cyber bullying becoming a serious issue worldwide?
● 12% of the parents surveyed by Ipsos for Reuters News say that their child has become a
victim to cyber bullying.
● 26% of them say that they know a child in their neighborhood who has been cyber bullied.
● Another 60% say that the children are cyber bullied through social networking sites like
Facebook.
● 77% of the respondents say that parents and schools should give special attention to cyber
bullying.
● (Ipsos, 2012)
4)Impacts of cyber bullying on the victims:
● Poor performance at school
● Turn to drugs and alcohol
● Increase in truancy
● Take revenge by becoming a cyber bullying themselves
● Unable to deal with the situation, they might commit suicide
● Decrease in confidence and self-esteem
(http://www.stopbullying.gov/cyberbullying/what-is-it/index.html)
(http://www.afp.gov.au/policing/cybercrime/~/media/afp/pdf/c/cyber-bullying-no-crops.ashx)
5) The role of social networking sites and lawmakers
Social networking sites:
- Should social networking sites like Facebook be allowed to monitor their users’ activity on these
sites?
Yes No
Many of the cyber bullying cases happen on
social networking sites.As a result, they
should be proactive in solving the problem.
Cyber bullying is a problem caused by our
society, so social networking sites should
not be the one who takes all the blame. It
can only be solved if people are more
ethical and are more aware of the
consequences of cyber bullying.
Personal victim:The bullying can be very
hurtful and it needs to stop. Social
networking sites should place more
restrictions to prevent cyber bullying from
happening.There could be some kind of
punishment for users who misuse their
accounts. For example, their account would
be terminated or they would be brought to
court.
If social networking sites are allowed to
monitor, then it may be like living under Big
Brother. It violates our rights to free
speech and privacy.
Some social networking sites like Ask.fm
refuses to be held accountable for their
users’ posts on their sites. Users cannot
report other users for harassment.
Social networking sites already have a lot of
access to personal information. Having to
monitor their users’ activities would prove
too much of a burden to them. Education is
the best way to address cyber bullying.
People should have the right to feel safe
when they are on social networking sites.
We should be responsible for the friends
that we make on social networking sites.
Parents cannot monitor their children’s
activity on these sites 24/7.Therefore,
there should be more monitoring on social
networking sites to help deal with cyber
bullying.
Social networking sites are not responsible
for how their users interact with one
another. Parents should be the one who is
responsible for educating their children so
that they will use the Internet responsibly.
Social networking sites are the major cause
of cyber bullying. On these sites, cyber
bullies can choose to remain anonymous,
making them bolder to say hurtful things
online.
Social networking sites merely provide a
medium for people from all around the
world to communicate with each other.
Any attempts to monitor the things posted
on these sites would infringe the users’
rights free speech.Websites should not be
the one to judge something that may
actually be a harmless joke.
Social networking sites should use a better
system to check the real age of their users.
If young people could be barred from using
these sites, then cyber bullying would be
reduced. It is not about responsibility, but
because it is the right thing to do.
What are social networking sites doing now?
Facebook
Facebook provides the option of reporting inappropriate posts by others, hiding stories, blocking
unwanted contact, unfriending people and removing tags from embarrassing photos.
YouTube
YouTube lets its users report any abusive comments and flag things that they consider
inappropriate.“YouTube has a zero-tolerance policy for predatory behavior, stalking, threats and
harassment and reacts to most flags in less than an hour,” according toVictoria Grand, Head of
Communications and Community Policy, atYouTube.
MySpace
MySpace lets parents report through e-mail and phone and responds within 24 hours.The ‘Contact
MySpace’ tab and ‘Safety Tips’ tab allow parents to flag abusive posts.
Role of lawmakers
Should lawmakers do more to combat cyber bullying?
It is difficult to draw the line between harassment and a mere joke.A
In some countries, there are laws like the United States and Canada, have laws that deal with cyber
bullying. However, some people feel that it is inadequate as cases of cyber bullying is still on the
rise. Certain countries like India and Malaysia do not have laws that address the crime of cyber
bullying directly.As a result, many of the cyber bullies are not brought to the face of justice.
Nevertheless, it is rather challenging for the government when dealing with such issues as posts
that are taken lightly by some would upset others. Besides, some are concern that laws which allow
the government to monitor the internet to track down cyber bullies might violate our rights to
free speech and privacy, like what happened in South Korea.There is an ensuing debate over the
extent of government involvement when it comes to dealing with cyber bullying.
In the ‘Global Perspectives’ section, I would be looking at how different countries deal with cyber
bullying.
http://jjie.org/resources/wp-content/uploads/2011/06/FOSI-Report-Cyberbullying-A-Global-
Concern.pdf
Should the government be allowed to monitor the internet or require users to register using their
real identities to track down cyber bullies?
Yes No
This would force the citizens to become
more civilized online and would reduce
cases of cyber bullying.
It would not be effective. Like in South
Korea, people would just turn to a foreign
service and stop using local social
networking sites.
It would be easier to track down cyber
bullies, as they cannot hide behind false
identities.
It infringes our right to free speech and
privacy.
Create a safer environment for the citizens
as they can go online knowing that cyber
bullies would leave them alone.
Governments monitoring the Internet
would create a Big Brother society and
people would be afraid to voice their
opinions for fear of persecution.
Discourages people from posting malicious
and defamatory comments online, hence
reducing cases of suicide caused by cyber
bullying.
This may become an excuse for the
government to discourage criticism of the
government and eventually lead to
propaganda.
Hackers may be able to obtain personal
information by hacking the database of
social networking sites.
Draft for prezi and poster

Más contenido relacionado

La actualidad más candente

Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal informationZev Aidikoff
 
Aurora - Social media
Aurora - Social mediaAurora - Social media
Aurora - Social mediaMike North
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sitesner1eje
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensAndrew Kohl
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversationlippertnicole
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Alexander Larsen
 
Cyber bullying on social networking sites
Cyber bullying on social networking sitesCyber bullying on social networking sites
Cyber bullying on social networking sitesGerard1990
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentationgrp4.ed451
 
Coping with the many faces of facebook
Coping with the many faces of facebookCoping with the many faces of facebook
Coping with the many faces of facebookktcole
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the LawSuna Gurol
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying21rahul1999
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 
Cyberbullying and social media
Cyberbullying and social mediaCyberbullying and social media
Cyberbullying and social mediaevieasmedia
 
Effects of Social Media on Young Adults
Effects of Social Media on Young AdultsEffects of Social Media on Young Adults
Effects of Social Media on Young AdultsRatan Rajpal
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNorth Texas Chapter of the ISSA
 
Danger Of The Internet
Danger Of The InternetDanger Of The Internet
Danger Of The Internetmerlyna
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social mediatoufiqshawon
 

La actualidad más candente (20)

Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
 
Aurora - Social media
Aurora - Social mediaAurora - Social media
Aurora - Social media
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sites
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital Citizens
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversation
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...
 
Cyber bullying on social networking sites
Cyber bullying on social networking sitesCyber bullying on social networking sites
Cyber bullying on social networking sites
 
Teaching digital citizenship in a not so-digital setting
Teaching digital citizenship in a not so-digital settingTeaching digital citizenship in a not so-digital setting
Teaching digital citizenship in a not so-digital setting
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentation
 
Coping with the many faces of facebook
Coping with the many faces of facebookCoping with the many faces of facebook
Coping with the many faces of facebook
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Cyberbullying and social media
Cyberbullying and social mediaCyberbullying and social media
Cyberbullying and social media
 
Effects of Social Media on Young Adults
Effects of Social Media on Young AdultsEffects of Social Media on Young Adults
Effects of Social Media on Young Adults
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
 
Danger Of The Internet
Danger Of The InternetDanger Of The Internet
Danger Of The Internet
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
 

Destacado

第3回関西ゼロから始めるR勉強会
第3回関西ゼロから始めるR勉強会第3回関西ゼロから始めるR勉強会
第3回関西ゼロから始めるR勉強会Iida Keisuke
 
Intellectual Property in a changing world
Intellectual Property in a changing worldIntellectual Property in a changing world
Intellectual Property in a changing worldIDBS
 
Presentation of teacher
Presentation of teacherPresentation of teacher
Presentation of teacher1986l1987
 
презентація до навчального проекту учнів
презентація до навчального проекту учнівпрезентація до навчального проекту учнів
презентація до навчального проекту учнів1986l1987
 
Can You Be Agile and Compliant?
Can You Be Agile and Compliant?Can You Be Agile and Compliant?
Can You Be Agile and Compliant?IDBS
 
Webinar: Increase research efficiency and enable collaboration with the IDBS ...
Webinar: Increase research efficiency and enable collaboration with the IDBS ...Webinar: Increase research efficiency and enable collaboration with the IDBS ...
Webinar: Increase research efficiency and enable collaboration with the IDBS ...IDBS
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write upvictoriahoo
 
Analytica 2014 - Biotech Forum - IDBS Bioprocess Execution System
Analytica 2014 - Biotech Forum - IDBS Bioprocess Execution SystemAnalytica 2014 - Biotech Forum - IDBS Bioprocess Execution System
Analytica 2014 - Biotech Forum - IDBS Bioprocess Execution SystemIDBS
 
Webinar 'Could you transform the way you do R&D in just 5 years?' - May 2014
Webinar 'Could you transform the way you do R&D in just 5 years?' - May 2014Webinar 'Could you transform the way you do R&D in just 5 years?' - May 2014
Webinar 'Could you transform the way you do R&D in just 5 years?' - May 2014IDBS
 
The Evolution of Laboratory Data Systems: Replacing Paper, Streamlining Proce...
The Evolution of Laboratory Data Systems: Replacing Paper, Streamlining Proce...The Evolution of Laboratory Data Systems: Replacing Paper, Streamlining Proce...
The Evolution of Laboratory Data Systems: Replacing Paper, Streamlining Proce...IDBS
 
Bio-IT 2014: 'Capturing Value from Collaborative Research with the IDBS Trans...
Bio-IT 2014: 'Capturing Value from Collaborative Research with the IDBS Trans...Bio-IT 2014: 'Capturing Value from Collaborative Research with the IDBS Trans...
Bio-IT 2014: 'Capturing Value from Collaborative Research with the IDBS Trans...IDBS
 
デバイスWeb apiコンソーシアム 第四回資料(RemoteRelay with Thermal camera)
デバイスWeb apiコンソーシアム 第四回資料(RemoteRelay with Thermal camera)デバイスWeb apiコンソーシアム 第四回資料(RemoteRelay with Thermal camera)
デバイスWeb apiコンソーシアム 第四回資料(RemoteRelay with Thermal camera)Iida Keisuke
 
Never let me go chapter 13 significant quotes
Never let me go chapter 13   significant quotesNever let me go chapter 13   significant quotes
Never let me go chapter 13 significant quotesvictoriahoo
 
第4回関東ゼロからはじめるR言語勉強会(t検定を勉強してみよう)
第4回関東ゼロからはじめるR言語勉強会(t検定を勉強してみよう)第4回関東ゼロからはじめるR言語勉強会(t検定を勉強してみよう)
第4回関東ゼロからはじめるR言語勉強会(t検定を勉強してみよう)Iida Keisuke
 
Workshop 'Simple approaches to map lab processes' - Claire Hill - Paperless L...
Workshop 'Simple approaches to map lab processes' - Claire Hill - Paperless L...Workshop 'Simple approaches to map lab processes' - Claire Hill - Paperless L...
Workshop 'Simple approaches to map lab processes' - Claire Hill - Paperless L...IDBS
 
Preclinical development in the current Pharmaceutical space
Preclinical development in the current Pharmaceutical spacePreclinical development in the current Pharmaceutical space
Preclinical development in the current Pharmaceutical spaceIDBS
 

Destacado (17)

Leopard project
Leopard projectLeopard project
Leopard project
 
第3回関西ゼロから始めるR勉強会
第3回関西ゼロから始めるR勉強会第3回関西ゼロから始めるR勉強会
第3回関西ゼロから始めるR勉強会
 
Intellectual Property in a changing world
Intellectual Property in a changing worldIntellectual Property in a changing world
Intellectual Property in a changing world
 
Presentation of teacher
Presentation of teacherPresentation of teacher
Presentation of teacher
 
презентація до навчального проекту учнів
презентація до навчального проекту учнівпрезентація до навчального проекту учнів
презентація до навчального проекту учнів
 
Can You Be Agile and Compliant?
Can You Be Agile and Compliant?Can You Be Agile and Compliant?
Can You Be Agile and Compliant?
 
Webinar: Increase research efficiency and enable collaboration with the IDBS ...
Webinar: Increase research efficiency and enable collaboration with the IDBS ...Webinar: Increase research efficiency and enable collaboration with the IDBS ...
Webinar: Increase research efficiency and enable collaboration with the IDBS ...
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write up
 
Analytica 2014 - Biotech Forum - IDBS Bioprocess Execution System
Analytica 2014 - Biotech Forum - IDBS Bioprocess Execution SystemAnalytica 2014 - Biotech Forum - IDBS Bioprocess Execution System
Analytica 2014 - Biotech Forum - IDBS Bioprocess Execution System
 
Webinar 'Could you transform the way you do R&D in just 5 years?' - May 2014
Webinar 'Could you transform the way you do R&D in just 5 years?' - May 2014Webinar 'Could you transform the way you do R&D in just 5 years?' - May 2014
Webinar 'Could you transform the way you do R&D in just 5 years?' - May 2014
 
The Evolution of Laboratory Data Systems: Replacing Paper, Streamlining Proce...
The Evolution of Laboratory Data Systems: Replacing Paper, Streamlining Proce...The Evolution of Laboratory Data Systems: Replacing Paper, Streamlining Proce...
The Evolution of Laboratory Data Systems: Replacing Paper, Streamlining Proce...
 
Bio-IT 2014: 'Capturing Value from Collaborative Research with the IDBS Trans...
Bio-IT 2014: 'Capturing Value from Collaborative Research with the IDBS Trans...Bio-IT 2014: 'Capturing Value from Collaborative Research with the IDBS Trans...
Bio-IT 2014: 'Capturing Value from Collaborative Research with the IDBS Trans...
 
デバイスWeb apiコンソーシアム 第四回資料(RemoteRelay with Thermal camera)
デバイスWeb apiコンソーシアム 第四回資料(RemoteRelay with Thermal camera)デバイスWeb apiコンソーシアム 第四回資料(RemoteRelay with Thermal camera)
デバイスWeb apiコンソーシアム 第四回資料(RemoteRelay with Thermal camera)
 
Never let me go chapter 13 significant quotes
Never let me go chapter 13   significant quotesNever let me go chapter 13   significant quotes
Never let me go chapter 13 significant quotes
 
第4回関東ゼロからはじめるR言語勉強会(t検定を勉強してみよう)
第4回関東ゼロからはじめるR言語勉強会(t検定を勉強してみよう)第4回関東ゼロからはじめるR言語勉強会(t検定を勉強してみよう)
第4回関東ゼロからはじめるR言語勉強会(t検定を勉強してみよう)
 
Workshop 'Simple approaches to map lab processes' - Claire Hill - Paperless L...
Workshop 'Simple approaches to map lab processes' - Claire Hill - Paperless L...Workshop 'Simple approaches to map lab processes' - Claire Hill - Paperless L...
Workshop 'Simple approaches to map lab processes' - Claire Hill - Paperless L...
 
Preclinical development in the current Pharmaceutical space
Preclinical development in the current Pharmaceutical spacePreclinical development in the current Pharmaceutical space
Preclinical development in the current Pharmaceutical space
 

Similar a Draft for prezi and poster

Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftHeather Dionne
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social mediaAM Oh
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGJaveriaZain1
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptxliutommy1
 
Cyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of InternetCyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of Internetbeh yong hua
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointHannahMorrell
 
How to stop cyber bullying
How to stop cyber bullyingHow to stop cyber bullying
How to stop cyber bullyingBullyvention
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber pathProfsdetchana Murthy
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenHomeGuides
 
Cyberbulling and social networks for children under 13
Cyberbulling and social networks for children under 13Cyberbulling and social networks for children under 13
Cyberbulling and social networks for children under 13Pato Riveroll
 

Similar a Draft for prezi and poster (13)

Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYING
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptx
 
Cyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of InternetCyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of Internet
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
How to stop cyber bullying
How to stop cyber bullyingHow to stop cyber bullying
How to stop cyber bullying
 
Facebook
FacebookFacebook
Facebook
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber path
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Cyberbulling and social networks for children under 13
Cyberbulling and social networks for children under 13Cyberbulling and social networks for children under 13
Cyberbulling and social networks for children under 13
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 

Draft for prezi and poster

  • 1. The following content will be presented in the form of a Prezi and a poster. 1. What is cyber bullying? Cyber bullying involves the use of Internet and communication technologies to deliberately and repeatedly inflict harm on an individual or a group of people through harassment, embarrassment and/or threats. (http://www.endcyberbullying.org/what-is-cyber-bullying/) Examples of cyber bullying: ● Forwarding embarrassing picture, videos or messages without the consent of the owner. ● Using a false identity to post hurtful entries on social networking sites. ● Sending emails or text messages to harass others. 2. Why does cyber bullying occur? ● For revenge or out of anger ● As a source of entertainment ● Peer pressure ● Being able to hide behind false identities, they are more bold to say things that they won’t say in person. ● For the feeling of superiority ● To garner attention ● Cyber bullies do not see the impacts their actions can have on their victims. 3. Is cyber bullying becoming a serious issue worldwide? ● 12% of the parents surveyed by Ipsos for Reuters News say that their child has become a victim to cyber bullying. ● 26% of them say that they know a child in their neighborhood who has been cyber bullied. ● Another 60% say that the children are cyber bullied through social networking sites like Facebook. ● 77% of the respondents say that parents and schools should give special attention to cyber bullying. ● (Ipsos, 2012) 4)Impacts of cyber bullying on the victims: ● Poor performance at school ● Turn to drugs and alcohol ● Increase in truancy ● Take revenge by becoming a cyber bullying themselves ● Unable to deal with the situation, they might commit suicide ● Decrease in confidence and self-esteem (http://www.stopbullying.gov/cyberbullying/what-is-it/index.html) (http://www.afp.gov.au/policing/cybercrime/~/media/afp/pdf/c/cyber-bullying-no-crops.ashx)
  • 2. 5) The role of social networking sites and lawmakers Social networking sites: - Should social networking sites like Facebook be allowed to monitor their users’ activity on these sites? Yes No Many of the cyber bullying cases happen on social networking sites.As a result, they should be proactive in solving the problem. Cyber bullying is a problem caused by our society, so social networking sites should not be the one who takes all the blame. It can only be solved if people are more ethical and are more aware of the consequences of cyber bullying. Personal victim:The bullying can be very hurtful and it needs to stop. Social networking sites should place more restrictions to prevent cyber bullying from happening.There could be some kind of punishment for users who misuse their accounts. For example, their account would be terminated or they would be brought to court. If social networking sites are allowed to monitor, then it may be like living under Big Brother. It violates our rights to free speech and privacy. Some social networking sites like Ask.fm refuses to be held accountable for their users’ posts on their sites. Users cannot report other users for harassment. Social networking sites already have a lot of access to personal information. Having to monitor their users’ activities would prove too much of a burden to them. Education is the best way to address cyber bullying. People should have the right to feel safe when they are on social networking sites. We should be responsible for the friends that we make on social networking sites. Parents cannot monitor their children’s activity on these sites 24/7.Therefore, there should be more monitoring on social networking sites to help deal with cyber bullying. Social networking sites are not responsible for how their users interact with one another. Parents should be the one who is responsible for educating their children so that they will use the Internet responsibly. Social networking sites are the major cause of cyber bullying. On these sites, cyber bullies can choose to remain anonymous, making them bolder to say hurtful things online. Social networking sites merely provide a medium for people from all around the world to communicate with each other. Any attempts to monitor the things posted on these sites would infringe the users’ rights free speech.Websites should not be the one to judge something that may actually be a harmless joke.
  • 3. Social networking sites should use a better system to check the real age of their users. If young people could be barred from using these sites, then cyber bullying would be reduced. It is not about responsibility, but because it is the right thing to do.
  • 4. What are social networking sites doing now? Facebook Facebook provides the option of reporting inappropriate posts by others, hiding stories, blocking unwanted contact, unfriending people and removing tags from embarrassing photos.
  • 5. YouTube YouTube lets its users report any abusive comments and flag things that they consider inappropriate.“YouTube has a zero-tolerance policy for predatory behavior, stalking, threats and harassment and reacts to most flags in less than an hour,” according toVictoria Grand, Head of Communications and Community Policy, atYouTube. MySpace MySpace lets parents report through e-mail and phone and responds within 24 hours.The ‘Contact MySpace’ tab and ‘Safety Tips’ tab allow parents to flag abusive posts. Role of lawmakers Should lawmakers do more to combat cyber bullying? It is difficult to draw the line between harassment and a mere joke.A
  • 6. In some countries, there are laws like the United States and Canada, have laws that deal with cyber bullying. However, some people feel that it is inadequate as cases of cyber bullying is still on the rise. Certain countries like India and Malaysia do not have laws that address the crime of cyber bullying directly.As a result, many of the cyber bullies are not brought to the face of justice. Nevertheless, it is rather challenging for the government when dealing with such issues as posts that are taken lightly by some would upset others. Besides, some are concern that laws which allow the government to monitor the internet to track down cyber bullies might violate our rights to free speech and privacy, like what happened in South Korea.There is an ensuing debate over the extent of government involvement when it comes to dealing with cyber bullying. In the ‘Global Perspectives’ section, I would be looking at how different countries deal with cyber bullying. http://jjie.org/resources/wp-content/uploads/2011/06/FOSI-Report-Cyberbullying-A-Global- Concern.pdf Should the government be allowed to monitor the internet or require users to register using their real identities to track down cyber bullies? Yes No This would force the citizens to become more civilized online and would reduce cases of cyber bullying. It would not be effective. Like in South Korea, people would just turn to a foreign service and stop using local social networking sites. It would be easier to track down cyber bullies, as they cannot hide behind false identities. It infringes our right to free speech and privacy. Create a safer environment for the citizens as they can go online knowing that cyber bullies would leave them alone. Governments monitoring the Internet would create a Big Brother society and people would be afraid to voice their opinions for fear of persecution. Discourages people from posting malicious and defamatory comments online, hence reducing cases of suicide caused by cyber bullying. This may become an excuse for the government to discourage criticism of the government and eventually lead to propaganda. Hackers may be able to obtain personal information by hacking the database of social networking sites.