SlideShare une entreprise Scribd logo
1  sur  16
BY:FRANCIS JANE ABDON
•CYBERBULLYI
NG
• Cyberbullying is the use of digital technologies with an intent
to offend, humiliate, threaten, harass or abuse somebody.
• Cyberbullying is bullying that takes place using electronic
technology. Electronic technology includes devices and
equipment such as cell phones, computers, and tablets as well
as communication tools including social media sites, text
messages, chat, and websites.
• Examples of cyberbullying include mean text messages or
• Cyberbullying, unlike “traditional” bullying, doesn’t just occur in the park or just
outside of school. It occurs in a variety of venues and mediums in cyberspace
and it occurs most often where teenagers congregate.
• As anyone, it is important to realize where cyberbullying occurs, since you can
be there to either prevent it or take action if you see it occur.
• Back when many teenagers hung out in chat rooms, most of the cyberbullying
reported took place in chat rooms. With the more recent changes in technology,
the youth population has been drawn to social networking sites, like Facebook,
and video sharing sites, like YouTube. As a result, there has been an increase in
reports of cyberbullying on social networking sites and video sharing sites. In
addition, instant messaging and texting appear to be common ways in which
youth are harassing others.
• Even newer than social networking, video sharing, texting and instant messaging
is the appearance of cyberbullying in portable gaming devices, in 3-D virtual
worlds and social gaming sites, and in newer interactive sites such as
Formspring and ChatRoulette.
• Back when many teenagers hung out in chat rooms, most of the
cyberbullying reported took place in chat rooms. With the more
recent changes in technology, the youth population has been drawn
to social networking sites, like Facebook, and video sharing sites,
like YouTube. As a result, there has been an increase in reports of
cyberbullying on social networking sites and video sharing sites. In
addition, instant messaging and texting appear to be common ways
in which youth are harassing others.
• Even newer than social networking, video sharing, texting and
instant messaging is the appearance of cyberbullying in portable
gaming devices, in 3-D virtual worlds and social gaming sites, and in
newer interactive sites such as Formspring and ChatRoulette.
• An annual study conducted by software company,
McAfee, concluded that cyber bullying occurs on
Facebook more than any other website. According to
McAfee’s 2012 Teen Internet Behavior Study, 92.6
percent of teens surveyed said they have witnessed
cyber bullying on Facebook. This same study found that
only 23.8 percent of teens surveyed have witnessed
cyber bullying on Twitter.
• It is clear that cyber bullying is most prevalent on
Facebook and something should be done about it. The
fact that over 9 out of 10 teenagers have witnessed cyber
bullying on Facebook is a serious issue. The study also
found that only 1 out of 10 parents are aware that their
children are prone to cyber bullying.
• Cyber - bullying usually happens on social media sites
such as Twitter, Facebook, MySpace, and many other
• different kinds of sites.Cyber-bullying may also happen
through email, when one emails someone a hurtful
• message. It may also happen through texting from a
phone. Usually, social media sites have the most effect
• on cyber-bullying in the U.S.
•
• Cyberbulling can happen at anytime and it can happen in the
comfort of your own home. In today’s world kids are becoming
more and more assessible to the internet and cell phones.
Right now social networking sites are the biggest thing on the
internet. People have the freedom to write whatever they want
online for the world to see. It can also come in the form of an
email, which emails can easily be forwarded to a lot of people
very quickly. According to a I-Safe Inc. study, 42% percent of
kids have been bullied online while 20% have had it happen
on more than one occasion. The problem with cyberbullying is
that you always dont know who it is. The person that is doing
the harassing could be anonymous and really hard to track
down. Not to mention a cyberbully could strike at any time, not
just during recess on the playground.
• Most of the apps and social networking sites are for people
aged 13 and over. They also state that bullying, abusive
behaviours which includes harassment, impersonation and
identity theft are banned and not allowed. However, results
from our national bullying survey, shows 91% of people who
reported cyber bullying said that no action was taken. This can
leave users feeling disbelieved, vulnerable and knock their
self-esteem.
• A general rule when making a complaint about being bullied
online is to copy the terms and conditions which have been
breached and take a screenshot of the comment or photo as
evidence. This may prompt any of these sites and apps to take
action as you have shown them their obligation to investigate
and take appropriate action.
• Bullying on Facebook, Twitter, YouTube, WhatsApp,
Instagram and Snapchat
• With the increase of social networking sites, online
activity and messaging apps, cyberbullying is on the
increase. In a survey by Ditch the Label, 47% of young
people who took the survey have received nasty profile
comments and 62% have been sent nasty private
messages via smartphone apps. This is very worrying as
it shows how cyber bullying is on the increase.
• bullying on social networks
•THANK YOU
FOR
LISTENING

Contenu connexe

Tendances

Research Content for Social Advocacy in Developing an.pptx
Research Content for Social Advocacy in Developing an.pptxResearch Content for Social Advocacy in Developing an.pptx
Research Content for Social Advocacy in Developing an.pptx
juwe oroc
 

Tendances (20)

Popular Issues in (Digital) Media Literacy
Popular Issues in (Digital) Media LiteracyPopular Issues in (Digital) Media Literacy
Popular Issues in (Digital) Media Literacy
 
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
 
Timeline - Evolution of Media
Timeline - Evolution of MediaTimeline - Evolution of Media
Timeline - Evolution of Media
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
 
The Evolution of Traditional to New Media
The Evolution of Traditional to New MediaThe Evolution of Traditional to New Media
The Evolution of Traditional to New Media
 
Introduction to Media and Information Literacy
Introduction to Media and Information LiteracyIntroduction to Media and Information Literacy
Introduction to Media and Information Literacy
 
Empowerment Technologies Module1
Empowerment Technologies Module1Empowerment Technologies Module1
Empowerment Technologies Module1
 
Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...
Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...
Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...
 
Current And Future Trends in Media and Information - Media and Information Li...
Current And Future Trends in Media and Information - Media and Information Li...Current And Future Trends in Media and Information - Media and Information Li...
Current And Future Trends in Media and Information - Media and Information Li...
 
Opportunities and Challenges of Media and Information - Media and Information...
Opportunities and Challenges of Media and Information - Media and Information...Opportunities and Challenges of Media and Information - Media and Information...
Opportunities and Challenges of Media and Information - Media and Information...
 
Media and Information Literacy (MIL) - 5. Media and Information Sources
Media and Information Literacy (MIL) - 5. Media and Information SourcesMedia and Information Literacy (MIL) - 5. Media and Information Sources
Media and Information Literacy (MIL) - 5. Media and Information Sources
 
Video Project Treatment Example
Video Project Treatment ExampleVideo Project Treatment Example
Video Project Treatment Example
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
 
Media habits, lifestyle and preferences
Media habits, lifestyle and preferencesMedia habits, lifestyle and preferences
Media habits, lifestyle and preferences
 
Current and Future Trends in Media and Information
Current and Future Trends in Media and InformationCurrent and Future Trends in Media and Information
Current and Future Trends in Media and Information
 
Evolution of media
Evolution of mediaEvolution of media
Evolution of media
 
Research Content for Social Advocacy in Developing an.pptx
Research Content for Social Advocacy in Developing an.pptxResearch Content for Social Advocacy in Developing an.pptx
Research Content for Social Advocacy in Developing an.pptx
 
Current and Future Trends of Media and Information
Current and Future Trends of Media and InformationCurrent and Future Trends of Media and Information
Current and Future Trends of Media and Information
 
Opportunities, Challenges and Power of Media Information
Opportunities, Challenges and Power of Media InformationOpportunities, Challenges and Power of Media Information
Opportunities, Challenges and Power of Media Information
 

Similaire à Where does cyberbullying occur? by Francis Jane Abdon

Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
alanrgibson41217
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
Ray Brannon
 
(403666543) tc2
(403666543) tc2(403666543) tc2
(403666543) tc2
Marcie22
 
Edge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingEdge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullying
Dr. Conrath
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
katnaylan
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
HannahMorrell
 

Similaire à Where does cyberbullying occur? by Francis Jane Abdon (20)

Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
The Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingThe Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber Bullying
 
Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYING
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
The modern day bully
The modern day bully The modern day bully
The modern day bully
 
The modern day bully part 2
The modern day bully part 2The modern day bully part 2
The modern day bully part 2
 
(403666543) tc2
(403666543) tc2(403666543) tc2
(403666543) tc2
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptx
 
Edge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingEdge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullying
 
Digital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyDigital Citizenship by Mann Rentoy
Digital Citizenship by Mann Rentoy
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
 
How to stop cyber bullying
How to stop cyber bullyingHow to stop cyber bullying
How to stop cyber bullying
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 

Plus de John Florentino E Echon (10)

Strategic Invention Materials Population Density
Strategic Invention  Materials Population DensityStrategic Invention  Materials Population Density
Strategic Invention Materials Population Density
 
Strategic Intervention Materials (SIM) about Mitochondria
Strategic Intervention Materials (SIM) about MitochondriaStrategic Intervention Materials (SIM) about Mitochondria
Strategic Intervention Materials (SIM) about Mitochondria
 
Paraphrasing, Quoting and Summarizing
Paraphrasing, Quoting and SummarizingParaphrasing, Quoting and Summarizing
Paraphrasing, Quoting and Summarizing
 
Online Gaming by Adrian Esguerra and Julia Althea Ebido
Online Gaming by Adrian Esguerra and Julia Althea EbidoOnline Gaming by Adrian Esguerra and Julia Althea Ebido
Online Gaming by Adrian Esguerra and Julia Althea Ebido
 
Mechanical energy
Mechanical energyMechanical energy
Mechanical energy
 
Magma
MagmaMagma
Magma
 
Lewis symbol echon
Lewis symbol echonLewis symbol echon
Lewis symbol echon
 
Geothermal energy
Geothermal energyGeothermal energy
Geothermal energy
 
Echon (electron configuration)
Echon (electron configuration)Echon (electron configuration)
Echon (electron configuration)
 
Flame test
Flame testFlame test
Flame test
 

Dernier

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 

Where does cyberbullying occur? by Francis Jane Abdon

  • 2. •CYBERBULLYI NG • Cyberbullying is the use of digital technologies with an intent to offend, humiliate, threaten, harass or abuse somebody. • Cyberbullying is bullying that takes place using electronic technology. Electronic technology includes devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat, and websites. • Examples of cyberbullying include mean text messages or
  • 3. • Cyberbullying, unlike “traditional” bullying, doesn’t just occur in the park or just outside of school. It occurs in a variety of venues and mediums in cyberspace and it occurs most often where teenagers congregate. • As anyone, it is important to realize where cyberbullying occurs, since you can be there to either prevent it or take action if you see it occur. • Back when many teenagers hung out in chat rooms, most of the cyberbullying reported took place in chat rooms. With the more recent changes in technology, the youth population has been drawn to social networking sites, like Facebook, and video sharing sites, like YouTube. As a result, there has been an increase in reports of cyberbullying on social networking sites and video sharing sites. In addition, instant messaging and texting appear to be common ways in which youth are harassing others. • Even newer than social networking, video sharing, texting and instant messaging is the appearance of cyberbullying in portable gaming devices, in 3-D virtual worlds and social gaming sites, and in newer interactive sites such as Formspring and ChatRoulette.
  • 4. • Back when many teenagers hung out in chat rooms, most of the cyberbullying reported took place in chat rooms. With the more recent changes in technology, the youth population has been drawn to social networking sites, like Facebook, and video sharing sites, like YouTube. As a result, there has been an increase in reports of cyberbullying on social networking sites and video sharing sites. In addition, instant messaging and texting appear to be common ways in which youth are harassing others. • Even newer than social networking, video sharing, texting and instant messaging is the appearance of cyberbullying in portable gaming devices, in 3-D virtual worlds and social gaming sites, and in newer interactive sites such as Formspring and ChatRoulette.
  • 5. • An annual study conducted by software company, McAfee, concluded that cyber bullying occurs on Facebook more than any other website. According to McAfee’s 2012 Teen Internet Behavior Study, 92.6 percent of teens surveyed said they have witnessed cyber bullying on Facebook. This same study found that only 23.8 percent of teens surveyed have witnessed cyber bullying on Twitter. • It is clear that cyber bullying is most prevalent on Facebook and something should be done about it. The fact that over 9 out of 10 teenagers have witnessed cyber bullying on Facebook is a serious issue. The study also found that only 1 out of 10 parents are aware that their children are prone to cyber bullying.
  • 6.
  • 7. • Cyber - bullying usually happens on social media sites such as Twitter, Facebook, MySpace, and many other • different kinds of sites.Cyber-bullying may also happen through email, when one emails someone a hurtful • message. It may also happen through texting from a phone. Usually, social media sites have the most effect • on cyber-bullying in the U.S. •
  • 8. • Cyberbulling can happen at anytime and it can happen in the comfort of your own home. In today’s world kids are becoming more and more assessible to the internet and cell phones. Right now social networking sites are the biggest thing on the internet. People have the freedom to write whatever they want online for the world to see. It can also come in the form of an email, which emails can easily be forwarded to a lot of people very quickly. According to a I-Safe Inc. study, 42% percent of kids have been bullied online while 20% have had it happen on more than one occasion. The problem with cyberbullying is that you always dont know who it is. The person that is doing the harassing could be anonymous and really hard to track down. Not to mention a cyberbully could strike at any time, not just during recess on the playground.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. • Most of the apps and social networking sites are for people aged 13 and over. They also state that bullying, abusive behaviours which includes harassment, impersonation and identity theft are banned and not allowed. However, results from our national bullying survey, shows 91% of people who reported cyber bullying said that no action was taken. This can leave users feeling disbelieved, vulnerable and knock their self-esteem. • A general rule when making a complaint about being bullied online is to copy the terms and conditions which have been breached and take a screenshot of the comment or photo as evidence. This may prompt any of these sites and apps to take action as you have shown them their obligation to investigate and take appropriate action.
  • 14. • Bullying on Facebook, Twitter, YouTube, WhatsApp, Instagram and Snapchat • With the increase of social networking sites, online activity and messaging apps, cyberbullying is on the increase. In a survey by Ditch the Label, 47% of young people who took the survey have received nasty profile comments and 62% have been sent nasty private messages via smartphone apps. This is very worrying as it shows how cyber bullying is on the increase. • bullying on social networks
  • 15.