SlideShare une entreprise Scribd logo
1  sur  25
CYBER BULLYING AND
INTERNET ADDICTION
 Cyberbullying is bullying that takes place over
digital devices like cell phones, computers, and
tablets. Cyberbullying can occur through SMS,
Text, and apps, or online in social media, forums,
or gaming where people can view, participate in,
or share content.
 Cyberbullying includes sending, posting, or
sharing negative, harmful, false, or mean content
about someone else. It can include sharing
personal or private information about someone
else causing embarrassment or humiliation.
Some cyberbullying crosses the line into unlawful
or criminal behavior.
The most common places where
cyberbullying occurs are:
 Social Media, such as Facebook, Instagram,
Snapchat, and Twitter
 SMS (Short Message Service) also known as
Text Message sent through devices
 Instant Message (via devices, email provider
services, apps, and social media messaging
features)
 Email
Special Concerns
With the prevalence of social media and
digital forums, comments, photos, posts, and
content shared by individuals can often be viewed
by strangers as well as acquaintances. The content
an individual shares online – both their personal
content as well as any negative, mean, or hurtful
content – creates a kind of permanent public record
of their views, activities, and behavior.
This public record can be thought of as an
online reputation, which may be accessible to
schools, employers, colleges, clubs, and others
who may be researching an individual now or in the
future. Cyberbullying can harm the online
reputations of everyone involved – not just the
person being bullied, but those doing the bullying or
participating in it. Cyberbullying has unique
concerns in that it can be:
 Persistent – Digital devices offer an ability to
immediately and continuously communicate 24
hours a day, so it can be difficult for children
experiencing cyberbullying to find relief.
 Permanent – Most information communicated
electronically is permanent and public, if not
reported and removed. A negative online
reputation, including for those who bully, can
impact college admissions, employment, and
other areas of life.
 Hard to Notice – Because teachers and parents
may not overhear or see cyberbullying taking
place, it is harder to recognize.
Laws and Sanctions
While all states have criminal laws that apply
to bullying, not all have special statutes that apply
to cyberbullying or bullying that takes place outside
of school. Schools may take action either as
required by law, or with local or school policies that
allow them to discipline or take other action. Some
states also have provisions to address bullying if it
affects school performance. You can learn about
the laws and policies in each state, including if they
cover cyberbullying.
Definitions
A frequently used definition of cyberbullying
is "an aggressive, intentional act or behavior that is
carried out by a group or an individual, using
electronic forms of contact, repeatedly and over
time against a victim who cannot easily defend him
or herself.
There are many variations of the definition,
such as the National Crime Prevention Council's
more specific definition: "the process of using the
Internet, cell phones or other devices to send or
post text or images intended to hurt or embarrass
another person."
Cyberbullying is often similar to traditional
bullying, with some notable distinctions. Victims of
cyberbullying may not know the identity of their
bully, or why the bully is targeting them. The
harassment can have wide-reaching effects on the
victim, as the content used to harass the victim can
be spread and shared easily among many people
and often remains accessible long after the initial
incident.
The terms "cyberharassment" and
"cyberbullying" are sometimes used synonymously,
though some people use the latter to refer
specifically to harassment among minors or in a
school setting.
Tips to Stop Cyberbullying
 Don’t respond. If someone bullies you,
remember that your reaction is usually exactly
what the bully wants. It gives him or her power
over you. Who wants to empower a bully?
 Don’t retaliate. Getting back at the bully turns
you into one and reinforces the bully’s behavior.
Help avoid a whole cycle of aggression.
 Save the evidence. The only good news about
digital bullying is that the harassing messages
can usually be captured, saved, and shown to
someone who can help. You need to do this even
if it’s minor stuff, in case things escalate.
 Talk to a trusted adult. You deserve backup. It’s
always good to involve a parent but – if you can’t – a
school counselor usually knows how to help.
Sometimes both are needed. If you’re really nervous
about saying something, see if there’s a way to report
the incident anonymously at school.
 Block the bully. If the harassment’s coming in the
form of instant messages, texts, or profile comments,
do yourself a favor: Use preferences or privacy tools
to block the person. If it’s in chat, leave the “room.”
 Be civil. Even if you don’t like someone, it’s a good
idea to be decent and not sink to the other person’s
level. Also, research shows that gossiping about and
trash talking others increases your risk of being
bullied. Treat people the way you want to be treated.
 Don’t be a bully. How would you feel if someone
harassed you? You know the old saying about
walking a mile in someone’s shoes; even a few
seconds of thinking about how another person
might feel can put a big damper on aggression.
That’s needed in this world.
 Be a friend, not a bystander. Watching or
forwarding mean messages empowers bullies
and hurts victims even more. If you can, tell
bullies to stop or let them know harassment
makes people look stupid and mean. It’s time to
let bullies know their behavior is unacceptable –
cruel abuse of fellow human beings. If you can’t
stop the bully, at least try to help the victim and
report the behavior.
Internet Addiction
Internet addiction is described as an impulse control
disorder, which does not involve use of an intoxicating drug
and is very similar to pathological gambling. Some Internet
users may develop an emotional attachment to on-line
friends and activities they create on their computer screens.
Internet users may enjoy aspects of the Internet that allow
them to meet, socialize, and exchange ideas through the use
of chat rooms, social networking websites, or "virtual
communities."
Other Internet users spend endless hours
researching topics of interest Online or
"blogging". Blogging is a contraction of the term
"Web log", in which an individual will post
commentaries and keep regular chronicle of
events. It can be viewed as journaling and the
entries are primarily textual.
Similar to other addictions, those suffering
from Internet addiction use the virtual fantasy world
to connect with real people through the Internet, as
a substitution for real-life human connection, which
they are unable to achieve normally.
What are the warning signs of
Internet addiction?
 Preoccupation with the Internet. (Thoughts about
previous on-line activity or anticipation of the next
on-line session.)
 Use of the Internet in increasing amounts of time
in order to achieve satisfaction.
 Repeated, unsuccessful efforts to control, cut
back or stop Internet use.
 Feelings of restlessness, moodiness, depression,
or irritability when attempting to cut down use of
the Internet.
 On-line longer than originally intended.
 Jeopardized or risked loss of significant
relationships, job, educational or career
opportunities because of Internet use.
 Lies to family members, therapists, or others to
conceal the extent of involvement with the
Internet.
 Use of the Internet is a way to escape from
problems or to relieve a dysphoric mood. (e.g.
Feelings of hopelessness, guilt, anxiety,
depression.)
What are the effects?
Internet addiction results in personal, family,
academic, financial, and occupational problems that are
characteristic of other addictions. Impairments of real
life relationships are disrupted as a result of excessive
use of the Internet. Individuals suffering from Internet
addiction spend more time in solitary seclusion, spend
less time with real people in their lives, and are often
viewed as socially awkward. Arguments may result due
to the volume of time spent on-line. Those suffering
from Internet addiction may attempt to conceal the
amount of time spent on-line, which results in distrust
and the disturbance of quality in once stable
relationships.
Some suffering from Internet addiction may
create on-line personas or profiles where they are
able to alter their identities and pretend to be
someone other than himself or herself. Those at
highest risk for creation of a secret life are those
who suffer from low-self esteem feelings of
inadequacy, and fear of disapproval. Such
negative self-concepts lead to clinical problems of
depression and anxiety.
Many persons who attempt to quit their
Internet use experience withdrawal including:
anger, depression, relief, mood swings, anxiety,
fear, irritability, sadness, loneliness, boredom,
restlessness, procrastination, and upset
stomach. Being addicted to the Internet can also
cause physical discomfort or medical problems
such as: Carpal Tunnel Syndrome, dry eyes,
backaches, severe headaches, eating irregularities,
(such as skipping meals), failure to attend to
personal hygiene, and sleep disturbance.
How can someone get help?
The first step is to determine if there is a
problem. A Certified Addictions Counselor trained in
identification and treatment of Internet addiction can
effectively perform an assessment to determine what
level of care is most appropriate. For a free confidential
assessment, call the Illinois Institute for Addiction
Recovery at (800) 522-3784. An assessment can be
completed 24 hours a day, 7 days a
week. Appointments are preferred, but walk-ins are
always welcome.
Sources: "Virtual Addiction" David N. Greenfield,
Ph.D., "Caught in the Net" Dr. Kimberly Young, Center
for Internet Addiction Recovery, American Psychiatric
Association.

Contenu connexe

Tendances

Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteJuan Miguel Palero
 
Contextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsContextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsJohnBarsaga
 
EMP TECH Q2 LESSON 1.pptx
EMP TECH Q2 LESSON 1.pptxEMP TECH Q2 LESSON 1.pptx
EMP TECH Q2 LESSON 1.pptxsherelynbalada1
 
Multimedia and ICT.pptx
Multimedia and ICT.pptxMultimedia and ICT.pptx
Multimedia and ICT.pptxSheilaTorino
 
Opportunities ,Challenges, and Power of Media and Information.pptx
Opportunities ,Challenges, and Power of Media and Information.pptxOpportunities ,Challenges, and Power of Media and Information.pptx
Opportunities ,Challenges, and Power of Media and Information.pptxluvvprems5
 
Online Systems, Functions and Platforms
Online Systems, Functions and Platforms Online Systems, Functions and Platforms
Online Systems, Functions and Platforms Aira Shayne Come
 
Emp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fvEmp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fvVivienPastores1
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and EtiquetteLea Rodriguez
 
Contextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsContextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsAngelito Quiambao
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1alicelagajino
 
Media and Information Literacy (MIL) Performance Task - Video Project (Cooper...
Media and Information Literacy (MIL) Performance Task - Video Project (Cooper...Media and Information Literacy (MIL) Performance Task - Video Project (Cooper...
Media and Information Literacy (MIL) Performance Task - Video Project (Cooper...Arniel Ping
 
Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use Sue Barrett
 
Group 3 basic web page creation
Group 3  basic web page creationGroup 3  basic web page creation
Group 3 basic web page creationFe Lanny Tejano
 
Empowerment Technology
Empowerment TechnologyEmpowerment Technology
Empowerment TechnologyReygie Fabro
 
[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT
[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT
[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICTJazzyNF
 
Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...
Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...
Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...Arniel Ping
 

Tendances (20)

Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
EMPOWERMENT TECHNOLOGIES - LESSON 3
EMPOWERMENT TECHNOLOGIES - LESSON 3EMPOWERMENT TECHNOLOGIES - LESSON 3
EMPOWERMENT TECHNOLOGIES - LESSON 3
 
Contextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsContextualized online-search-and-research-skills
Contextualized online-search-and-research-skills
 
EMP TECH Q2 LESSON 1.pptx
EMP TECH Q2 LESSON 1.pptxEMP TECH Q2 LESSON 1.pptx
EMP TECH Q2 LESSON 1.pptx
 
Multimedia and ICT.pptx
Multimedia and ICT.pptxMultimedia and ICT.pptx
Multimedia and ICT.pptx
 
Opportunities ,Challenges, and Power of Media and Information.pptx
Opportunities ,Challenges, and Power of Media and Information.pptxOpportunities ,Challenges, and Power of Media and Information.pptx
Opportunities ,Challenges, and Power of Media and Information.pptx
 
Online Systems, Functions and Platforms
Online Systems, Functions and Platforms Online Systems, Functions and Platforms
Online Systems, Functions and Platforms
 
Emp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fvEmp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fv
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and Etiquette
 
Contextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsContextualized Online Search and Research Skills
Contextualized Online Search and Research Skills
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1
 
Media and Information Literacy (MIL) Performance Task - Video Project (Cooper...
Media and Information Literacy (MIL) Performance Task - Video Project (Cooper...Media and Information Literacy (MIL) Performance Task - Video Project (Cooper...
Media and Information Literacy (MIL) Performance Task - Video Project (Cooper...
 
Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use
 
Group 3 basic web page creation
Group 3  basic web page creationGroup 3  basic web page creation
Group 3 basic web page creation
 
Empowerment Technology
Empowerment TechnologyEmpowerment Technology
Empowerment Technology
 
Productivity tools
Productivity toolsProductivity tools
Productivity tools
 
[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT
[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT
[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT
 
Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...
Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...
Media and Information Literacy (MIL) - 10. Media and Information Literate Ind...
 
ETECH MELCS
ETECH MELCSETECH MELCS
ETECH MELCS
 

Similaire à Cyber bullying-and-internet-addiction

Cyberbullying and Internet addiction by Jhoanne Erika Masaya
Cyberbullying and Internet addiction by Jhoanne Erika MasayaCyberbullying and Internet addiction by Jhoanne Erika Masaya
Cyberbullying and Internet addiction by Jhoanne Erika MasayaJhoanneerika
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaasofisalazar00
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying estegiulimazziotti96
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngmiliarguelles1
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaamiliarguelles
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngmiliarguelles1
 
Cyberbullying and Internet Addiction
Cyberbullying and Internet AddictionCyberbullying and Internet Addiction
Cyberbullying and Internet AddictionRossehna Mari Magtoto
 
Cyber bullying and internet addiction
Cyber bullying and internet addictionCyber bullying and internet addiction
Cyber bullying and internet addictionJeromeIsturis
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GArissa Ablao
 
Social networking by jarin
Social networking by jarinSocial networking by jarin
Social networking by jarinjarin651
 
Cyberbullying and internent addiction
Cyberbullying  and internent addictionCyberbullying  and internent addiction
Cyberbullying and internent addictionChristopher Mejia
 
Week7assgn2KwanHoY
Week7assgn2KwanHoYWeek7assgn2KwanHoY
Week7assgn2KwanHoYYipKwanHo
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingSuphaphonP
 
Week7 assgn2suphaphonp
Week7 assgn2suphaphonpWeek7 assgn2suphaphonp
Week7 assgn2suphaphonpJingboWang9
 
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose ManlinconCYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlinconkatrinarose14
 

Similaire à Cyber bullying-and-internet-addiction (20)

Cyberbullying and Internet addiction by Jhoanne Erika Masaya
Cyberbullying and Internet addiction by Jhoanne Erika MasayaCyberbullying and Internet addiction by Jhoanne Erika Masaya
Cyberbullying and Internet addiction by Jhoanne Erika Masaya
 
Act 9 nicole jae millare
Act 9 nicole jae millareAct 9 nicole jae millare
Act 9 nicole jae millare
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying este
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Cyberbullying and Internet Addiction
Cyberbullying and Internet AddictionCyberbullying and Internet Addiction
Cyberbullying and Internet Addiction
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying and internet addiction
Cyber bullying and internet addictionCyber bullying and internet addiction
Cyber bullying and internet addiction
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
 
Social networking by jarin
Social networking by jarinSocial networking by jarin
Social networking by jarin
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying and internent addiction
Cyberbullying  and internent addictionCyberbullying  and internent addiction
Cyberbullying and internent addiction
 
Activity 9
Activity 9Activity 9
Activity 9
 
Week7assgn2KwanHoY
Week7assgn2KwanHoYWeek7assgn2KwanHoY
Week7assgn2KwanHoY
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Week7 assgn2suphaphonp
Week7 assgn2suphaphonpWeek7 assgn2suphaphonp
Week7 assgn2suphaphonp
 
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose ManlinconCYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
 
Edp 279 unit 2.4
Edp 279 unit 2.4Edp 279 unit 2.4
Edp 279 unit 2.4
 

Dernier

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Dernier (20)

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

Cyber bullying-and-internet-addiction

  • 2.  Cyberbullying is bullying that takes place over digital devices like cell phones, computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content.
  • 3.  Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyberbullying crosses the line into unlawful or criminal behavior.
  • 4. The most common places where cyberbullying occurs are:  Social Media, such as Facebook, Instagram, Snapchat, and Twitter  SMS (Short Message Service) also known as Text Message sent through devices  Instant Message (via devices, email provider services, apps, and social media messaging features)  Email
  • 5. Special Concerns With the prevalence of social media and digital forums, comments, photos, posts, and content shared by individuals can often be viewed by strangers as well as acquaintances. The content an individual shares online – both their personal content as well as any negative, mean, or hurtful content – creates a kind of permanent public record of their views, activities, and behavior.
  • 6. This public record can be thought of as an online reputation, which may be accessible to schools, employers, colleges, clubs, and others who may be researching an individual now or in the future. Cyberbullying can harm the online reputations of everyone involved – not just the person being bullied, but those doing the bullying or participating in it. Cyberbullying has unique concerns in that it can be:
  • 7.  Persistent – Digital devices offer an ability to immediately and continuously communicate 24 hours a day, so it can be difficult for children experiencing cyberbullying to find relief.  Permanent – Most information communicated electronically is permanent and public, if not reported and removed. A negative online reputation, including for those who bully, can impact college admissions, employment, and other areas of life.  Hard to Notice – Because teachers and parents may not overhear or see cyberbullying taking place, it is harder to recognize.
  • 8. Laws and Sanctions While all states have criminal laws that apply to bullying, not all have special statutes that apply to cyberbullying or bullying that takes place outside of school. Schools may take action either as required by law, or with local or school policies that allow them to discipline or take other action. Some states also have provisions to address bullying if it affects school performance. You can learn about the laws and policies in each state, including if they cover cyberbullying.
  • 9. Definitions A frequently used definition of cyberbullying is "an aggressive, intentional act or behavior that is carried out by a group or an individual, using electronic forms of contact, repeatedly and over time against a victim who cannot easily defend him or herself.
  • 10. There are many variations of the definition, such as the National Crime Prevention Council's more specific definition: "the process of using the Internet, cell phones or other devices to send or post text or images intended to hurt or embarrass another person."
  • 11. Cyberbullying is often similar to traditional bullying, with some notable distinctions. Victims of cyberbullying may not know the identity of their bully, or why the bully is targeting them. The harassment can have wide-reaching effects on the victim, as the content used to harass the victim can be spread and shared easily among many people and often remains accessible long after the initial incident.
  • 12. The terms "cyberharassment" and "cyberbullying" are sometimes used synonymously, though some people use the latter to refer specifically to harassment among minors or in a school setting.
  • 13. Tips to Stop Cyberbullying  Don’t respond. If someone bullies you, remember that your reaction is usually exactly what the bully wants. It gives him or her power over you. Who wants to empower a bully?  Don’t retaliate. Getting back at the bully turns you into one and reinforces the bully’s behavior. Help avoid a whole cycle of aggression.  Save the evidence. The only good news about digital bullying is that the harassing messages can usually be captured, saved, and shown to someone who can help. You need to do this even if it’s minor stuff, in case things escalate.
  • 14.  Talk to a trusted adult. You deserve backup. It’s always good to involve a parent but – if you can’t – a school counselor usually knows how to help. Sometimes both are needed. If you’re really nervous about saying something, see if there’s a way to report the incident anonymously at school.  Block the bully. If the harassment’s coming in the form of instant messages, texts, or profile comments, do yourself a favor: Use preferences or privacy tools to block the person. If it’s in chat, leave the “room.”  Be civil. Even if you don’t like someone, it’s a good idea to be decent and not sink to the other person’s level. Also, research shows that gossiping about and trash talking others increases your risk of being bullied. Treat people the way you want to be treated.
  • 15.  Don’t be a bully. How would you feel if someone harassed you? You know the old saying about walking a mile in someone’s shoes; even a few seconds of thinking about how another person might feel can put a big damper on aggression. That’s needed in this world.  Be a friend, not a bystander. Watching or forwarding mean messages empowers bullies and hurts victims even more. If you can, tell bullies to stop or let them know harassment makes people look stupid and mean. It’s time to let bullies know their behavior is unacceptable – cruel abuse of fellow human beings. If you can’t stop the bully, at least try to help the victim and report the behavior.
  • 16. Internet Addiction Internet addiction is described as an impulse control disorder, which does not involve use of an intoxicating drug and is very similar to pathological gambling. Some Internet users may develop an emotional attachment to on-line friends and activities they create on their computer screens. Internet users may enjoy aspects of the Internet that allow them to meet, socialize, and exchange ideas through the use of chat rooms, social networking websites, or "virtual communities."
  • 17. Other Internet users spend endless hours researching topics of interest Online or "blogging". Blogging is a contraction of the term "Web log", in which an individual will post commentaries and keep regular chronicle of events. It can be viewed as journaling and the entries are primarily textual.
  • 18. Similar to other addictions, those suffering from Internet addiction use the virtual fantasy world to connect with real people through the Internet, as a substitution for real-life human connection, which they are unable to achieve normally.
  • 19. What are the warning signs of Internet addiction?  Preoccupation with the Internet. (Thoughts about previous on-line activity or anticipation of the next on-line session.)  Use of the Internet in increasing amounts of time in order to achieve satisfaction.  Repeated, unsuccessful efforts to control, cut back or stop Internet use.
  • 20.  Feelings of restlessness, moodiness, depression, or irritability when attempting to cut down use of the Internet.  On-line longer than originally intended.  Jeopardized or risked loss of significant relationships, job, educational or career opportunities because of Internet use.
  • 21.  Lies to family members, therapists, or others to conceal the extent of involvement with the Internet.  Use of the Internet is a way to escape from problems or to relieve a dysphoric mood. (e.g. Feelings of hopelessness, guilt, anxiety, depression.)
  • 22. What are the effects? Internet addiction results in personal, family, academic, financial, and occupational problems that are characteristic of other addictions. Impairments of real life relationships are disrupted as a result of excessive use of the Internet. Individuals suffering from Internet addiction spend more time in solitary seclusion, spend less time with real people in their lives, and are often viewed as socially awkward. Arguments may result due to the volume of time spent on-line. Those suffering from Internet addiction may attempt to conceal the amount of time spent on-line, which results in distrust and the disturbance of quality in once stable relationships.
  • 23. Some suffering from Internet addiction may create on-line personas or profiles where they are able to alter their identities and pretend to be someone other than himself or herself. Those at highest risk for creation of a secret life are those who suffer from low-self esteem feelings of inadequacy, and fear of disapproval. Such negative self-concepts lead to clinical problems of depression and anxiety.
  • 24. Many persons who attempt to quit their Internet use experience withdrawal including: anger, depression, relief, mood swings, anxiety, fear, irritability, sadness, loneliness, boredom, restlessness, procrastination, and upset stomach. Being addicted to the Internet can also cause physical discomfort or medical problems such as: Carpal Tunnel Syndrome, dry eyes, backaches, severe headaches, eating irregularities, (such as skipping meals), failure to attend to personal hygiene, and sleep disturbance.
  • 25. How can someone get help? The first step is to determine if there is a problem. A Certified Addictions Counselor trained in identification and treatment of Internet addiction can effectively perform an assessment to determine what level of care is most appropriate. For a free confidential assessment, call the Illinois Institute for Addiction Recovery at (800) 522-3784. An assessment can be completed 24 hours a day, 7 days a week. Appointments are preferred, but walk-ins are always welcome. Sources: "Virtual Addiction" David N. Greenfield, Ph.D., "Caught in the Net" Dr. Kimberly Young, Center for Internet Addiction Recovery, American Psychiatric Association.