SlideShare une entreprise Scribd logo
1  sur  12
+
Cyberbullying
By:Ana Cristina Tames
6B #28
Cyberbullying
+
Cyberbullying
 Cyberbullying is the bullying (an
unwanted, aggressive behavior among school
aged children that involves a real or perceived
power imbalance.) through electronic devices
such as cell phones, computers, tablets with
communication tools like social networks, text
messages, email, chat, and websites
+
 The National Crime Prevention Association
lists tactics often used by teen
cyberbullies.[16]
 Pretend they are other people online to trick
others
 Spread lies and rumors about victims
 Trick people into revealing personal
information
 Send or forward mean text messages
 Post pictures of victims without their consent
 Cyberbullying can happen 24 hour 7 days a
week, it can happen any time.
+
 Kids that are cyberbullied may :
 Use alcohol and drugs
 Skip school
 Experience in-person bullying
 Be unwilling to attend school
 Receive poor grades
 Have lower self-esteem
 Have more health problems
+  They are many ways to prevent parents and
kids pass through cyberbullying:
 Parents may be aware of what their kids are
doing online
 Know the sites they are visiting
 Parents know how to use the sites they like
 Ask their password, only to use them in
case of emergency
 Ask to “friend” or “follow” your kids on social
media sites or ask another trusted adult to
do so.
 Establised Rules about technology use
 be clear about what sites they can visit and
what they are permitted to do when they’re
online
 Tell them not to share anything that could hurt or
embarrass themselves or others
 Encourage kids to think about who they want to
+
THE USE OF SOCIAL
NETWORKS FOR CHILDREN
UNDER 13 YEARS OLD
by:Ana Cristina Tames
+
 The use of social networks for children
under 13 years old is not llegally
permitted however kids under 13 years
old use social networks to
communicate, play, work etc.
+
 This ways can parents protect their kids being on social
networks:
Social networking sites can have many benefits for
children, such as allowing them to explore new interests. Help
your children use them more safely by going over the following
tips and discussion starters.
 Check your child’s friend lists to see who has access to his
or her profile. Make sure your child knows all friends in
person.
 Teach your child to set profiles to private–but be aware that
privacy settings do not guarantee complete privacy.
 Have your child remove any inappropriate content and
photos and delete any personal information.
 Check the profiles of your child’s friends to see if there is
revealing information or photos about your child.
+

Pros Cons
Kids learn since Little how to use
or be part of social networks
The kids are exposed to many
risks
They have many ways to be
communicated with their friends
Sometimes the kids while playing
can be exposed to many risks
because the dont know how to
use social network
They can express themselves
and talk about their interests
Cyber-bullying could be more
prevalent
learn about new things and find
communities that encourage a
hobby or passion.
Most social networking sites put
all user-submitted information on
public view by default. So people
with malicious intentions can
access their profile
+
+
References
 www.stopcyberbullying.org
 denissejimenez.com -
 http://kidshealth.org/parent/positive/talk/cy
berbullying.html
 http://en.wikipedia.org/wiki/Red
+

Contenu connexe

Tendances

Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents Jennifer Holena
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineLuciusonSecurity
 
Social media contract for parents and teens
Social media contract for parents and teensSocial media contract for parents and teens
Social media contract for parents and teensJill Celeste
 
Social Media and Teenagers
Social Media and TeenagersSocial Media and Teenagers
Social Media and TeenagersJennifer Holena
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital CitizensJason Rushing
 
Social Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineSocial Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineHolly Solomon
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safetyrehmannb
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Family Internet Safety - Cyber Bullying
Family Internet Safety - Cyber BullyingFamily Internet Safety - Cyber Bullying
Family Internet Safety - Cyber BullyingDamon Taylor
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internetmalissa_1041
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentationgrp4.ed451
 
Social Media & Children's Safety 101
Social Media & Children's Safety 101Social Media & Children's Safety 101
Social Media & Children's Safety 101Chad Richards
 
Cyberbullying tips from connect safely
Cyberbullying tips from connect safelyCyberbullying tips from connect safely
Cyberbullying tips from connect safelyCurso RRSS
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 

Tendances (20)

NetSmart [English]
NetSmart [English]NetSmart [English]
NetSmart [English]
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Lotrecchiano grace
Lotrecchiano graceLotrecchiano grace
Lotrecchiano grace
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Social media contract for parents and teens
Social media contract for parents and teensSocial media contract for parents and teens
Social media contract for parents and teens
 
Social Media and Teenagers
Social Media and TeenagersSocial Media and Teenagers
Social Media and Teenagers
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital Citizens
 
Social Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineSocial Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe Online
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safety
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Family Internet Safety - Cyber Bullying
Family Internet Safety - Cyber BullyingFamily Internet Safety - Cyber Bullying
Family Internet Safety - Cyber Bullying
 
Protecting Your Child
Protecting Your ChildProtecting Your Child
Protecting Your Child
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Conversation
ConversationConversation
Conversation
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentation
 
Social Media & Children's Safety 101
Social Media & Children's Safety 101Social Media & Children's Safety 101
Social Media & Children's Safety 101
 
Cyberbullying tips from connect safely
Cyberbullying tips from connect safelyCyberbullying tips from connect safely
Cyberbullying tips from connect safely
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 

En vedette (17)

Recycled Reads
Recycled ReadsRecycled Reads
Recycled Reads
 
Marketing Via Twitter: Fast & Furious 6
Marketing Via Twitter: Fast & Furious 6Marketing Via Twitter: Fast & Furious 6
Marketing Via Twitter: Fast & Furious 6
 
5 günde ingilizce
5 günde ingilizce5 günde ingilizce
5 günde ingilizce
 
BCEE uses BizTalk for more efficient information exchange and conversions
BCEE uses BizTalk for more efficient information exchange and conversionsBCEE uses BizTalk for more efficient information exchange and conversions
BCEE uses BizTalk for more efficient information exchange and conversions
 
Citrine소개서
Citrine소개서Citrine소개서
Citrine소개서
 
Google programmes and internships for students
Google programmes and internships for studentsGoogle programmes and internships for students
Google programmes and internships for students
 
001 design idea
001 design idea001 design idea
001 design idea
 
GroupFinder
GroupFinderGroupFinder
GroupFinder
 
Libraries as Entrepreneurial Booksellers: pt 2
Libraries as Entrepreneurial Booksellers: pt 2Libraries as Entrepreneurial Booksellers: pt 2
Libraries as Entrepreneurial Booksellers: pt 2
 
Creating The Ethereal Library
Creating The Ethereal LibraryCreating The Ethereal Library
Creating The Ethereal Library
 
Codearabe1 100320185048-phpapp01
Codearabe1 100320185048-phpapp01Codearabe1 100320185048-phpapp01
Codearabe1 100320185048-phpapp01
 
Multimedia Learning PPT
Multimedia Learning PPTMultimedia Learning PPT
Multimedia Learning PPT
 
Primary ed
Primary edPrimary ed
Primary ed
 
Leadership in global & multi cultural orgtns - power points
Leadership in global & multi cultural orgtns - power pointsLeadership in global & multi cultural orgtns - power points
Leadership in global & multi cultural orgtns - power points
 
Equity ed
Equity edEquity ed
Equity ed
 
Medical value travel to kerala
Medical value travel to keralaMedical value travel to kerala
Medical value travel to kerala
 
Lingerie shopping
Lingerie shoppingLingerie shopping
Lingerie shopping
 

Similaire à Converstation

Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptNaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptpurush203
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Hurd, lindse slide share presentation
Hurd, lindse slide share presentationHurd, lindse slide share presentation
Hurd, lindse slide share presentationlhurd01
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshareLoreto Normanurst
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversationlippertnicole
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GArissa Ablao
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingStemGrade
 
aw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenaw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenJanet Weninger
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenHomeGuides
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sitesner1eje
 
The good, bad & ugly of social media
The good, bad  & ugly of social media The good, bad  & ugly of social media
The good, bad & ugly of social media Tuiki George
 
Social media on child development ppt.pptx
Social media on child development ppt.pptxSocial media on child development ppt.pptx
Social media on child development ppt.pptxsarahfauzna
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaAndri Priyatna
 
Social Media for Parents
Social Media for ParentsSocial Media for Parents
Social Media for Parentsagoldberghvs
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet SafetyMark Deming
 

Similaire à Converstation (20)

Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Online safety
Online safetyOnline safety
Online safety
 
Hurd, lindse slide share presentation
Hurd, lindse slide share presentationHurd, lindse slide share presentation
Hurd, lindse slide share presentation
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshare
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversation
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
aw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenaw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-children
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Social networking leaflet
Social networking leafletSocial networking leaflet
Social networking leaflet
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sites
 
The good, bad & ugly of social media
The good, bad  & ugly of social media The good, bad  & ugly of social media
The good, bad & ugly of social media
 
Social media on child development ppt.pptx
Social media on child development ppt.pptxSocial media on child development ppt.pptx
Social media on child development ppt.pptx
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
Social Media for Parents
Social Media for ParentsSocial Media for Parents
Social Media for Parents
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 

Dernier

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Dernier (20)

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Converstation

  • 2. + Cyberbullying  Cyberbullying is the bullying (an unwanted, aggressive behavior among school aged children that involves a real or perceived power imbalance.) through electronic devices such as cell phones, computers, tablets with communication tools like social networks, text messages, email, chat, and websites
  • 3. +  The National Crime Prevention Association lists tactics often used by teen cyberbullies.[16]  Pretend they are other people online to trick others  Spread lies and rumors about victims  Trick people into revealing personal information  Send or forward mean text messages  Post pictures of victims without their consent  Cyberbullying can happen 24 hour 7 days a week, it can happen any time.
  • 4. +  Kids that are cyberbullied may :  Use alcohol and drugs  Skip school  Experience in-person bullying  Be unwilling to attend school  Receive poor grades  Have lower self-esteem  Have more health problems
  • 5. +  They are many ways to prevent parents and kids pass through cyberbullying:  Parents may be aware of what their kids are doing online  Know the sites they are visiting  Parents know how to use the sites they like  Ask their password, only to use them in case of emergency  Ask to “friend” or “follow” your kids on social media sites or ask another trusted adult to do so.  Establised Rules about technology use  be clear about what sites they can visit and what they are permitted to do when they’re online  Tell them not to share anything that could hurt or embarrass themselves or others  Encourage kids to think about who they want to
  • 6. + THE USE OF SOCIAL NETWORKS FOR CHILDREN UNDER 13 YEARS OLD by:Ana Cristina Tames
  • 7. +  The use of social networks for children under 13 years old is not llegally permitted however kids under 13 years old use social networks to communicate, play, work etc.
  • 8. +  This ways can parents protect their kids being on social networks: Social networking sites can have many benefits for children, such as allowing them to explore new interests. Help your children use them more safely by going over the following tips and discussion starters.  Check your child’s friend lists to see who has access to his or her profile. Make sure your child knows all friends in person.  Teach your child to set profiles to private–but be aware that privacy settings do not guarantee complete privacy.  Have your child remove any inappropriate content and photos and delete any personal information.  Check the profiles of your child’s friends to see if there is revealing information or photos about your child.
  • 9. +  Pros Cons Kids learn since Little how to use or be part of social networks The kids are exposed to many risks They have many ways to be communicated with their friends Sometimes the kids while playing can be exposed to many risks because the dont know how to use social network They can express themselves and talk about their interests Cyber-bullying could be more prevalent learn about new things and find communities that encourage a hobby or passion. Most social networking sites put all user-submitted information on public view by default. So people with malicious intentions can access their profile
  • 10. +
  • 11. + References  www.stopcyberbullying.org  denissejimenez.com -  http://kidshealth.org/parent/positive/talk/cy berbullying.html  http://en.wikipedia.org/wiki/Red
  • 12. +