SlideShare a Scribd company logo
1 of 9
CYBERBULLING
•-BY ANANYA SHARMA
•-B.SC(H) FORENSIC SCIENCE(3RD YEAR)
•-ENROLL NO:- 210160236009
•SUBMITTED TO:- KAPIL BHARDWAJ
(CISSP)
INTRODUCTION
Cyberbullying is the use of
electronic communication to
bully a person, typically by
sending messages of an
intimidating or threatening
nature.
It can manifest in various
forms, including:
•Sending hurtful or menacing
messages
•Spreading rumors or lies
•Posting embarrassing photos or
videos
•Excluding someone from online
groups or activities
Cyberbullying can occur
through various digital
platforms, including:
•Social media sites
•Email
•Instant messaging
•Online gaming
IDENTIFYING CYBERBULLYING
Recognizing cyberbullying is essential for timely intervention and support for the victim.
Potential signs of cyberbullying include:
• Changes in mood or behavior: Victims may exhibit increased sadness, anxiety, or irritability.
• Spending more time online: Victims may spend excessive time online, particularly on social media or gaming
platforms.
• Avoiding social interactions: Victims may withdraw from social activities and isolate themselves from friends and
family.
• Expressing fear or anxiety about using technology: Victims may express fear or anxiety about using the internet or
specific online platforms.
FORMS OF CYBERBULLYING
Cyberbullying can manifest in various forms, each with its unique impact on the victim.
Common forms of cyberbullying include:
• Flaming: Sending hostile or insulting messages.
• Harassment: Repeatedly sending unwanted messages or threats.
• Denigration: Spreading rumors or lies about someone.
• Exclusion: Excluding someone from online groups or activities.
• Outing: Revealing private or embarrassing information about someone.
• Cyberstalking: Repeatedly monitoring someone's online activities to harass or intimidate them.
IMPACT OF CYBERBULLYING ON
VICTIMS
Cyberbullying can have a profound and lasting impact on the victim's emotional well-being,
academic performance, and social interactions.
Potential consequences of cyberbullying include:
• Emotional distress: Cyberbullying can lead to feelings of sadness, anxiety, depression, and fear.
• Academic struggles: Cyberbullying can hinder concentration, motivation, and overall academic performance.
• Social isolation: Cyberbullying can lead to social withdrawal, decreased self-esteem, and difficulty forming and
maintaining friendships.
• Self-harm or suicide: In extreme cases, cyberbullying can contribute to self-harm or suicidal thoughts.
ADDRESSING CYBERBULLYING
Reporting and Support:
Reporting cyberbullying to
authorities, seeking support
from trusted adults
Blocking and Ignoring:
Blocking bullies from online
interactions, ignoring their
hurtful messages
Self-Care: Prioritizing
emotional well-being,
engaging in positive
activities, seeking
professional help when
needed
PREVENTION STRATEGIES
Open Dialogue: Talking to
children about
cyberbullying, educating
them about its dangers
1
Respectful Online
Conduct: Teaching
children to be respectful
and responsible online
users
2
Empowering Bystanders:
Encouraging children to
speak up against
cyberbullying, seek help
for victims
3
School and Community
Policies: Implementing
clear anti-cyberbullying
policies, fostering a
supportive environment
4
CONCLUSION
Combating cyberbullying requires a collective
effort:
Individual Responsibility: Each individual must
take responsibility for their online behavior and
promote respectful interactions.
Community Awareness: Raising awareness
about cyberbullying through community
events, campaigns, and educational programs.
Legal Protections: Implementing effective legal
frameworks and policies to address
cyberbullying and protect victims.
Technological Advancements: Developing
technological solutions to detect, prevent, and
report cyberbullying incidents.
THANK YOU

More Related Content

Similar to Awareness about cyberbulling and growing concerns

Geek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingGeek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingMelissa McDonald
 
Cyberbullying and internent addiction
Cyberbullying  and internent addictionCyberbullying  and internent addiction
Cyberbullying and internent addictionChristopher Mejia
 
cyberbullying among teenagers .pdf
cyberbullying among teenagers .pdfcyberbullying among teenagers .pdf
cyberbullying among teenagers .pdfawatefalshehhi2
 
Cyberbullying and social media
Cyberbullying and social mediaCyberbullying and social media
Cyberbullying and social mediaevieasmedia
 
Cyberbullying full
Cyberbullying fullCyberbullying full
Cyberbullying fullLiam1997
 
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...Brian Markle
 
Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1remerosearcenal
 
Cyberbullying (Small information about this)
Cyberbullying (Small information about this)Cyberbullying (Small information about this)
Cyberbullying (Small information about this)Fernanda Díaz
 
Cyberbullying and Internet addiction by Jhoanne Erika Masaya
Cyberbullying and Internet addiction by Jhoanne Erika MasayaCyberbullying and Internet addiction by Jhoanne Erika Masaya
Cyberbullying and Internet addiction by Jhoanne Erika MasayaJhoanneerika
 
Cyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdfCyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdfRahil Foundation
 

Similar to Awareness about cyberbulling and growing concerns (20)

Geek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingGeek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® Cyberbullying
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptx
 
Cyberbullying and internent addiction
Cyberbullying  and internent addictionCyberbullying  and internent addiction
Cyberbullying and internent addiction
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber stalking
Cyber stalking Cyber stalking
Cyber stalking
 
cyber bulling
 cyber bulling cyber bulling
cyber bulling
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
cyberbullying among teenagers .pdf
cyberbullying among teenagers .pdfcyberbullying among teenagers .pdf
cyberbullying among teenagers .pdf
 
Cyberbullying and social media
Cyberbullying and social mediaCyberbullying and social media
Cyberbullying and social media
 
Cyberbullying full
Cyberbullying fullCyberbullying full
Cyberbullying full
 
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
 
Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1
 
Cyberbullying (Small information about this)
Cyberbullying (Small information about this)Cyberbullying (Small information about this)
Cyberbullying (Small information about this)
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)
 
Cyberbullying and Internet addiction by Jhoanne Erika Masaya
Cyberbullying and Internet addiction by Jhoanne Erika MasayaCyberbullying and Internet addiction by Jhoanne Erika Masaya
Cyberbullying and Internet addiction by Jhoanne Erika Masaya
 
CYBER BULLYING.pptx
CYBER BULLYING.pptxCYBER BULLYING.pptx
CYBER BULLYING.pptx
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdfCyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdf
 

Recently uploaded

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Recently uploaded (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Awareness about cyberbulling and growing concerns

  • 1. CYBERBULLING •-BY ANANYA SHARMA •-B.SC(H) FORENSIC SCIENCE(3RD YEAR) •-ENROLL NO:- 210160236009 •SUBMITTED TO:- KAPIL BHARDWAJ (CISSP)
  • 2. INTRODUCTION Cyberbullying is the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature. It can manifest in various forms, including: •Sending hurtful or menacing messages •Spreading rumors or lies •Posting embarrassing photos or videos •Excluding someone from online groups or activities Cyberbullying can occur through various digital platforms, including: •Social media sites •Email •Instant messaging •Online gaming
  • 3. IDENTIFYING CYBERBULLYING Recognizing cyberbullying is essential for timely intervention and support for the victim. Potential signs of cyberbullying include: • Changes in mood or behavior: Victims may exhibit increased sadness, anxiety, or irritability. • Spending more time online: Victims may spend excessive time online, particularly on social media or gaming platforms. • Avoiding social interactions: Victims may withdraw from social activities and isolate themselves from friends and family. • Expressing fear or anxiety about using technology: Victims may express fear or anxiety about using the internet or specific online platforms.
  • 4. FORMS OF CYBERBULLYING Cyberbullying can manifest in various forms, each with its unique impact on the victim. Common forms of cyberbullying include: • Flaming: Sending hostile or insulting messages. • Harassment: Repeatedly sending unwanted messages or threats. • Denigration: Spreading rumors or lies about someone. • Exclusion: Excluding someone from online groups or activities. • Outing: Revealing private or embarrassing information about someone. • Cyberstalking: Repeatedly monitoring someone's online activities to harass or intimidate them.
  • 5. IMPACT OF CYBERBULLYING ON VICTIMS Cyberbullying can have a profound and lasting impact on the victim's emotional well-being, academic performance, and social interactions. Potential consequences of cyberbullying include: • Emotional distress: Cyberbullying can lead to feelings of sadness, anxiety, depression, and fear. • Academic struggles: Cyberbullying can hinder concentration, motivation, and overall academic performance. • Social isolation: Cyberbullying can lead to social withdrawal, decreased self-esteem, and difficulty forming and maintaining friendships. • Self-harm or suicide: In extreme cases, cyberbullying can contribute to self-harm or suicidal thoughts.
  • 6. ADDRESSING CYBERBULLYING Reporting and Support: Reporting cyberbullying to authorities, seeking support from trusted adults Blocking and Ignoring: Blocking bullies from online interactions, ignoring their hurtful messages Self-Care: Prioritizing emotional well-being, engaging in positive activities, seeking professional help when needed
  • 7. PREVENTION STRATEGIES Open Dialogue: Talking to children about cyberbullying, educating them about its dangers 1 Respectful Online Conduct: Teaching children to be respectful and responsible online users 2 Empowering Bystanders: Encouraging children to speak up against cyberbullying, seek help for victims 3 School and Community Policies: Implementing clear anti-cyberbullying policies, fostering a supportive environment 4
  • 8. CONCLUSION Combating cyberbullying requires a collective effort: Individual Responsibility: Each individual must take responsibility for their online behavior and promote respectful interactions. Community Awareness: Raising awareness about cyberbullying through community events, campaigns, and educational programs. Legal Protections: Implementing effective legal frameworks and policies to address cyberbullying and protect victims. Technological Advancements: Developing technological solutions to detect, prevent, and report cyberbullying incidents.