Presentation is loading. Please wait.

Presentation is loading. Please wait.

 Cyber-bullying is "the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group,

Similar presentations


Presentation on theme: " Cyber-bullying is "the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group,"— Presentation transcript:

1

2  Cyber-bullying is "the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm others". As it has become more common in society, particularly among young people, legislation and awareness campaigns have arisen to combat it.  Credited to: http://en.wikipedia.org/wiki/Cyber-bullying

3  The practice of cyber-bullying is not only kids and, while the behavior may seem childish, there are adults that partake in this as well. the difference in age groups is sometimes referred to as cyber-stalking or cyber-harassment when perpetrated by adults toward adults, this can lead to comment along the basis of sex. Common tactics used by cyber-stalkers are to vandalize a search engine or encyclopedia, to threaten a victim's earnings, employment, reputation, or safety, ego, or mind set. A repeated pattern of such actions against a target by an adult constitutes cyber-stalking.cyber-stalkingcyber-harassment

4  Cyber stalking is a crime in which the attacker harasses a victim using electronic communication, such as e mail or (IM), or messages posted to a Web site or a chat site, a discussion group

5  Cyber books:  By:  Felicia Donovan;  Kristyn Bernier

6  By: Don Tapscott  Publisher: McGraw-Hill

7  Never reveal your home address.  Password protect all accounts including cell phones, land lines, e-mails, banking and credit cards with a secure password that would be difficult for anyone to guess.  Never give out your Social Security Number unless you are absolutely sure of who is asking for it and why.

8  By: Craig S. Wright  Publisher: Syngress  This book has every- thing you need to know

9  If you are leaving a partner, spouse or boyfriend or girlfriend reset every single password on all of your accounts to something they cannot guess.  If you think you have a cyberstalker, move fast.

10  Cyber harassment and cyber stalking are often used synonymously to describe the actions of persons who relentlessly pursue others online with the intention of frightening or embarrassing the victim. Sometimes a harasser intends to teach the victim a lesson or solicit information from the victim, and stalkers generally want revenge or attention.harassmentstalking

11  http://my.safaribooksonline.com/book/t echnology- management/9781597492669 http://my.safaribooksonline.com/book/t echnology- management/9781597492669  http://womensissues.about.com/od/viol enceagainstwomen/a/CyberPrevention. htm http://womensissues.about.com/od/viol enceagainstwomen/a/CyberPrevention. htm  http://www.ask.com/web?q=Cyberstalki ng+Facts&qsrc=6&o=16633&l=snd http://www.ask.com/web?q=Cyberstalki ng+Facts&qsrc=6&o=16633&l=snd  http://www.wisegeek.com/what-is- cyber-harassment.htm


Download ppt " Cyber-bullying is "the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group,"

Similar presentations


Ads by Google