What is
Cyberbullying ?
"Knowing what's right doesn't mean much unless you do what's right". -Theodore Roosevelt
Cyberbullying is the online manifestation of a broader phenomenon better known as bullying. The latter is characterized by violent and intimidating actions exercised by a bully, or a group of bullies, on a victim. The actions may concern verbal harassment, physical aggression, persecution, generally carried out in a school environment.
Ministry of Education and Merit
How cyberbullying manifests itself
06
Cyberstalking
Revenge porn
01
07
Denigration
Sextornion
02
08
Harassment
Doxing
03
09
Mobbing
04
Flaming
10
Deepfake
05
Exclusion
Cyberbullying and law
The set of attention, protection and education actions is aimed at all minors involved in episodes of cyberbullying, whether they find themselves in the position of victims or those responsible for crimes, and without distinction of age within the institutions schools.
+info
The warning procedure foreseen for stalking has been extended to cyberbullying (art. 612-bis of the criminal code). In the event of insulting behavior (art. 594 of the criminal code), defamation (art. 595 of the criminal code), threats (art. 612 of the criminal code) and illicit processing of personal data (art. 167 of the privacy code) committed on internet by minors over the age of fourteen in against another minor the warning procedure by the police commissioner is applicable
The effects of the warning cease upon reaching the age of majority.
Thanks for the attention!
By Morgante Valeria, Trombetta Federica, Tuzi Giada
Mobbing
By "mobbing" we mean a set of aggressive and persecutory behaviors in the workplace, in order to target and marginalize the person who is the victim.
The ways in which bullying can be integrated can be the most diverse;
it could become the target of jokes, gossip, insults and hostile behavior of various kinds, as well as find themselves at the center of a real smear campaign carried out against him.
-Each educational institution must identify a contact person among the teachers with the task of coordinating initiatives to prevent and combat cyberbullying
-An active role for students and former students will be promoted in peer education activities, in preventing and combating cyberbullying in schools.
-From an educational alliance perspective, the Headmaster who becomes aware of acts of cyberbullying will promptly inform the parents of the minors involved. The school regulations and the educational co-responsibility agreement (intended for all families) must be integrated with references to cyberbullying conduct.
Denigration
Denigration is gossiping about someone online by sending or posting gossip, cruel rumors or incriminating photos. The goal of the cyberbully is, in this case, to damage the reputation or friendships of a peer, spreading online gossip and/ or other offensive material.
Cyberbullies can, in fact, send or post on the internet altered images (photographs or video clips) of the victim, for example, modifying the face or body of the target student in order to ridicule him, or making him the protagonist of sexually explicit scenes, through the use of photomontages.
Flaming
We refer to the act of offending, insulting, provoking a person on web platforms. The aim is to inflame the minds and engage in discussions even violent verbally, while remaining hidden behind a computer.
One of these elements is that of anonymity, which protects subjects from having to expose themselves in first person and can help develop that psychological phenomenon also known as "Online Disinhibition Effect".
Revenge porn
It defines "revenge porn" (from revenge) the sharing of pornographic material, in images or videos, through the network, with instant messaging systems, social networks, without the consent of the person portrayed and in order to harm them, humiliate her or blackmail her.
Revenge, though it may be in the abstract questionable, presupposes that there is at the base a wrong or a disrespect for which to take revenge. You get revenge on someone who did something bad or wrong to us.
Since some episodes of "revenge porn" had dramatic consequences, reaching the death by suicide of the victims.
Sextorion
The term “sextortion” refers to a form of online blackmail that uses sexually explicit material, such as intimate photos or videos, initially sent by the victim.
The perpetrator of sextortion requests sums of money or other benefits (generally of a sexual nature, such as other similar content) under the threat of sharing online and publicly, the intimate material received after a first contact, material obtained by deception.
Cyberstalking
Cyberstalking refers to the use of the internet and other technologies to harass or stalk another person online.
This online harassment, which is an extension of cyberbullying and in-person stalking, can take the form of e-mails, text messages, social media posts, and more and is often methodical, deliberate, and persistent.
EXAMPLES-Rude, offensive, or suggestive comments/posts online-Follow the target online by joining the same groups and forums -Send threatening, controlling, or lewd messages or emails to the target -Use technology to threaten or blackmail the target
Harassment
It consists of rude, offensive, insulting, disturbing messages, which are sent repeatedly over time, through e-mail, SMS, MMS, unwelcome or sometimes silent phone calls.
It is, therefore, an unbalanced relationship in which, as in traditional bullying, the victim passively suffers the harassment or, at most, tries, generally unsuccessfully, to convince the persecutor to put an end to the aggression.
Exclusion
The "exclusion" is a subtle, current and widespread form of bullying and cyberbullying, in which there is no physical violence or verbal offense; the goal is, in fact, to exclude a person from the group, in preventing him from attending an event or a party.
The term used by young people is the infamous "banned" (from "ban", or "banish"): the bubble of marginalization, social exclusion, expulsion, exile, confinement, being outside a community.
Doxing
Doxing is the practice of seeking and disseminating personal and private information or other data about a person online, usually with malicious intent.
There are different types of doxing: IP address, social media, intelligence agents. Doxing is illegal when your personal or confidential information is disclosed without your consent.
Deepfake
The term deepfake comes from the underlying technology "deep learning", which is a form of artificial intelligence. Deep learning algorithms, which teach themselves how to solve problems when large datasets are provided, are used to swap faces in video and digital content to create fake, lifelike media.
It is also used to produce fake pornographic videos of celebrities and revenge porn, but can also be used to produce fake news, perform cyberbullying or various other cybercrimes.
The evolution of deepfake technologies that allow you to create evidence of scenes never happened are now part of reality. Some celebrities have unfortunately found themselves in really unpleasant situations due to deepfake.
DATA DOSSIER
Valeria Morgante
Created on April 11, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Vertical Genial One Pager
View
Mobile App Dossier
View
Color Shapes Dossier
View
Notes Dossier
View
Futuristic Tech Dossier
View
Crowdfunding Campaign
View
Company Dossier
Explore all templates
Transcript
What is
Cyberbullying ?
"Knowing what's right doesn't mean much unless you do what's right". -Theodore Roosevelt
Cyberbullying is the online manifestation of a broader phenomenon better known as bullying. The latter is characterized by violent and intimidating actions exercised by a bully, or a group of bullies, on a victim. The actions may concern verbal harassment, physical aggression, persecution, generally carried out in a school environment.
Ministry of Education and Merit
How cyberbullying manifests itself
06
Cyberstalking
Revenge porn
01
07
Denigration
Sextornion
02
08
Harassment
Doxing
03
09
Mobbing
04
Flaming
10
Deepfake
05
Exclusion
Cyberbullying and law
The set of attention, protection and education actions is aimed at all minors involved in episodes of cyberbullying, whether they find themselves in the position of victims or those responsible for crimes, and without distinction of age within the institutions schools.
+info
The warning procedure foreseen for stalking has been extended to cyberbullying (art. 612-bis of the criminal code). In the event of insulting behavior (art. 594 of the criminal code), defamation (art. 595 of the criminal code), threats (art. 612 of the criminal code) and illicit processing of personal data (art. 167 of the privacy code) committed on internet by minors over the age of fourteen in against another minor the warning procedure by the police commissioner is applicable
The effects of the warning cease upon reaching the age of majority.
Thanks for the attention!
By Morgante Valeria, Trombetta Federica, Tuzi Giada
Mobbing
By "mobbing" we mean a set of aggressive and persecutory behaviors in the workplace, in order to target and marginalize the person who is the victim.
The ways in which bullying can be integrated can be the most diverse;
it could become the target of jokes, gossip, insults and hostile behavior of various kinds, as well as find themselves at the center of a real smear campaign carried out against him.
-Each educational institution must identify a contact person among the teachers with the task of coordinating initiatives to prevent and combat cyberbullying
-An active role for students and former students will be promoted in peer education activities, in preventing and combating cyberbullying in schools.
-From an educational alliance perspective, the Headmaster who becomes aware of acts of cyberbullying will promptly inform the parents of the minors involved. The school regulations and the educational co-responsibility agreement (intended for all families) must be integrated with references to cyberbullying conduct.
Denigration
Denigration is gossiping about someone online by sending or posting gossip, cruel rumors or incriminating photos. The goal of the cyberbully is, in this case, to damage the reputation or friendships of a peer, spreading online gossip and/ or other offensive material.
Cyberbullies can, in fact, send or post on the internet altered images (photographs or video clips) of the victim, for example, modifying the face or body of the target student in order to ridicule him, or making him the protagonist of sexually explicit scenes, through the use of photomontages.
Flaming
We refer to the act of offending, insulting, provoking a person on web platforms. The aim is to inflame the minds and engage in discussions even violent verbally, while remaining hidden behind a computer.
One of these elements is that of anonymity, which protects subjects from having to expose themselves in first person and can help develop that psychological phenomenon also known as "Online Disinhibition Effect".
Revenge porn
It defines "revenge porn" (from revenge) the sharing of pornographic material, in images or videos, through the network, with instant messaging systems, social networks, without the consent of the person portrayed and in order to harm them, humiliate her or blackmail her.
Revenge, though it may be in the abstract questionable, presupposes that there is at the base a wrong or a disrespect for which to take revenge. You get revenge on someone who did something bad or wrong to us.
Since some episodes of "revenge porn" had dramatic consequences, reaching the death by suicide of the victims.
Sextorion
The term “sextortion” refers to a form of online blackmail that uses sexually explicit material, such as intimate photos or videos, initially sent by the victim.
The perpetrator of sextortion requests sums of money or other benefits (generally of a sexual nature, such as other similar content) under the threat of sharing online and publicly, the intimate material received after a first contact, material obtained by deception.
Cyberstalking
Cyberstalking refers to the use of the internet and other technologies to harass or stalk another person online.
This online harassment, which is an extension of cyberbullying and in-person stalking, can take the form of e-mails, text messages, social media posts, and more and is often methodical, deliberate, and persistent.
EXAMPLES-Rude, offensive, or suggestive comments/posts online-Follow the target online by joining the same groups and forums -Send threatening, controlling, or lewd messages or emails to the target -Use technology to threaten or blackmail the target
Harassment
It consists of rude, offensive, insulting, disturbing messages, which are sent repeatedly over time, through e-mail, SMS, MMS, unwelcome or sometimes silent phone calls.
It is, therefore, an unbalanced relationship in which, as in traditional bullying, the victim passively suffers the harassment or, at most, tries, generally unsuccessfully, to convince the persecutor to put an end to the aggression.
Exclusion
The "exclusion" is a subtle, current and widespread form of bullying and cyberbullying, in which there is no physical violence or verbal offense; the goal is, in fact, to exclude a person from the group, in preventing him from attending an event or a party.
The term used by young people is the infamous "banned" (from "ban", or "banish"): the bubble of marginalization, social exclusion, expulsion, exile, confinement, being outside a community.
Doxing
Doxing is the practice of seeking and disseminating personal and private information or other data about a person online, usually with malicious intent.
There are different types of doxing: IP address, social media, intelligence agents. Doxing is illegal when your personal or confidential information is disclosed without your consent.
Deepfake
The term deepfake comes from the underlying technology "deep learning", which is a form of artificial intelligence. Deep learning algorithms, which teach themselves how to solve problems when large datasets are provided, are used to swap faces in video and digital content to create fake, lifelike media.
It is also used to produce fake pornographic videos of celebrities and revenge porn, but can also be used to produce fake news, perform cyberbullying or various other cybercrimes.
The evolution of deepfake technologies that allow you to create evidence of scenes never happened are now part of reality. Some celebrities have unfortunately found themselves in really unpleasant situations due to deepfake.