{"id":3142,"date":"2023-06-23T18:41:52","date_gmt":"2023-06-24T00:41:52","guid":{"rendered":"https:\/\/redporlaciberseguridad.org\/?p=3142"},"modified":"2023-10-10T11:53:44","modified_gmt":"2023-10-10T17:53:44","slug":"consecuencias-del-acoso-cibernetico","status":"publish","type":"post","link":"https:\/\/redporlaciberseguridad.org\/en\/consecuencias-del-acoso-cibernetico\/","title":{"rendered":"Consequences of cyberbullying"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"3142\" class=\"elementor elementor-3142\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1bdc83b elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"1bdc83b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3302f89\" data-id=\"3302f89\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9dc496e elementor-widget elementor-widget-heading\" data-id=\"9dc496e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Consequences of cyberbullying<\/h3>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cc6a5a2 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"cc6a5a2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e5dbdb7\" data-id=\"e5dbdb7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-40d5738 elementor-widget elementor-widget-image\" data-id=\"40d5738\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/06\/BANNER-WEBINAR-TODOS-7.png-1024x576.webp\" class=\"attachment-large size-large wp-image-3101\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/06\/BANNER-WEBINAR-TODOS-7.png-1024x576.webp 1024w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/06\/BANNER-WEBINAR-TODOS-7.png-600x338.webp 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/06\/BANNER-WEBINAR-TODOS-7.png-300x169.webp 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/06\/BANNER-WEBINAR-TODOS-7.png-768x432.webp 768w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/06\/BANNER-WEBINAR-TODOS-7.png-1536x864.webp 1536w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/06\/BANNER-WEBINAR-TODOS-7.png.webp 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35edba0 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"35edba0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-54767ac\" data-id=\"54767ac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0c408df elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"0c408df\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a26d7d0\" data-id=\"a26d7d0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bc79e85 elementor-widget elementor-widget-text-editor\" data-id=\"bc79e85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-03e7935 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"03e7935\" data-element_type=\"section\"><div class=\"elementor-container elementor-column-gap-default\"><div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fc1ff06\" data-id=\"fc1ff06\" data-element_type=\"column\"><div class=\"elementor-widget-wrap elementor-element-populated\"><div class=\"elementor-element elementor-element-df65d53 elementor-widget elementor-widget-text-editor\" data-id=\"df65d53\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p class=\"_04xlpA direction-ltr align-justify para-style-body\"><span class=\"S1PPyQ\">Currently, social networks are a communication tool that has allowed us to interact with people from a distance, create communities of interest and share special moments with others. They have been a space in which people spend time to entertain themselves, distract themselves and release the stress caused by daily life, however, they have caused emotional discomfort to several of us at some point in our lives as a result of users who dedicate themselves to harass through virtual sites.<\/span><\/p><p class=\"_04xlpA direction-ltr align-justify para-style-body\"><span class=\"S1PPyQ\">\u00a0<\/span><\/p><p class=\"_04xlpA direction-ltr align-justify para-style-body\"><span class=\"S1PPyQ\">Cyberbullying consists of harassing or intimidating the victim using digital technology. This can be done on social media, messaging platforms, gaming platforms, and mobile phones. It is a repetitive behavior that tries to frighten, anger or humiliate other people.<\/span><\/p><p class=\"_04xlpA direction-ltr align-justify para-style-body\"><span class=\"S1PPyQ\">\u00a0<\/span><\/p><p class=\"_04xlpA direction-ltr align-justify para-style-body\"><span class=\"S1PPyQ\">Harassment takes the form of social exclusion and discrimination and affects more than other protected characteristics such as race, religion, sexuality, gender identity and disability. If left untreated, stress can affect physical and mental health and lead to heart disease, insomnia, and depression.<\/span><\/p><p class=\"_04xlpA direction-ltr align-justify para-style-body\"><span class=\"S1PPyQ\">\u00a0<\/span><\/p><p class=\"_04xlpA direction-ltr align-justify para-style-body\"><span class=\"S1PPyQ\">We recommend you watch this video from LikeInteligente about Cyberbullying:<span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/www.facebook.com\/likeinteligente\/videos\/1037308536833480\/?mibextid=zDhOQc\"><strong> https:\/\/www.facebook.com\/likeinteligente\/videos\/1037308536833480\/?mibextid=zDhOQc<\/strong><\/a><\/span><\/span><\/p><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0eeca9d elementor-widget elementor-widget-video\" data-id=\"0eeca9d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/OLHLlofdECc&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2514ebd elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"2514ebd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f6ebae1\" data-id=\"f6ebae1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-27cae4c elementor-widget elementor-widget-heading\" data-id=\"27cae4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Consequences of cyberbullying on the victim\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73621ef elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"73621ef\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c1ad728\" data-id=\"c1ad728\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-21ae166 elementor-widget elementor-widget-image\" data-id=\"21ae166\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/06\/BANNER-WEBINAR-TODOS-8-1536x864.png-1024x576.webp\" class=\"attachment-large size-large wp-image-3145\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/06\/BANNER-WEBINAR-TODOS-8-1536x864.png-1024x576.webp 1024w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/06\/BANNER-WEBINAR-TODOS-8-1536x864.png-600x338.webp 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/06\/BANNER-WEBINAR-TODOS-8-1536x864.png-300x169.webp 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/06\/BANNER-WEBINAR-TODOS-8-1536x864.png-768x432.webp 768w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/06\/BANNER-WEBINAR-TODOS-8-1536x864.png.webp 1536w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf857fc elementor-widget elementor-widget-text-editor\" data-id=\"bf857fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li><span class=\"S1PPyQ\">Low self-esteem.<\/span><\/li><li><span class=\"S1PPyQ\">Depression, anxiety and stress.<\/span><\/li><li><span class=\"S1PPyQ\">Self-harm.<\/span><\/li><li><span class=\"S1PPyQ\">Suicidal thoughts.<\/span><\/li><li><span class=\"S1PPyQ\">Eating and sleeping disorders.<\/span><\/li><li><span class=\"S1PPyQ\">Loss of interest in activities they used to enjoy.<\/span><\/li><li><span class=\"S1PPyQ\">Addiction and consumption of tobacco, alcohol and\/or drugs.<\/span><\/li><li><span class=\"S1PPyQ\">Headaches and stomachaches.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b210ffa elementor-widget elementor-widget-heading\" data-id=\"b210ffa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">How to identify cyberbullying?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b466881 elementor-widget elementor-widget-text-editor\" data-id=\"b466881\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"_04xlpA direction-ltr align-justify para-style-subtitle\"><span class=\"S1PPyQ\">Next, the signs will be presented to identify if someone is suffering from cyberbullying.<\/span><\/p><p class=\"_04xlpA direction-ltr align-justify para-style-subtitle\">\u00a0<\/p><ul><li><span class=\"S1PPyQ\">Change of actitud.<\/span><\/li><li><span class=\"S1PPyQ\">Change of attitude.<\/span><\/li><li><span class=\"S1PPyQ\">Showing yourself unmotivated to carry out daily activities.<\/span><\/li><li><span class=\"S1PPyQ\">Sudden deterioration of social relationships.<\/span><\/li><li><span class=\"S1PPyQ\">Feeling sad and depressed when checking your social networks.<\/span><\/li><li><span class=\"S1PPyQ\">Close social media profiles.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7971d61 elementor-widget elementor-widget-heading\" data-id=\"7971d61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What can I do if someone harasses me online?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d67bb05 elementor-widget elementor-widget-image\" data-id=\"d67bb05\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/06\/BANNER-WEBINAR-TODOS-9-1536x864.png-1024x576.webp\" class=\"attachment-large size-large wp-image-3146\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/06\/BANNER-WEBINAR-TODOS-9-1536x864.png-1024x576.webp 1024w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/06\/BANNER-WEBINAR-TODOS-9-1536x864.png-600x338.webp 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/06\/BANNER-WEBINAR-TODOS-9-1536x864.png-300x169.webp 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/06\/BANNER-WEBINAR-TODOS-9-1536x864.png-768x432.webp 768w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/06\/BANNER-WEBINAR-TODOS-9-1536x864.png.webp 1536w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46e1dac elementor-widget elementor-widget-text-editor\" data-id=\"46e1dac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li><span class=\"S1PPyQ\">Report accounts that harass you.<\/span><\/li><li><span class=\"S1PPyQ\">Collect evidence (text messages and social media screenshots) to show what is happening.<\/span><\/li><li><span class=\"S1PPyQ\">Complaint. The harasser is likely to continue his violent attitudes towards other people, so it is important to demonstrate that the harasser's behavior is unacceptable.<\/span><\/li><li><span class=\"S1PPyQ\">If you feel threatened, contact local police or emergency services. You can call:<\/span><\/li><\/ul><p class=\"_04xlpA direction-ltr align-justify para-style-subtitle\">\u00a0<\/p><p class=\"_04xlpA direction-ltr align-justify para-style-subtitle\"><span class=\"S1PPyQ\">Cyber Police of the National Security Commission: to the telephone number 088, which operates 24 hours a day, 365 days a year. You can also make complaints through the Twitter account @CEAC_CNS, the email ceac@cns.gob.mx, and the PF M\u00f3vil application, available for all cell phone platforms.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5eab04b elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"5eab04b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8507ec6\" data-id=\"8507ec6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5699edf elementor-widget elementor-widget-heading\" data-id=\"5699edf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><b>bibliographic references<\/b><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-645eb12 elementor-widget elementor-widget-text-editor\" data-id=\"645eb12\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li>https:\/\/espanol.stopbullying.gov\/acoso-escolar-mkc4\/efectos#:~:text=Depresi%C3%B3n%20y%20ansiedad%2C%20aumento%20de,prolongarse%20hasta%20la%20edad%20adulta.<\/li><li>https:\/\/www.universidadviu.com\/pe\/actualidad\/nuestros-expertos\/bullying-consecuencias-en-la-victima-y-el-agresor<\/li><li>https:\/\/www.iberdrola.com\/compromiso-social\/que-es-ciberacoso-como-prevenir#:~:text=Cada%20ni%C3%B1o%20lo%20vive%20de,puede%20conducirlos%20a%20una%20depresi%C3%B3n.<\/li><li>https:\/\/www.un.org\/es\/chronicle\/article\/el-ciberacoso-y-sus-consecuencias-para-los-derechos-humanos<\/li><li>https:\/\/www.unicef.org\/es\/end-violence\/ciberacoso-que-es-y-como-detenerlo<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d5cfb78 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"d5cfb78\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-374443f\" data-id=\"374443f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-27ab2a3 elementor-widget elementor-widget-image\" data-id=\"27ab2a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-1024x576.png\" class=\"attachment-large size-large wp-image-3605\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-1024x576.png 1024w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-600x338.png 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-300x169.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-768x432.png 768w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-1536x864.png 1536w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-312df40 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"312df40\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b03bc27\" data-id=\"b03bc27\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5d4acee elementor-shape-circle elementor-grid-0 e-grid-align-center elementor-widget elementor-widget-social-icons\" data-id=\"5d4acee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"social-icons.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-social-icons-wrapper elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-facebook elementor-repeater-item-7974e07\" href=\"https:\/\/www.facebook.com\/redporlaciberseguridad\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Facebook<\/span>\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-facebook\"><\/i>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-linkedin elementor-repeater-item-3faa0ff\" href=\"https:\/\/www.linkedin.com\/company\/red-por-la-ciberseguridad\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Linkedin<\/span>\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-linkedin\"><\/i>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-youtube elementor-repeater-item-f3c2677\" href=\"https:\/\/www.youtube.com\/@redporlaciberseguridad\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Youtube<\/span>\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-youtube\"><\/i>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-twitch elementor-repeater-item-5ad851c\" href=\"https:\/\/www.twitch.tv\/redporlaciberseguridad\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Twitch<\/span>\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-twitch\"><\/i>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Consecuencias del acoso cibern\u00e9tico Actualmente las redes sociales son una herramienta de comunicaci\u00f3n que nos han permitido interactuar con las personas a distancia, crear comunidades de inter\u00e9s y compartir momentos especiales con los dem\u00e1s. Han sido un espacio en el cual las personas pasan el tiempo para entretenerse, distraerse y liberar el estr\u00e9s que provoca<\/p>","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[22],"tags":[],"class_list":["post-3142","post","type-post","status-publish","format-standard","hentry","category-noticias"],"_links":{"self":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts\/3142","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/comments?post=3142"}],"version-history":[{"count":0,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts\/3142\/revisions"}],"wp:attachment":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/media?parent=3142"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/categories?post=3142"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/tags?post=3142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}