. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Categories
Technology

Cyber ​​Bullying: The Curse of New Age Technology

technology abuse

With the rise of technology, computers, laptops, tablets, and smartphones have become part of our daily lives. Today literally no one can stay without these devices. The communication sector has revolutionized in recent decades a kind of reduction of the entire world. The internet web has allowed the ends of the earth to connect with each other at the click of a button. Social media networks have further helped people to connect with each other from different parts of the world, get to know each other and establish a friendly bond for life. These sites and platforms have even helped people find long-lost friends and family and brought them back together. But along with the benefits, the new technology has also come with its curse. And that assumption is cyberbullying. It is a form of cyberbullying that is deliberately used in a hostile way to harass and threaten other people. With the increased use of technologies, cyber bullying is also on the rise.

The threat

This problem has become a growing threat, especially among teenagers. Cyberbullying includes the use of text messages or emails, rumors sent via email or posted on social networking sites, and embarrassing fake pictures, videos, websites, or profiles. People who are cyberbullied are sometimes also bullied in person. Also, sometimes it is quite difficult to escape from cyber bullying as the source is unknown and we cannot restrict it. It can happen 24/7 and can reach a person even when they are alone. Vulgar messages and photos can be posted anonymously and quickly spread to a very wide audience. It can be difficult and sometimes impossible to trace the source. Deleting inappropriate or annoying messages, texts and images is extremely difficult after they have been posted or sent.

the mind impact

Although social networking sites themselves do not promote such activities, they are used as a tool to carry out such horrendous work. Children and women are the main victims of cyberbullying. It can lead to a great negative impact on the mind. Teenagers or children who are victims of this heinous crime may experience behavioral changes such as sudden and extensive use of alcohol and drugs, tendency to skip school, experiencing in-person bullying, unwillingness to attend school, having poor grades, low self-esteem, and erratic health problems.

Another form of bully

Cyber ​​bullying is another form of cyber bullying. It can include false allegations, inconvenient observation, threats, identity theft and damage to data or equipment, solicitation of minors for sex, or information gathering to harass. Women are the main victims of cyberbullying.

The consequences

It can be just as threatening and frightening as any other type of crime even if there is no physical or verbal contact with the harasser. Victims of this crime may experience extreme psychological and emotional reactions. It can lead to changes in sleep patterns, depression, anxiety, anger, paranoia, shock, and disbelief.

Precautions and steps to follow

If someone is the victim of either of these two patterns of bullying, they should not keep it to themselves. The help of relatives, close friends or professional counselors copes with this problem. Legal help should be sought as this should be reported to the police cyber security cell departments so that the culprit can be tracked down and apprehended as soon as possible. Parents should be open with their children and monitor their social activities from time to time, especially if they are minors. Care should be taken to properly scrutinize and protect your email and personal data from being hacked and misused. Therefore, with a little caution and awareness, you can protect yourself and your loved ones from cyber bullying.

Leave a comment

Your email address will not be published. Required fields are marked *