Skip to main content

Cyber Bullying : Be careful... Once its said, the web is fed...!!

Hello Friends, 
Today I bring a very serious topic of Cyber-bullying which is major concern in the society and corporate as well. 

What is bullying ?

Bullying means any unwanted, aggressive behaviour among school/college aged children or teen that involves a real or perceived power imbalance. The behaviour is repeated, or has the potential to be repeated, over time. Both kids who are bullied and who bully others may have serious, lasting problems

Image result for cyber bullyingWhat is Cyberbullying?


Cyberbullying is bullying  using electronic technology. Electronic technology includes devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat, and websites.

Examples of cyberbullying :

  • to send mean(vulgar) text messages or emails
  • to spread rumours by email or posted on social networking sites, 
  • sending embarrassing pictures, videos, websites
  • to make fake profiles.

Why Cyberbullying is Different? 


Cell phones and computers themselves are not to blame for cyberbullying. Social media sites can be used for positive activities, like connecting kids with friends and family, helping students with school, and for entertainment. But these tools can also be used to hurt other people. Whether done in person or through technology, the effects of bullying are similar.

Effects of Cyberbullying

  • Use alcohol and drugs
  • Skip school
  • Experience in-person bullying
  • Be unwilling to attend school
  • Receive poor grades
  • Have lower self-esteem
  • Have more health problems


How to Prevent from Cyberbullying? 

  • Be Aware of What Your Kids are Doing Online
  • Talk with your kids about cyberbullying and other online issues regularly. Know the sites your kids visit and their online activities. Ask where they’re going, what they’re doing, and who they’re doing it with.
  • Tell your kids that as a responsible parent you may review their online communications if you think there is reason for concern. Installing parental control filtering software or monitoring programs are one option for monitoring your child’s online behavior, but do not rely solely on these tools.
  • Have a sense of what they do online and in texts. Learn about the sites they like. Try out the devices they use.
  • Ask for their passwords, but tell them you’ll only use them in case of emergency.
  • Ask to “friend” or “follow” your kids on social media sites or ask another trusted adult to do so.
  • Encourage your kids to tell you immediately if they, or someone they know, is being cyberbullied. Explain that you will not take away their computers or cell phones if they confide in you about a problem they are having.
  • Establish rules about appropriate use of computers, cell phones, and other technology. For example, be clear about what sites they can visit and what they are permitted to do when they’re online. Show them how to be safe online.
  • Encourage kids to think about who they want to see the information and pictures they post online. Should complete strangers see it? Real friends only? Friends of friends? Think about how people who aren’t friends could use it.
  • Tell kids to keep their passwords safe and not share them with friends. Sharing passwords can compromise their control over their online identities and activities.


Comments

Post a Comment

Popular posts from this blog

CIA Triad for- Base of Information security

The essential security principles of confidentiality, integrity, and availability are often  referred to as the  CIA Triad. All security controls must address these principles. These three  security principles serve as common threads throughout the CISSP CBK. Each domain  addresses these principles in unique ways, so it is important to understand them both in  general terms and within each specific domain: Confidentiality is the principle that objects are not disclosed to unauthorized subjects. Integrity is the principle that objects retain their veracity and are intentionally modified by  authorized subjects only. Availability is the principle that authorized subjects are granted timely access to objects  with sufficient bandwidth to perform the desired interaction. Different security mechanisms address these three principles in different ways and offer varying  degrees of support or application of these principles. Objects must be properly classified

List of Company Slogans

·          3M : "Innovation" ·          Agere Systems : "How Communication Happens" ·          Agilent : "Dreams Made Real" ·          Airbus : "Setting the Standards" ·          Amazon.com : "…and You're Done" ·          AMX : "It's Your World. Take Control" ·          Anritsu : "Discover What's Possible ·          AT&T : "Your World. Delivered" ·          ATG Design Services : "Circuit Design for the RF Impaired" ·          ATI Technologies : "Get In the Game" ·          BAE Systems : "Innovating for a Safer World" ·          Ball Corporation : "The Leader in Small Space and Rocket Systems" ·          BellSouth : "Listening, Answering" ·          Blackhawk : "Powering DSP Development" ·          Boeing : "Forever New Frontiers" ·          Bose Corporation : "Better Sound Through Research" ·          Bowers & Wil

My Article :- હેકર બનવું છે? કઈ રીતે?

મારી ૨ વર્ષ ની કારકિર્દી માં મને કેટલાય  લોકોએ, ખાસ કરીને કોલેજ ના વિદ્યાર્થીઓએ ઘણી વાર પૂછ્યું છે કે "મારે હેકર બનવું છે. તો હું શું કરું? " અને મારા બ્લોગ્સ માં પણ પૂછવામાં આવે છે કે એક સારો હેકર કઈ રીતે બની શકાય? એવું હું શું કરું અથવા તો મારા માં કઈ લાયકત હોવી જોઈએ એક હેકર બનવા માટે? આ પ્રશ્ન નો સંતોષકારક જવાબ આપવા માટે મેં internet પર શોધખોળ કર્યા પછી મને જે કઈ માહિતી મળી તેને હું આજે અહી રજુ કરું છું. મિત્રો, સૌપ્રથમ હેકર કઈ રીતે બનવું એ જાણવા પહેલા એ જાણવું જરૂરી છે કે ખરેખર હેકિંગ શું છે ? અને હેકર કોને કહેવાય. હેકિંગ ની સીધી અને સરળ વ્યાખ્યા નીચે મુજબ છે.  "તમારા કમ્પ્યુટર,નેટવર્ક(ઈન્ટરનેટ કે LAN દ્વારા) કે કોઈ ડીવાઈસ માં (ફોન, ટેબ્લેટ) માં કરવામાં આવતા ગેરકાયદેસર પ્રવેશ અને ઉપયોગ એ હેકિંગ કહેવાય છે."અને હેકિંગ કરતા લોકોને હેકર કહેવાય છે. હવે તમને થશે કે આવું શું કામ કરવું જોઈએ? આ તો ક્રાઈમ છે. તો તમને જણાવી દઉં કે હેકર મુખ્યત્વે ૨ પ્રકારના હોય છે.    વાઈટ હેટ હેકર્સ (એથીકલ હેકર્સ) : ધારો કે તમે તમારો ફેસબુક નો પાસવર્ડ ભૂલી ગયા(ખરેખર ના ભૂલતા ક્યારેય..)કે ત