27.2 C
Monday, March 20, 2023


- Advertisement -spot_imgspot_img
- Advertisement -spot_imgspot_img

The great advancement and expansion in information and communication evident in the Internet, social media, and other forms of communications including digitization implies that we can all communicate in a much easier way. This includes bulk documents as an attachment as well as accessing bulk books, periodicals, and reports at our convenience, making bank transactions and other payments, receiving and sending money in bulk. These high-end cloud services have led to the establishment of a state-of-the-art data and management systems in compliance with international and best practices. This obviously places us all in the league of respectable ladies and gentlemen. We at The Counsel-ling Magazine take note and hence this Special Edition.


A parallel problem with cyber and the Internet is the renewed invasion of privacy as cybernetworks and the improved information technology including Internet connections provide us with an opportunity to link with others. There is, therefore, the unending crisis evident in the invasion of our privacy, including our computers, mobile phones, emails, and bank accounts and the hacking of companies, institutions, and organizations. The worst attacks are on children and other vulnerable groups including the physically challenged and older persons.

Modern Internet and Living: Cyberbullying and Safety on the Internet

Cyberbullying can be via the phone or by a computer. There are general and specific cyberbullying behaviours and the bullying can be covert or overt. Cyberbullying includes sets of harassment, flaming, trickery, denigration, impersonation, outing, exclusion, and cyberstalking. These can be summarised in four ways as follows:

  1. Written or verbal behaviours. These include phone calls, text messages, emails, instant messaging, chats, blogs, social networking communities, and websites.
  2. Visual behaviours. These include posting, sending, or sharing compromising pictures and videos through mobile phones or Internet.
  3. Exclusion. This is deliberately excluding someone from an online group or conversation.
  4. Impersonation. This involves stealing and revealing personal information. In addition, it may involve using another person’s name and account.

It is imperative that we protect ourselves, family and children from cyberbullying and other forms of harassment.

- Advertisement -spot_imgspot_img
Dr. Geoffrey Wangohttps://counsel-lingmagazine.co.ke/
Many people often ask me about my personal stand, my passion in life and how I got into Counselling Psychology and why in particular the establishment and writing in their favourite publication, The Counsel-ling Magazine. Colleagues and students, participants in various seminars and others suggested that I should include some information that would assist clients, practitioners and students to perhaps establish a career, or even assess and evaluate their ethical, moral and professional standards. Well, this allows for personal reflection and I feel it wise to include a few remarks about my fervour on counselling, mentoring and education as well as various aspects of life.
Latest news
- Advertisement -spot_img
Related news
- Advertisement -spot_img


Please enter your comment!
Please enter your name here