The great advancement and expansion in information and communication evident in the Internet, social media, and other forms of communications including digitization implies that we can all communicate in a much easier way. This includes bulk documents as an attachment as well as accessing bulk books, periodicals, and reports at our convenience, making bank transactions and other payments, receiving and sending money in bulk. These high-end cloud services have led to the establishment of a state-of-the-art data and management systems in compliance with international and best practices. This obviously places us all in the league of respectable ladies and gentlemen. We at The Counsel-ling Magazine take note and hence this Special Edition.
SOCIAL MEDIA AND POPULAR WEBSITES
A parallel problem with cyber and the Internet is the renewed invasion of privacy as cybernetworks and the improved information technology including Internet connections provide us with an opportunity to link with others. There is, therefore, the unending crisis evident in the invasion of our privacy, including our computers, mobile phones, emails, and bank accounts and the hacking of companies, institutions, and organizations. The worst attacks are on children and other vulnerable groups including the physically challenged and older persons.
Modern Internet and Living: Cyberbullying and Safety on the Internet
Cyberbullying can be via the phone or by a computer. There are general and specific cyberbullying behaviours and the bullying can be covert or overt. Cyberbullying includes sets of harassment, flaming, trickery, denigration, impersonation, outing, exclusion, and cyberstalking. These can be summarised in four ways as follows:
- Written or verbal behaviours. These include phone calls, text messages, emails, instant messaging, chats, blogs, social networking communities, and websites.
- Visual behaviours. These include posting, sending, or sharing compromising pictures and videos through mobile phones or Internet.
- Exclusion. This is deliberately excluding someone from an online group or conversation.
- Impersonation. This involves stealing and revealing personal information. In addition, it may involve using another person’s name and account.
It is imperative that we protect ourselves, family and children from cyberbullying and other forms of harassment.