Page 53 - CyberSecurityEssentialsEnglish
P. 53

Introduction
       Children now have access to a tremendous quantity of knowledge and resources thanks to the Internet, which
       has opened up a world of opportunities for them. Unfortunately, as previously mentioned, there are several
       concerns and threats to children's safety and security on the Internet. Children are particularly vulnerable to
       cyberbullying, indecent content exposure, and other internet abuse. Furthermore, children may fall victim to
       identity theft or fraud if their personal information is hacked or stolen. It is essential to make sure that they
       are aware of the hazards of the online world, and have the skills and information they need to protect
       themselves, given the growing usage of technology and social media among kids. Therefore, we shall start by
       covering such threats and providing protective guidelines for parents to ensure their children's safety.

       Cyberbullying
       Cyberbullying is when an adolescent or younger kid threatens, humiliates, or otherwise harasses a peer via a
       computer or other electronic device. It might happen on a laptop, phone, tablet, or other electronic devices
       and could happen online in chat rooms, forums, social media, text messages, and email. As long as they have
       access to the Internet and a capable gadget, cyber bullies may do enormous harm to their victims at any time,
       almost anywhere. Also, because the behaviour doesn't involve confrontation like physical bullying, catching
       the perpetrators in time could be difficult.

       Forms of cyberbullying
       Parents can recognize these forms and learn about some of the safeguards which they can take to protect
       their kids online:


           ✓  Exclusion
               It occurs when the cyberbully or a group of cyberbullies excludes the victim from a chat room or an
               online conversation to hurt him.
           ✓  Catfishing
               It is the practice of a cyberbully developing a false online identity and posing as someone else. The
               bully can then interact with a victim, starting an online relationship, trying to build trust in order to
               get private information from the victim and then use it later on to humiliate him. Another known term
               for such behavior is “trickery”.
           ✓  Harassment
               Refers  to  the  constant  pattern  and  acts  that  the  bully  keeps  targeing  the  victim  with,  through
               repeatedly sending abusive internet messages, that may contain threats to him as well.
           ✓  Cyberstalking
               It is the practice of a cyberbully keeping a careful eye on their victim's internet activity. The victim and
               their loved ones may also come under false charges and threats from the bully.
           ✓  Outing (sometimes referred to as Doxing)
               It occurs when someone publicly discloses a person's gender identity or sexual orientation without
               his consent, to humiliate him.
           ✓  Fraping
               It  is one  form  of “impersonation”:  It  occurs when  someone  logs  into  the  victim’s  social network
               account, impersonates him, and posts improper stuff in his name.
           ✓  Trolling
               Is the practice of a cyberbully making hurtful things about them online to harm these people.




          51
   48   49   50   51   52   53   54   55   56   57   58