wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

CYBERBULLYING: Negative comments!

profile
Shalom Serrao
Nov 05, 2022
1 Like
0 Discussions
181 Reads

Words can make or break a person. Negative comments can only cause hazardous impact on people. 

First let us begin to understand what is meant by a negative comment? Negative comment in this context means comments that are toxic and can cause harm to people. These comments can cause a mental or physical breakdown and is responsible for issues like depression, anxiety and sometimes may trigger panic attacks. They are known to cause a huge amount of suicide cases and may cause self harm or suicidal thoughts in some people's minds.

It is easy to sit behind the keybord, with the safety on accounts that are anonymous and type comments with words like, "Go kill yourself", "die", " not good enough" etc. But these words can  tear a person down and trigger the receiving subject to cause harm to themselves. The frustration that people feel should not be taken out on other people in the form of comments. If something isn't to your liking, it can be expresssed in a way which does not cause harm or hurts sentiments.

If something nice cannot be said and you know the comment can harm the self-esteem or hurt the front person, it is not needed to express your opinion and feelings with words. Instaed you must just scroll away!

Online death threats can and should be reported to the Police under the Cyber Crime Department. Action should be taken to stop words like, "better kill youself", "go die", etc. to not be in the comments. It is necessary to let let the negative commentators to know that all of their actions have consequences. 

Negative comments or Hate comments are seen as the norm nowadays. But unless no strict legal action is taken against them, they will continue to bully people online without a pass. We must strive to preserve the metal health of ourselves and others by taking a small action i.e. not posting and reporting comments.


Comments ()


Sign in

Read Next

Privacy LAWs in IT

Blog banner

Deadlock

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

Blog banner

How Reading Books Shape a Child’s Imagination and Thinking?

Blog banner

GUIDE TO GIS

Blog banner

Visualization in Data Science

Blog banner

Tea, Coffee, Red Wine, and Teeth: A Stain Survival Guide

Blog banner

Security in Operating Systems

Blog banner

Deadlock

Blog banner

Data Lakes: A Key to Modern Data Management

Blog banner

Khau Galli – Vile Parle

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Virtual Memory

Blog banner

OPERATING SYSTEM

Blog banner

Biometric Authentication Vulnerabilities

Blog banner

Wreck

Blog banner

Cyber Security in Data Breaching

Blog banner

Security Issues and Countermeasures

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

Dos (Denial of service) Attack

Blog banner

Sweet and Sour Mango Pickle (Gol Keri)

Blog banner

Buffers in Operating Systems

Blog banner

WINDOWS I/ O

Blog banner

Are Social Media Paid Campaigns Worth It?

Blog banner

Types of Hackers

Blog banner

breakup? don't worry and learn how to get back your life!

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

India Digital Personal Data Protection Act, 2023

Blog banner

'Positivity in life'

Blog banner

Photorec - media recovery tool

Blog banner

Best password managers: Reviews of the top products

Blog banner

I/O buffer and its techniques

Blog banner

Escape

Blog banner

Save Environment

Blog banner

TECHNOLOGY : BOON OR CURSE ?

Blog banner

Health and fitness in technology

Blog banner

Service Operation

Blog banner

Time Series Analysis

Blog banner

Use case of K-means clustering

Blog banner

Information of meesho company

Blog banner

Data Mining

Blog banner