wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

CYBERBULLYING: Negative comments!

profile
Shalom Serrao
Nov 05, 2022
1 Like
0 Discussions
181 Reads

Words can make or break a person. Negative comments can only cause hazardous impact on people. 

First let us begin to understand what is meant by a negative comment? Negative comment in this context means comments that are toxic and can cause harm to people. These comments can cause a mental or physical breakdown and is responsible for issues like depression, anxiety and sometimes may trigger panic attacks. They are known to cause a huge amount of suicide cases and may cause self harm or suicidal thoughts in some people's minds.

It is easy to sit behind the keybord, with the safety on accounts that are anonymous and type comments with words like, "Go kill yourself", "die", " not good enough" etc. But these words can  tear a person down and trigger the receiving subject to cause harm to themselves. The frustration that people feel should not be taken out on other people in the form of comments. If something isn't to your liking, it can be expresssed in a way which does not cause harm or hurts sentiments.

If something nice cannot be said and you know the comment can harm the self-esteem or hurt the front person, it is not needed to express your opinion and feelings with words. Instaed you must just scroll away!

Online death threats can and should be reported to the Police under the Cyber Crime Department. Action should be taken to stop words like, "better kill youself", "go die", etc. to not be in the comments. It is necessary to let let the negative commentators to know that all of their actions have consequences. 

Negative comments or Hate comments are seen as the norm nowadays. But unless no strict legal action is taken against them, they will continue to bully people online without a pass. We must strive to preserve the metal health of ourselves and others by taking a small action i.e. not posting and reporting comments.


Comments ()


Sign in

Read Next

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

Virtual memory

Blog banner

Firewall / IDS Evasion Techniques

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

CyberSecurity Color Wheel

Blog banner

Types of Malware in Cyber Security

Blog banner

Smart Shoephone: Is that technology overdose!?

Blog banner

How to make Pancakes

Blog banner

Memory management and virtual memory

Blog banner

Record Blocking

Blog banner

Senseless Teeths

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

Article on team management software

Blog banner

Web Site

Blog banner

Travel: Everything Everywhere!

Blog banner

Session Vulnerabilities

Blog banner

All you need to know about “On-page SEO”

Blog banner

RAID and It's Levels

Blog banner

Risk mitigation and management

Blog banner

Paging

Blog banner

Business Engineering

Blog banner

MIDDLE CLASS MELODIES!!

Blog banner

Mobile Survey

Blog banner

Topic: Sessions in Operating system

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

Characteristics of Etherum

Blog banner

Bit Coins

Blog banner

Eating Well With Meal Maharaj on Busy Workdays Without Cooking

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Mobile Security

Blog banner

Os Virtual Memory

Blog banner

Operating system

Blog banner

Proof-of-Stake (PoS)

Blog banner

Supervised and unsupervised learning

Blog banner

Multiple processor scheduling

Blog banner

Service Design Model

Blog banner

Know your Processors!

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

Security in Cloud Computing

Blog banner

Have You Explored India Yet?

Blog banner

Importance of modern technology era

Blog banner