wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

CYBERBULLYING: Negative comments!

profile
Shalom Serrao
Nov 05, 2022
1 Like
0 Discussions
181 Reads

Words can make or break a person. Negative comments can only cause hazardous impact on people. 

First let us begin to understand what is meant by a negative comment? Negative comment in this context means comments that are toxic and can cause harm to people. These comments can cause a mental or physical breakdown and is responsible for issues like depression, anxiety and sometimes may trigger panic attacks. They are known to cause a huge amount of suicide cases and may cause self harm or suicidal thoughts in some people's minds.

It is easy to sit behind the keybord, with the safety on accounts that are anonymous and type comments with words like, "Go kill yourself", "die", " not good enough" etc. But these words can  tear a person down and trigger the receiving subject to cause harm to themselves. The frustration that people feel should not be taken out on other people in the form of comments. If something isn't to your liking, it can be expresssed in a way which does not cause harm or hurts sentiments.

If something nice cannot be said and you know the comment can harm the self-esteem or hurt the front person, it is not needed to express your opinion and feelings with words. Instaed you must just scroll away!

Online death threats can and should be reported to the Police under the Cyber Crime Department. Action should be taken to stop words like, "better kill youself", "go die", etc. to not be in the comments. It is necessary to let let the negative commentators to know that all of their actions have consequences. 

Negative comments or Hate comments are seen as the norm nowadays. But unless no strict legal action is taken against them, they will continue to bully people online without a pass. We must strive to preserve the metal health of ourselves and others by taking a small action i.e. not posting and reporting comments.


Comments ()


Sign in

Read Next

Dal Bafla Recipe

Blog banner

Memory Management

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

Office Lunch Problems in Mumbai and How Tiffin Services Solve Them

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

Assignment 2

Blog banner

"Mahakali cave"

Blog banner

Tableau

Blog banner

Virtual Machine

Blog banner

Life lesson

Blog banner

OPERATING SYSTEM

Blog banner

The Benefits of Practical Life Activities in Preschool

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner

Why Data Security Is Important

Blog banner

american greatines

Blog banner

How To Invest in Indian Stock Market For Beginners. ~ Tutorial 2 (NSDL And CSDL) Continued...

Blog banner

geographic information system (GIS)

Blog banner

E-commerce

Blog banner

Social engineering in cyber security

Blog banner

Modern operating system

Blog banner

My First Dream Bike

Blog banner

THE DESIRE OF MANY

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

Security requirements for Safe E-Payments

Blog banner

Zero-Day Attack

Blog banner

Developments in Modern Operating Systems

Blog banner

Fitness regime by Deepesh

Blog banner

Segmentation and paging concept

Blog banner

Financial Fraud Detection

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

Os Virtual Memory

Blog banner

Deadlock

Blog banner

Man In The Middle Attack

Blog banner

Malicious softwares

Blog banner

Modern Operating System

Blog banner

GUIDE TO GIS

Blog banner

Place to visit in pune

Blog banner

Odoo

Blog banner

MOVEMBER

Blog banner

IT RISK

Blog banner

From Loom to Luxury: How Patola Elevates Modern Wardrobes

Blog banner

INTRANET

Blog banner