wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

CYBERBULLYING: Negative comments!

profile
Shalom Serrao
Nov 05, 2022
1 Like
0 Discussions
182 Reads

Words can make or break a person. Negative comments can only cause hazardous impact on people. 

First let us begin to understand what is meant by a negative comment? Negative comment in this context means comments that are toxic and can cause harm to people. These comments can cause a mental or physical breakdown and is responsible for issues like depression, anxiety and sometimes may trigger panic attacks. They are known to cause a huge amount of suicide cases and may cause self harm or suicidal thoughts in some people's minds.

It is easy to sit behind the keybord, with the safety on accounts that are anonymous and type comments with words like, "Go kill yourself", "die", " not good enough" etc. But these words can  tear a person down and trigger the receiving subject to cause harm to themselves. The frustration that people feel should not be taken out on other people in the form of comments. If something isn't to your liking, it can be expresssed in a way which does not cause harm or hurts sentiments.

If something nice cannot be said and you know the comment can harm the self-esteem or hurt the front person, it is not needed to express your opinion and feelings with words. Instaed you must just scroll away!

Online death threats can and should be reported to the Police under the Cyber Crime Department. Action should be taken to stop words like, "better kill youself", "go die", etc. to not be in the comments. It is necessary to let let the negative commentators to know that all of their actions have consequences. 

Negative comments or Hate comments are seen as the norm nowadays. But unless no strict legal action is taken against them, they will continue to bully people online without a pass. We must strive to preserve the metal health of ourselves and others by taking a small action i.e. not posting and reporting comments.


Comments ()


Sign in

Read Next

Deadlock and Starvation

Blog banner

social media issue

Blog banner

MEMORY FORENSIC ACQUISITION AND ANALYSISOF MEMORY AND ITS TOOLS COMPARISON

Blog banner

TOP 5 GAMING GADGETS (2024)

Blog banner

Lucidchart

Blog banner

RAID - LEVELS OF RAID

Blog banner

Cyber Security Standards

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

Artical on FreshBooks

Blog banner

Linux VServer Architecture

Blog banner

File management in os

Blog banner

Product Discount Calculator

Blog banner

operating system

Blog banner

What is a Malware ?

Blog banner

COMMUNICATION

Blog banner

Balance

Blog banner

How can parents support a child’s mental health?

Blog banner

Multicore CPUs

Blog banner

Vikrant’s first blog

Blog banner

M commerce

Blog banner

Deadlock

Blog banner

Wedding photographer

Blog banner

Fitness

Blog banner

Deadlock

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

Service Operations in ITSM

Blog banner

Social Media Sentiment Analysis

Blog banner

What is a Dumpster Diving Attack?

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

5 People who claimed to have Time Traveled

Blog banner

Evolution of Operating Systems

Blog banner

Synchronization

Blog banner

FREE VERSION OF G-MAIL

Blog banner

Confidence Building Activities for the New School Year

Blog banner

Disk Management

Blog banner

What is OS and its overview

Blog banner

Security requirements for Safe E-Payments

Blog banner

Data Warehousing

Blog banner

Interrupts - Types, Working & Importance

Blog banner

Memory Management in an Operating System

Blog banner

Sagar Parikrama

Blog banner

GIS in Disaster Management

Blog banner