wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

CYBERBULLYING: Negative comments!

profile
Shalom Serrao
Nov 05, 2022
1 Like
0 Discussions
181 Reads

Words can make or break a person. Negative comments can only cause hazardous impact on people. 

First let us begin to understand what is meant by a negative comment? Negative comment in this context means comments that are toxic and can cause harm to people. These comments can cause a mental or physical breakdown and is responsible for issues like depression, anxiety and sometimes may trigger panic attacks. They are known to cause a huge amount of suicide cases and may cause self harm or suicidal thoughts in some people's minds.

It is easy to sit behind the keybord, with the safety on accounts that are anonymous and type comments with words like, "Go kill yourself", "die", " not good enough" etc. But these words can  tear a person down and trigger the receiving subject to cause harm to themselves. The frustration that people feel should not be taken out on other people in the form of comments. If something isn't to your liking, it can be expresssed in a way which does not cause harm or hurts sentiments.

If something nice cannot be said and you know the comment can harm the self-esteem or hurt the front person, it is not needed to express your opinion and feelings with words. Instaed you must just scroll away!

Online death threats can and should be reported to the Police under the Cyber Crime Department. Action should be taken to stop words like, "better kill youself", "go die", etc. to not be in the comments. It is necessary to let let the negative commentators to know that all of their actions have consequences. 

Negative comments or Hate comments are seen as the norm nowadays. But unless no strict legal action is taken against them, they will continue to bully people online without a pass. We must strive to preserve the metal health of ourselves and others by taking a small action i.e. not posting and reporting comments.


Comments ()


Sign in

Read Next

Some facts about Technology

Blog banner

What is the point of living if we can die at any moment of our lives ?

Blog banner

memory managment

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

File management

Blog banner

computer security

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

Virtual memory in os

Blog banner

Outlook mail

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

How covid-19 impacted Social media ad spend forecast globally

Blog banner

Mail merge

Blog banner

Security Issues and Countermeasures

Blog banner

Cache memory

Blog banner

Caching windows

Blog banner

Practical Implementation of Client Server model using TCP/IP.

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

DIGITAL ECONOMY

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

E-security systems | CCTV

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

Why is online marketing is important in current scenario

Blog banner

Process Description

Blog banner

Service Catalogue Management

Blog banner

THREADS (assignment 1)

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

Fun Christmas Activities For Toddlers & Kids

Blog banner

Exploring the Power of Encase Forensic Tools: Unraveling Digital Mysteries

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

Data Security must be your Priority!

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

Technical SEO : Total Guide

Blog banner

Principal of concurrency

Blog banner

Strengthening Active Directory Security

Blog banner

STARVATION

Blog banner

Cloud Computing: Threats and Vulnerabilities

Blog banner

Virtual machine

Blog banner

HubSpot

Blog banner

Senseless Teeths

Blog banner

Ransomware

Blog banner

Artical on FreshBooks

Blog banner

Article on IT development trends

Blog banner