Internet is a great channel for connecting, accessing information and collaborating but the users, young and old, need to follow certain rules to remain safe in the online world. Every user of the Internet has a digital footprint, or a trail of data including the websites visited, the emails sent, and information submitted to online services. Consider the trail of data you are leaving behind. Remember that you are leaving your digital footprint before sending a scathing email, since the message might remain online forever. Be more discerning in what you publish on social media websites. While you can often delete content from social media sites, once digital data has been shared online, there is no guarantee you will ever be able to remove it from the Internet.
Not everything online is trustworthy
Safe use of technology can be empowering. Online risks and threats can have far reaching effects.
Strangers, or even people who are known, build an emotional connection with a child and young person online or face-to-face to gain their trust for the purposes of sexual abuse or exploitation. Many children and young people begin to feel that a special friendship or relationship is developing and do not understand that they are being groomed.
The perpetrators are known to use several methods to entice the child:
Internet has also emerged as a means to exploit children sexually, resulting in practices termed as “online”, “ICT-facilitated” or “cyber-enabled” child sexual exploitation, which include all acts of a sexually exploitative nature carried out against a child that have, at some stage, a connection to the online environment. It includes any use of ICT that results in sexual exploitation or causes a child to be sexually exploited or that results in or causes images or other material documenting such sexual exploitation to be produced, bought, sold, possessed, distributed, or transmitted.
This notion can thus encompass (but is not limited to):
Fraudsters obtain personal information, including address, email address, previous addresses, mother’s maiden name, place of birth, pin number, bank account details, Aadhaar number and passwords and use it in an unauthorized way for their personal gain. Such information is often required by companies or service providers as part of their verification process.
By getting hold of some information, they can access other information about the potential victim and make unauthorized financial transactions using the victim’s credit card or bank account, commit other crimes, such as entering (or exiting) a country illegally, trafficking drugs, smuggling other substances, committing cyber-crimes, laundering money and much more. In fact, they can use the victim’s identity to commit almost any crime imaginable in his or her name.
If a criminal has used another person’s identity to commit a crime, this can put the victim under police suspicion. The victim may find themselves being investigated as part of a criminal investigation, and in some cases they may find it difficult to prove their innocence.
The victims of financial fraud can also have a lot of issues come their way. If your details have been used in any form of monetary transaction, you could end up being saddled with debts. In most cases, if you can prove that the debts are not your responsibility, then you will not be liable for them. However, proving that you are not at fault can be difficult and time-consuming.
Cyberbullying is when someone uses technology (such as the internet or a mobile phone) to bully others. Being a victim of cyberbullying can be very distressing for a young person as most of the time they don’t know who is bullying them.
Cyberbullying includes things such as sending nasty text messages or emails, or setting up a hate group on a social networking site. The bullying may also happen 24/7 and the victim is often targeted even when they are in the comfort of their own home. Images and text messages can be circulated very quickly and widely on the internet which makes it very hard to combat cyberbullying.
Read in order from younger to older age groups
Last Modified : 3/2/2020
This section covers about Computer Threats, Attack...
This topic provides information about Cyber Harass...