By Grace Kauli & Kayleen Misah
Dealing with Cyber harassment and other cybersecurity concerns
Introduction
In the digital era, Cyber harassment and security concerns on Facebook has become one of the most pressing issues affecting many young users nationwide. According to Maras (2016) as cited in UNODC, Cyber harassment involves the use of ICT to intentionally humiliate, annoy, attack, threaten, alarm, offend and/or verbally abuse individual. It can take various forms such as cyber-bullying, false pretense and privacy violations (Smith et al., 2023).These issues raise security concerns highlighting the need for practical measures to ensure a safe space while engaging on the platform.
Image source: Kelp websiteUnderstanding Cyber harassment
Unlike traditional harassment, cyber harassment can be persistent, spreading faster to a wider audience, extending across multiple platforms in the span of a day. Citron (2014) further elaborates that online harassment can be continuous and widely disseminated making it difficult or impossible to escape because it will affect all areas of a victim`s digital life. It can further lead to victims experiencing anxiety, depression and fear as a result of continuous harassing online (Tokunaga, 2010). For example, a news article published by Post Courier on the 26th of May, 2021 stated that 5 to 21% of girls and women in Papua New Guinea are dealing with cyber-bullying by men which led to victims taking their own lives because of stigma faced in the community. This actions are very serious therefore Facebook users must take heed of what they share online.
Other forms and Impact of Cyber harassment
Furthermore, Divine Word University`s Director of the Centre for Learning and Teaching, Mr. Picky Airi, states that Facebook is not restricted to any individual in terms of creating an account. Hence, allowing people to create fake accounts and access private information from other users intentionally through scamming and identity theft. As stated one of the most common cyber threats is identity theft, where criminals gain unauthorized access to personal accounts, leading to financial losses and privacy violations (Lee, 2022). Therefore, users online, especially Facebook are urged to share limited posts or information that is not personal but interesting to everyone.
Practical security measures of Cyber harassment
Security threats on Facebook remain a major concern, as cyber-criminals exploit user`s weaknesses through hacking, scams, and malicious software. Protecting one’s digital identity requires proactive security measures, such as enabling two-factor authentication, creating strong passwords, and adjusting privacy settings (McDonald et al., 2016). Furthermore, users should remain cautious about suspicious links and unknown friend requests, as they may lead to security breaches (Florêncio & Herley, 2013).
Conclusion
Facebook continues to improve its security features and harassment prevention mechanisms, however, ongoing user awareness and responsible online behavior must remain crucial in maintaining safety. Implementing cybersecurity best practices and advocating for stronger platform regulations can contribute to a secure digital environment (Livingstone & Helsper, 2007). By working collectively to recognize and address cyber harassment and security concerns, users can foster a more respectful and protected online space.
References
Citron, D. K. (2014). Hate crimes in cyberspace. Harvard University Press.
Retrieved from: https://digitalcommons.law.umaryland.edu/books/91/
Florêncio, D., & Herley, C. (2013). The economics of online crime. Journal of Economic Perspectives, 27(3)
Retrieved from: https://pubs.aeaweb.org/doi/pdfplus/10.1257/jep.23.3.3
Lee, S. (2022). Protecting personal data in digital spaces. Journal of Cybersecurity Research,
Retrieved from: https://link.springer.com/chapter/10.1007/978-3-031-67268-2_6
Livingstone, S., & Helsper, E. J. (2007). Gradations in digital inclusion: Children, young people, and the digital divide. New Media & Society, 9(4)
Retrieved From: https://eprints.lse.ac.uk/2768/1/Gradations_in_digital_inclusion_%28LSERO%29.pdf
McDonald, A., Cranor, L. F., & Friedman, B. (2016). Privacy settings: User preferences and concerns. Proceedings of the 2016 ACM Conference on Human Factors in Computing Systems.
Post Courier (2021) Women, girls face Cyber bullying on social media.
Retrieved from: https://www.postcourier.com.pg/women-girls-face-cyber-bullying-on-social-media
Tokunaga, R. S. (2010). Following you home from school: A critical review and synthesis of research on cyber-bullying victimization. Computers in Human Behavior,
Retrieved from: https://doi.org/10.1016/jchb.2009.11.014

No comments:
Post a Comment