Respect Girls on Internet

Friday, August 14, 2015

30: Instant messaging (IM)

Young people chat online more than anything else. They use many different free instant messaging tools like facebook, messanger, viber, whatsapp, hike are examples.
They communicate with friends, parents and teachers. Some tools allow instant voice, and photos and videos. Cyberbullying, cyberstalking and harassment often occur using I m applications .It is also possible them to send inappropriate messages as well as sending wrong message to wrong person creating problems.


If they are not careful they may be sending viruses. When things go wrong it’s harder to trace IM than an e-mail as they don’t use the traditional headers used by e-mail. IM accounts, like many free web-based e-mail accounts, can be open by anyone and shut down fast. No proof of who you really are is required. And, while chat rooms often receive the biggest blame for online sexual predators,

Banning use of IM is not an option as young people would feel isolated from their friends. They wouldn’t know what is going on in their community. It’s much better to screen out strangers and students not to respond when a stranger says “Hi” .Block and report any misuse as well.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

සිංහල தமிழ்

Blog Archive

  • ►  2018 (1)
    • ►  February (1)
  • ►  2016 (4)
    • ►  November (2)
    • ►  July (1)
    • ►  May (1)
  • ▼  2015 (67)
    • ▼  August (67)
      • 66. Avoid Trolling
      • 65. Balance your online time
      • 64. Help and Resources
      • 63. Many other scams are there
      • 62. Earn money at home scams
      • 61. They will steal your money in the bank
      • 60. They will steal your email password
      • 59. Don't trust emails
      • 58 How to avoid email virus threats
      • 57. Keep your firewall always on
      • 56. How to protect your computer from virus attacks?
      • 55. Symptoms of a virus infection
      • 54. Computer Viruses and Malaware
      • 53. Keep your family safe online
      • 52. When you are buying online
      • 51. Anti Virus Programs
      • 50. Use msconfig to clean virus
      • 49. Keep your device clean
      • 48. Secure your passwords
      • 47. Google Account Activity
      • 46. Google Talk & Circles
      • 45. Google security and privacy
      • 44. Phishing
      • 43. Is your data secure with Facebook ?
      • 42. Spam in Facebook
      • 41 Two step verification
      • 40. Login in and Logout from Facebook
      • 39. How to keep your account secure ?
      • 38. Facebook Advertisements
      • 37. Facebook Search , Likes and Comments
      • 36. Your friend list on facebook
      • 35. Is someone bothering you on facebook?
      • 34. Facebook Tagging
      • 33. How to see what you share on Facebook
      • 32. What do they see about you on facebook
      • 31 : Your Facebook Account
      • 30: Instant messaging (IM)
      • 29. How to guess fake accounts
      • 28. Fake accounts
      • 27. Tips for online users
      • 26. Test : Are you a cyberbully?
      • 25. When Cyber bullying is reported
      • 24. How to eliminate cyber harassment?
      • 23. Bullying can happen anywhere
      • 22. Effects of Cyber Bullying
      • 21. Who are bullying others?
      • 20. How to identify Cyber Bullies?
      • 19. Examples of cyberbullying
      • 18. What schools need to do?
      • 17. How to handle online conflicts?
      • 16. Social Network Rules
      • 15. Follow these email rules
      • 14. Who sent that email ? and why ?
      • 13. You have privacy rights
      • 12. How to respond Cyber Harrasment
      • 11. Cyber Stalking Examples
      • 10. Types of Cyber Stalkers
      • 09. Cyber Stalking Examples
      • 08. Types of Cyber Stalkers
      • 07. Who are cyber stalkers?
      • 06. What motivates cyber harassment?
      • 05. Types of cyber stalking
      • 04. What is cyber stalking?
      • 03. What is Cyber Harassment ?
      • 02. Story of the Internet
      • 01.Story of Sandya
      • Draft Handbook of Cyber Privacy & Security for You...

Total Pageviews

Search This Blog

Report Abuse

Popular Posts

  • Cyber Privacy , Safety & Security Handbook
    The INTERNET  is the most benefiting invention of the society known to us. The openness and world wide connectivity also has made internet...
  • 04. What is cyber stalking?
    Cyber stalking is a technology based “attack” on one person specially for reasons of anger, revenge or taking control. It can take many for...
  • 41 Two step verification
    You can set two step verification by turning  on login approvals When a login is attempted from a different computer or phone or brow...

Blog Archive


  • 01.Story of Sandya
  • 02. Story of the Internet
  • 03. What is Cyber Harassment ?
  • 04. What is cyber stalking?
  • 05. Types of cyber stalking
  • 06. What motivates cyber harassment?
  • 07. Who are cyber stalkers?
  • 08. Types of Cyber Stalkers
  • 09. Cyber Stalking Examples
  • 10. Types of Cyber Stalkers
  • 11. Cyber Stalking Examples
  • 12. How to respond Cyber Harrasment
  • 13. You have privacy rights
  • 14. Who sent that email ? and why ?
  • 15. Follow these email rules
  • 16. Social Network Rules
  • 17. How to handle online conflicts?
  • 18. What schools need to do?
  • 19. Examples of cyberbullying
  • 20. How to identify Cyber Bullies?
  • 21. Who are bullying others?
  • 22. Effects of Cyber Bullying
  • 23. Bullying can happen anywhere
  • 24. How to eliminate cyber harassment?
  • 25. When Cyber bullying is reported
  • 26. Test : Are you a cyberbully?
  • 27. Tips for online users
  • 28. Fake accounts
  • 29. How to guess fake accounts
  • 30: Instant messaging (IM)
  • 31 : Your Facebook Account
  • 32. What do they see about you on facebook
  • 33. How to see what you share on Facebook
  • 34. Facebook Tagging
  • 35. Is someone bothering you on facebook?
  • 36. Your friend list on facebook
  • 37. Facebook Search , Likes and Comments
  • 38. Facebook Advertisements
  • 39. How to keep your account secure ?
  • 40. Login in and Logout from Facebook
  • 41 Two step verification
  • 42. Spam in Facebook
  • 43. Is your data secure with Facebook ?
  • 44. Phishing
  • 45. Google security and privacy
  • 46. Google Talk & Circles
  • 47. Google Account Activity
  • 48. Secure your passwords
  • 49. Keep your device clean
  • 50. Use msconfig to clean virus
  • 51. Anti Virus Programs
  • 52. When you are buying online
  • 53. Keep your family safe online
  • 54. Computer Viruses and Malaware
  • 55. Symptoms of a virus infection
  • 56. How to protect your computer from virus attack...
  • 57. Keep your firewall always on
  • 58. How to avoid email virus threats
  • 59. Don't trust unknown emails
  • 60. They will steal your email password
  • 61 They will steal your money in the bank
  • 62 Earn money at home scams
  • 63. Many other scams are there
  • 64. Avoid Trolling
  • 64. Balance your online time
  • 66. More Help and Resources
  • Home
  • The Initiative
  • SL Design Hack

Contributors

  • Niranjan Meegammana
  • Pooh93
  • prabhashana
  • yes
RSS Feed Widget

Cyber Privacy , Safety & Security Handbook

Theme images by molotovcoketail. Powered by Blogger.