SlideShare a Scribd company logo
1 of 7
Healing Our Online-sickness by Cyber Path
S. Detchanamurthy, Assistant Professor,
Sri Venkateswara College of Education, Karaikal. Puducherry UT.
Abstract
Technology is a powerful weapon, which we can use to change the globe. Every
positive thing has a negative thing, but which must be shown and tells to the fellow
citizens, then only they will safeguard themselves from the problems. If anyone going
towards the level of convicting a crime, that must be punished by developing judicial
system. But here, after committed a crime or death, we wakes up and does our duty, that
too not for a long time. So everyone must know the etiquette of using technological
tools, internet, and social media. And even they must know cyber law and they must be
aware what is happening in and around them, instead of downing their heads towards
smart phones. This paper indicates that an approach is needed to better balance the
relationship between social media and academic study and it stresses about the urgent
need of 24 hours online counseling for today’s student’s welfare.
Keywords: Social media, Cyber Crime, Cyber law, CMC, Student Community
Introduction
If there is trial there is an error. Most of the thing we want to import from foreign
countries. Our citizens are want to build a maladjusted society by copying others
technology, thereby spoiling the minds of our young citizens and poor people. Not only
their minds, also their lives.
All are want immediate transformation or immediate pleasure. Especially youth
of today want to buy a mobile for their fame in social media or watching whatever they
want to see or for any reason. Nobody wants to see the printed Catalogues, instructions,
precautions, terms and conditions in the fastest world. The entire thing they want to learn
in trial and error basis. All are thinking readings of those matters are waste of time. And
they are asking, ‘is the instrument or software is user friendly?’ Those types of
instruments are only selling and giving gain to the manufacturers. All are habituated for
without knowing the consequences, started using the technological tools. Social media is
attractive; it not only provides college students another world to make friends, also
provides a good way to release pressure. To some degree, it absolutely affects the lives of
college students including the grades.
Particularly cyber crime cases were identified in our mother land due to the clash
between techno-culture in the globe and societal norms prevailing in India. Cyber
bullying, sexual harassment crimes by the usage of social media started showing its huge
ugly face due to its users.
Cyber Crime
The cyber crime has been a problem as early as the late 1970s. The first spam e-
mail took place in 1978 and the first virus was installed on an Apple Computer in 1982.
In 2006, about 2000 complaints relating to cyber crime were received and the major
reasons for such complaints were financial fraud, viruses and hackers. It has also been
found that there has been a constant increase in the number of children being exposed to
unwanted pornography, Internet harassment and bullying.
Cyber crime is emerging as a serious threat in the world. Governments as well as
Police and intelligence departments have started to react. Indian police has initiated
special cyber cells across the country and have started educating the people. Hence it is
very important that students should have awareness about the cyber crime.
To day when everywhere there is demand for change, it is computer as a nerve,
which is so appropriate and most versatile device. Its use is prevalent in every field. So
cyber crime awareness is required. Among the students there must be awareness about
issue like hacking, copyright theft, child pornography and pedophilia. The students
should be aware about the preventive measures of using computers and internet.
Failed Impulse Control
Kimberly young (1996) reported that using any computer network, like the
Internet, forms a habit in some people that could be compared to pathological gambling.
It involves “failed impulse control” without any intoxicant. After watching Internet users
for a long time, she developed criteria for assessing one’s dependence on the Internet.
Those who were addicted to the Internet often:
• “Felt preoccupied with the Internet; Felt a need to use the Internet with
increasing amounts of time in order to achieve satisfaction; had an
inability to control their Internet use.
• Felt restless or irritable when attempting to cut down or stop Internet use.
• Used the Internet way of escaping from problems or of involvement with
the Internet.
• Jeopardized or risked the loss of a significant relationship, job, educational
or career opportunity because of the Internet.
• Kept returning even after spending an excessive amount of money for
online fees.
• Went through withdrawal when offline.
• Stayed online longer than originally intended.”
Facebook Depression
Medical practitioners now observe depression in teenagers that is not brought on
by typical teen angst, but by Facebook. Researchers coin this symptom “Facebook
Depression,” and teens who experience it are at risk of isolation and depression and may
turn to inappropriate online resources that promote substance abuse, unsafe sexual
practices, or aggressive or destructive behaviors. Unless parents monitor their child’s
Facebook usage and ensuing behavior, they won’t know their child is depressed.
Source: Diagnosis: Social Media Syndrome (2011)
Retweet Depression
You are often thrown into bouts of manic depression when you discover that your
tweets have not been re-tweeted enough.
This depression often deepens when you find that your Tumblr posts have not been re-
blogged, or your Facebook status updates have not been liked.
Source: “Do You Need a Social Media Detox?” (2011)
Computers are banned
Google, Apple and Yahoo executives are sending their children to California’s
Waldorf schools, where computers are banned.
The masters of the e-universe appear convinced that computers “reduce attention spans
and inhibit creative thinking, movement and human interaction”. Classes have reverted to
using blackboards, chalk, pens, paper, books and even teachers.
Source: “The private school in Silicon Valley where tech honchos sends their kids so they
DON’T use computers”
Cyber law
Cyber law was the first step taken by the crime. According to Indian law cyber
crime has to be voluntary and willful, an act or omission that adversely affects a person
or property. Cyber law encompasses laws relating to cyber crimes, Electronic and digital
signatures, Intellectual property, data Protection and Privacy. The Indian Parliament
passed its first “Information technology Act, 2000” on 17th
October 2000 to deal with
cyber crime in the field of e-commerce, e-governance, e-banking as well as penalties and
punishments. The Information Technology (IT) Act, 2000, specifies the acts which have
been made punishable. Almost all developed and developing countries have established
rules and regulations to control the cyber crime. In India, the Information Technology
Act 2000 was undoubtedly a welcome a step at a time when there was no legislation in
this specialized field.
Most of the cyber crimes are not new. Criminals simply devise different ways to
undertake standard criminal activities such as fraud, theft, blackmail, forgery and
embezzlement using the new medium, often involving the Internet.
A computer can be the target of crime, for example, when a person intends to
steal information, or causing damage to, a computer or computer network (Svensson,
2011). The computer may be used as a tool in the following kinds of activity-financial
crimes, sale of illegal articles, pornography, online gambling, intellectual property crime,
email spoofing forgery, cyber defamation, cyber stalking etc.
Need of Counseling Service for Students
The Education Commission (1964-66) under the Chairmanship of D.S. Kothari
emphasized and recommended the inclusion of guidance and counseling services in
institution of higher education, to assist students in the choice of courses, and in dealing
with other emotional and psychological problems. Though the Education Commission
recommended it long before, yet no concrete step has been taken to translate it into
action.
Counseling service can be successfully applied when the students in general face
problems in their studies, emotional lives and personality adjustments. Every person
must have good mental health for achieving success in life. Now technology enables as to
recover our mental health by online counseling also.
Online-Counseling Outcome Studies
The main goal of counseling is to alleviate the distress, anxiety, or concerns
experienced by a client when he or she enters therapy. Counseling psychologists also
focus on building on a client’s strength to improve overall functioning. As a result, it is
important to directly examine whether online counseling is effective. In our review of the
literature, we found several studies that have directly examined the effectiveness of
computer-mediated communication (CMC) technologies such as synchronous chat,
asynchronous e-mail, and videoconferencing in delivering online-counseling and
behavioral services.
These results provided some initial support for the use of CMC in delivering
mental and behavioral health services, but it should be noted that individuals with severer
presenting issues, such as major depression or substance abuse, were screened out of the
study. It may be that the clients allowed participating were experiencing very little
distress before the study, and thus, CMC counseling may not have been as effective as
Face to Face counseling for severer clients.
Conclusion
Eric Schmidt of Google called on the assembled students “to please turn off the
thing for one whole hour a day”. “You cannot let technology rule you.” That was his
message and this radiates solicitude.
Internet Paradox i.e. a technology that would theoretically increase
communication could also have negative social and psychological effects. Exposure to
cyber crime was a theme prevalent in about 16% of the participants. These experiences
varied from cyber-bullying, stalking to hacking. A high risk of fraud is also involved on
SNS that puts valuable personal information at risk. SNS have been criticized for serving
as a breeding ground for cyber-bullying and harassment by strangers. Many studies
associate loneliness and depression with a pathological use of social networking. Lonely
users are more likely to seek emotional support online, find more satisfaction with online
versus offline friends, and experience more disturbances in their daily lives. It may be
true for individuals who were troubled, experienced high degree of stress, vulnerability
and instability. Thus, a therapeutic dimension is a small but essential part of these online
spaces.
References
• V. K. Kool, Rita Agarwal (2006), Applied Social Psychology, Atlantic
Publishers & distributors (P) Ltd., New Delhi.
• Wang, Qingya et al, (2011) The Effects of Social Media on College Students,
MBA Student Scholarship. Paper5 .http://scholarsarchive.jwu.edu/mba_student/5
• Brydolf, C. (2007). Minding My Space: Balancing the benefits and risks of
students' online social networks. Education Digest, 73(2), 4.
• Jacobsen, W. C., & Forste, R. (2011). The Wired Generation: Academic and
Social Outcomes of Electronic Media Use Among University Students.
• Sander Duivestein & Jaap Bloem, 2013 Sogeti VINT, Research Institute for
New Technology
• Reema Malhotra Bhola, Gopal Chandra Mahakud (2014), A qualitative
analysis of social networking usage, International Journal of Research and
Development of Health.; Vol 2(1): 34-44
• Michael J. Mallen et al, January 2012, Online Counseling: Reviewing the
Literature From a Counseling Psychology Framework, The Counseling
Psychologist, Vol. 33 No. 6, November 2005 819-871
• http://source.southuniversity.edu/crime-and-social-media-sitescatching-criminals-
and-learning-to-avoid-them-75131.aspx

More Related Content

What's hot

Digital citizenship basics
Digital citizenship basicsDigital citizenship basics
Digital citizenship basicsAnne Collier
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?Anne Collier
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipegschool
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Anirudhya Reevu
 
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...Stevecd
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write upvictoriahoo
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The InternetDebra Boardman
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipMsCCostello
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rulesMazni Salleh
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society Sumama Shakir
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipZephyrum
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversationlippertnicole
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the LawSuna Gurol
 

What's hot (20)

Cybersafey
Cybersafey Cybersafey
Cybersafey
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
Digital citizenship basics
Digital citizenship basicsDigital citizenship basics
Digital citizenship basics
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
Children and future internet
Children and future internetChildren and future internet
Children and future internet
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
 
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write up
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The Internet
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversation
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
 

Viewers also liked

तुम्हें किसकी चाह
तुम्हें किसकी चाहतुम्हें किसकी चाह
तुम्हें किसकी चाहBalaji Sharma
 
Amended - CURRICULUM VITAE Irene Thomas
Amended - CURRICULUM VITAE Irene ThomasAmended - CURRICULUM VITAE Irene Thomas
Amended - CURRICULUM VITAE Irene ThomasIrene Thomas
 
Responsible Journalism vis a vis Indian Constitution: A critique
Responsible Journalism vis a vis Indian Constitution: A critiqueResponsible Journalism vis a vis Indian Constitution: A critique
Responsible Journalism vis a vis Indian Constitution: A critiqueShashank Shekhar Pandey
 
Tropical Tours Brochure
Tropical Tours BrochureTropical Tours Brochure
Tropical Tours BrochureHa Tran Thi
 
Oracle Primavera mobile team member interfaces deep dive and focus on whats...
Oracle Primavera mobile team member interfaces   deep dive and focus on whats...Oracle Primavera mobile team member interfaces   deep dive and focus on whats...
Oracle Primavera mobile team member interfaces deep dive and focus on whats...p6academy
 
Информационни уроци с ученици в читалище „Светлина” в Поморие
Информационни уроци с ученици в читалище „Светлина” в ПомориеИнформационни уроци с ученици в читалище „Светлина” в Поморие
Информационни уроци с ученици в читалище „Светлина” в ПомориеGlob@l Libraries - Bulgaria Program
 
Programming II LAB 4 (OOP) inheritance
Programming II LAB 4 (OOP)  inheritanceProgramming II LAB 4 (OOP)  inheritance
Programming II LAB 4 (OOP) inheritanceFares Younis
 

Viewers also liked (8)

तुम्हें किसकी चाह
तुम्हें किसकी चाहतुम्हें किसकी चाह
तुम्हें किसकी चाह
 
Metal(Commodity) Report 22 March By Mansukh Investment and Trading Solution
Metal(Commodity) Report  22 March By  Mansukh Investment and Trading SolutionMetal(Commodity) Report  22 March By  Mansukh Investment and Trading Solution
Metal(Commodity) Report 22 March By Mansukh Investment and Trading Solution
 
Amended - CURRICULUM VITAE Irene Thomas
Amended - CURRICULUM VITAE Irene ThomasAmended - CURRICULUM VITAE Irene Thomas
Amended - CURRICULUM VITAE Irene Thomas
 
Responsible Journalism vis a vis Indian Constitution: A critique
Responsible Journalism vis a vis Indian Constitution: A critiqueResponsible Journalism vis a vis Indian Constitution: A critique
Responsible Journalism vis a vis Indian Constitution: A critique
 
Tropical Tours Brochure
Tropical Tours BrochureTropical Tours Brochure
Tropical Tours Brochure
 
Oracle Primavera mobile team member interfaces deep dive and focus on whats...
Oracle Primavera mobile team member interfaces   deep dive and focus on whats...Oracle Primavera mobile team member interfaces   deep dive and focus on whats...
Oracle Primavera mobile team member interfaces deep dive and focus on whats...
 
Информационни уроци с ученици в читалище „Светлина” в Поморие
Информационни уроци с ученици в читалище „Светлина” в ПомориеИнформационни уроци с ученици в читалище „Светлина” в Поморие
Информационни уроци с ученици в читалище „Светлина” в Поморие
 
Programming II LAB 4 (OOP) inheritance
Programming II LAB 4 (OOP)  inheritanceProgramming II LAB 4 (OOP)  inheritance
Programming II LAB 4 (OOP) inheritance
 

Similar to Healing our online sickness by cyber path

Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftHeather Dionne
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGJaveriaZain1
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Infographic Poster Report
Infographic Poster ReportInfographic Poster Report
Infographic Poster ReportFarah Sham
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and postervictoriahoo
 
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.pptPOWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.pptisaacmendoza76
 
Cyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of InternetCyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of Internetbeh yong hua
 

Similar to Healing our online sickness by cyber path (13)

Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYING
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Il poster
Il posterIl poster
Il poster
 
Infographic Poster Report
Infographic Poster ReportInfographic Poster Report
Infographic Poster Report
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
 
Lesson 3 ethical issues
Lesson 3   ethical issuesLesson 3   ethical issues
Lesson 3 ethical issues
 
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.pptPOWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of InternetCyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of Internet
 

Recently uploaded

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 

Recently uploaded (20)

9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 

Healing our online sickness by cyber path

  • 1. Healing Our Online-sickness by Cyber Path S. Detchanamurthy, Assistant Professor, Sri Venkateswara College of Education, Karaikal. Puducherry UT. Abstract Technology is a powerful weapon, which we can use to change the globe. Every positive thing has a negative thing, but which must be shown and tells to the fellow citizens, then only they will safeguard themselves from the problems. If anyone going towards the level of convicting a crime, that must be punished by developing judicial system. But here, after committed a crime or death, we wakes up and does our duty, that too not for a long time. So everyone must know the etiquette of using technological tools, internet, and social media. And even they must know cyber law and they must be aware what is happening in and around them, instead of downing their heads towards smart phones. This paper indicates that an approach is needed to better balance the relationship between social media and academic study and it stresses about the urgent need of 24 hours online counseling for today’s student’s welfare. Keywords: Social media, Cyber Crime, Cyber law, CMC, Student Community Introduction If there is trial there is an error. Most of the thing we want to import from foreign countries. Our citizens are want to build a maladjusted society by copying others technology, thereby spoiling the minds of our young citizens and poor people. Not only their minds, also their lives. All are want immediate transformation or immediate pleasure. Especially youth of today want to buy a mobile for their fame in social media or watching whatever they want to see or for any reason. Nobody wants to see the printed Catalogues, instructions, precautions, terms and conditions in the fastest world. The entire thing they want to learn in trial and error basis. All are thinking readings of those matters are waste of time. And they are asking, ‘is the instrument or software is user friendly?’ Those types of instruments are only selling and giving gain to the manufacturers. All are habituated for without knowing the consequences, started using the technological tools. Social media is attractive; it not only provides college students another world to make friends, also
  • 2. provides a good way to release pressure. To some degree, it absolutely affects the lives of college students including the grades. Particularly cyber crime cases were identified in our mother land due to the clash between techno-culture in the globe and societal norms prevailing in India. Cyber bullying, sexual harassment crimes by the usage of social media started showing its huge ugly face due to its users. Cyber Crime The cyber crime has been a problem as early as the late 1970s. The first spam e- mail took place in 1978 and the first virus was installed on an Apple Computer in 1982. In 2006, about 2000 complaints relating to cyber crime were received and the major reasons for such complaints were financial fraud, viruses and hackers. It has also been found that there has been a constant increase in the number of children being exposed to unwanted pornography, Internet harassment and bullying. Cyber crime is emerging as a serious threat in the world. Governments as well as Police and intelligence departments have started to react. Indian police has initiated special cyber cells across the country and have started educating the people. Hence it is very important that students should have awareness about the cyber crime. To day when everywhere there is demand for change, it is computer as a nerve, which is so appropriate and most versatile device. Its use is prevalent in every field. So cyber crime awareness is required. Among the students there must be awareness about issue like hacking, copyright theft, child pornography and pedophilia. The students should be aware about the preventive measures of using computers and internet. Failed Impulse Control Kimberly young (1996) reported that using any computer network, like the Internet, forms a habit in some people that could be compared to pathological gambling. It involves “failed impulse control” without any intoxicant. After watching Internet users for a long time, she developed criteria for assessing one’s dependence on the Internet. Those who were addicted to the Internet often: • “Felt preoccupied with the Internet; Felt a need to use the Internet with increasing amounts of time in order to achieve satisfaction; had an inability to control their Internet use.
  • 3. • Felt restless or irritable when attempting to cut down or stop Internet use. • Used the Internet way of escaping from problems or of involvement with the Internet. • Jeopardized or risked the loss of a significant relationship, job, educational or career opportunity because of the Internet. • Kept returning even after spending an excessive amount of money for online fees. • Went through withdrawal when offline. • Stayed online longer than originally intended.” Facebook Depression Medical practitioners now observe depression in teenagers that is not brought on by typical teen angst, but by Facebook. Researchers coin this symptom “Facebook Depression,” and teens who experience it are at risk of isolation and depression and may turn to inappropriate online resources that promote substance abuse, unsafe sexual practices, or aggressive or destructive behaviors. Unless parents monitor their child’s Facebook usage and ensuing behavior, they won’t know their child is depressed. Source: Diagnosis: Social Media Syndrome (2011) Retweet Depression You are often thrown into bouts of manic depression when you discover that your tweets have not been re-tweeted enough. This depression often deepens when you find that your Tumblr posts have not been re- blogged, or your Facebook status updates have not been liked. Source: “Do You Need a Social Media Detox?” (2011) Computers are banned Google, Apple and Yahoo executives are sending their children to California’s Waldorf schools, where computers are banned. The masters of the e-universe appear convinced that computers “reduce attention spans and inhibit creative thinking, movement and human interaction”. Classes have reverted to using blackboards, chalk, pens, paper, books and even teachers.
  • 4. Source: “The private school in Silicon Valley where tech honchos sends their kids so they DON’T use computers” Cyber law Cyber law was the first step taken by the crime. According to Indian law cyber crime has to be voluntary and willful, an act or omission that adversely affects a person or property. Cyber law encompasses laws relating to cyber crimes, Electronic and digital signatures, Intellectual property, data Protection and Privacy. The Indian Parliament passed its first “Information technology Act, 2000” on 17th October 2000 to deal with cyber crime in the field of e-commerce, e-governance, e-banking as well as penalties and punishments. The Information Technology (IT) Act, 2000, specifies the acts which have been made punishable. Almost all developed and developing countries have established rules and regulations to control the cyber crime. In India, the Information Technology Act 2000 was undoubtedly a welcome a step at a time when there was no legislation in this specialized field. Most of the cyber crimes are not new. Criminals simply devise different ways to undertake standard criminal activities such as fraud, theft, blackmail, forgery and embezzlement using the new medium, often involving the Internet. A computer can be the target of crime, for example, when a person intends to steal information, or causing damage to, a computer or computer network (Svensson, 2011). The computer may be used as a tool in the following kinds of activity-financial crimes, sale of illegal articles, pornography, online gambling, intellectual property crime, email spoofing forgery, cyber defamation, cyber stalking etc. Need of Counseling Service for Students The Education Commission (1964-66) under the Chairmanship of D.S. Kothari emphasized and recommended the inclusion of guidance and counseling services in institution of higher education, to assist students in the choice of courses, and in dealing with other emotional and psychological problems. Though the Education Commission recommended it long before, yet no concrete step has been taken to translate it into action.
  • 5. Counseling service can be successfully applied when the students in general face problems in their studies, emotional lives and personality adjustments. Every person must have good mental health for achieving success in life. Now technology enables as to recover our mental health by online counseling also. Online-Counseling Outcome Studies The main goal of counseling is to alleviate the distress, anxiety, or concerns experienced by a client when he or she enters therapy. Counseling psychologists also focus on building on a client’s strength to improve overall functioning. As a result, it is important to directly examine whether online counseling is effective. In our review of the literature, we found several studies that have directly examined the effectiveness of computer-mediated communication (CMC) technologies such as synchronous chat, asynchronous e-mail, and videoconferencing in delivering online-counseling and behavioral services. These results provided some initial support for the use of CMC in delivering mental and behavioral health services, but it should be noted that individuals with severer presenting issues, such as major depression or substance abuse, were screened out of the study. It may be that the clients allowed participating were experiencing very little distress before the study, and thus, CMC counseling may not have been as effective as Face to Face counseling for severer clients. Conclusion Eric Schmidt of Google called on the assembled students “to please turn off the thing for one whole hour a day”. “You cannot let technology rule you.” That was his message and this radiates solicitude. Internet Paradox i.e. a technology that would theoretically increase communication could also have negative social and psychological effects. Exposure to cyber crime was a theme prevalent in about 16% of the participants. These experiences varied from cyber-bullying, stalking to hacking. A high risk of fraud is also involved on SNS that puts valuable personal information at risk. SNS have been criticized for serving as a breeding ground for cyber-bullying and harassment by strangers. Many studies
  • 6. associate loneliness and depression with a pathological use of social networking. Lonely users are more likely to seek emotional support online, find more satisfaction with online versus offline friends, and experience more disturbances in their daily lives. It may be true for individuals who were troubled, experienced high degree of stress, vulnerability and instability. Thus, a therapeutic dimension is a small but essential part of these online spaces. References • V. K. Kool, Rita Agarwal (2006), Applied Social Psychology, Atlantic Publishers & distributors (P) Ltd., New Delhi. • Wang, Qingya et al, (2011) The Effects of Social Media on College Students, MBA Student Scholarship. Paper5 .http://scholarsarchive.jwu.edu/mba_student/5 • Brydolf, C. (2007). Minding My Space: Balancing the benefits and risks of students' online social networks. Education Digest, 73(2), 4. • Jacobsen, W. C., & Forste, R. (2011). The Wired Generation: Academic and Social Outcomes of Electronic Media Use Among University Students. • Sander Duivestein & Jaap Bloem, 2013 Sogeti VINT, Research Institute for New Technology • Reema Malhotra Bhola, Gopal Chandra Mahakud (2014), A qualitative analysis of social networking usage, International Journal of Research and Development of Health.; Vol 2(1): 34-44 • Michael J. Mallen et al, January 2012, Online Counseling: Reviewing the Literature From a Counseling Psychology Framework, The Counseling Psychologist, Vol. 33 No. 6, November 2005 819-871