SlideShare a Scribd company logo
Healing Our Online-sickness by Cyber Path
S. Detchanamurthy, Assistant Professor,
Sri Venkateswara College of Education, Karaikal. Puducherry UT.
Abstract
Technology is a powerful weapon, which we can use to change the globe. Every
positive thing has a negative thing, but which must be shown and tells to the fellow
citizens, then only they will safeguard themselves from the problems. If anyone going
towards the level of convicting a crime, that must be punished by developing judicial
system. But here, after committed a crime or death, we wakes up and does our duty, that
too not for a long time. So everyone must know the etiquette of using technological
tools, internet, and social media. And even they must know cyber law and they must be
aware what is happening in and around them, instead of downing their heads towards
smart phones. This paper indicates that an approach is needed to better balance the
relationship between social media and academic study and it stresses about the urgent
need of 24 hours online counseling for today’s student’s welfare.
Keywords: Social media, Cyber Crime, Cyber law, CMC, Student Community
Introduction
If there is trial there is an error. Most of the thing we want to import from foreign
countries. Our citizens are want to build a maladjusted society by copying others
technology, thereby spoiling the minds of our young citizens and poor people. Not only
their minds, also their lives.
All are want immediate transformation or immediate pleasure. Especially youth
of today want to buy a mobile for their fame in social media or watching whatever they
want to see or for any reason. Nobody wants to see the printed Catalogues, instructions,
precautions, terms and conditions in the fastest world. The entire thing they want to learn
in trial and error basis. All are thinking readings of those matters are waste of time. And
they are asking, ‘is the instrument or software is user friendly?’ Those types of
instruments are only selling and giving gain to the manufacturers. All are habituated for
without knowing the consequences, started using the technological tools. Social media is
attractive; it not only provides college students another world to make friends, also
provides a good way to release pressure. To some degree, it absolutely affects the lives of
college students including the grades.
Particularly cyber crime cases were identified in our mother land due to the clash
between techno-culture in the globe and societal norms prevailing in India. Cyber
bullying, sexual harassment crimes by the usage of social media started showing its huge
ugly face due to its users.
Cyber Crime
The cyber crime has been a problem as early as the late 1970s. The first spam e-
mail took place in 1978 and the first virus was installed on an Apple Computer in 1982.
In 2006, about 2000 complaints relating to cyber crime were received and the major
reasons for such complaints were financial fraud, viruses and hackers. It has also been
found that there has been a constant increase in the number of children being exposed to
unwanted pornography, Internet harassment and bullying.
Cyber crime is emerging as a serious threat in the world. Governments as well as
Police and intelligence departments have started to react. Indian police has initiated
special cyber cells across the country and have started educating the people. Hence it is
very important that students should have awareness about the cyber crime.
To day when everywhere there is demand for change, it is computer as a nerve,
which is so appropriate and most versatile device. Its use is prevalent in every field. So
cyber crime awareness is required. Among the students there must be awareness about
issue like hacking, copyright theft, child pornography and pedophilia. The students
should be aware about the preventive measures of using computers and internet.
Failed Impulse Control
Kimberly young (1996) reported that using any computer network, like the
Internet, forms a habit in some people that could be compared to pathological gambling.
It involves “failed impulse control” without any intoxicant. After watching Internet users
for a long time, she developed criteria for assessing one’s dependence on the Internet.
Those who were addicted to the Internet often:
• “Felt preoccupied with the Internet; Felt a need to use the Internet with
increasing amounts of time in order to achieve satisfaction; had an
inability to control their Internet use.
• Felt restless or irritable when attempting to cut down or stop Internet use.
• Used the Internet way of escaping from problems or of involvement with
the Internet.
• Jeopardized or risked the loss of a significant relationship, job, educational
or career opportunity because of the Internet.
• Kept returning even after spending an excessive amount of money for
online fees.
• Went through withdrawal when offline.
• Stayed online longer than originally intended.”
Facebook Depression
Medical practitioners now observe depression in teenagers that is not brought on
by typical teen angst, but by Facebook. Researchers coin this symptom “Facebook
Depression,” and teens who experience it are at risk of isolation and depression and may
turn to inappropriate online resources that promote substance abuse, unsafe sexual
practices, or aggressive or destructive behaviors. Unless parents monitor their child’s
Facebook usage and ensuing behavior, they won’t know their child is depressed.
Source: Diagnosis: Social Media Syndrome (2011)
Retweet Depression
You are often thrown into bouts of manic depression when you discover that your
tweets have not been re-tweeted enough.
This depression often deepens when you find that your Tumblr posts have not been re-
blogged, or your Facebook status updates have not been liked.
Source: “Do You Need a Social Media Detox?” (2011)
Computers are banned
Google, Apple and Yahoo executives are sending their children to California’s
Waldorf schools, where computers are banned.
The masters of the e-universe appear convinced that computers “reduce attention spans
and inhibit creative thinking, movement and human interaction”. Classes have reverted to
using blackboards, chalk, pens, paper, books and even teachers.
Source: “The private school in Silicon Valley where tech honchos sends their kids so they
DON’T use computers”
Cyber law
Cyber law was the first step taken by the crime. According to Indian law cyber
crime has to be voluntary and willful, an act or omission that adversely affects a person
or property. Cyber law encompasses laws relating to cyber crimes, Electronic and digital
signatures, Intellectual property, data Protection and Privacy. The Indian Parliament
passed its first “Information technology Act, 2000” on 17th
October 2000 to deal with
cyber crime in the field of e-commerce, e-governance, e-banking as well as penalties and
punishments. The Information Technology (IT) Act, 2000, specifies the acts which have
been made punishable. Almost all developed and developing countries have established
rules and regulations to control the cyber crime. In India, the Information Technology
Act 2000 was undoubtedly a welcome a step at a time when there was no legislation in
this specialized field.
Most of the cyber crimes are not new. Criminals simply devise different ways to
undertake standard criminal activities such as fraud, theft, blackmail, forgery and
embezzlement using the new medium, often involving the Internet.
A computer can be the target of crime, for example, when a person intends to
steal information, or causing damage to, a computer or computer network (Svensson,
2011). The computer may be used as a tool in the following kinds of activity-financial
crimes, sale of illegal articles, pornography, online gambling, intellectual property crime,
email spoofing forgery, cyber defamation, cyber stalking etc.
Need of Counseling Service for Students
The Education Commission (1964-66) under the Chairmanship of D.S. Kothari
emphasized and recommended the inclusion of guidance and counseling services in
institution of higher education, to assist students in the choice of courses, and in dealing
with other emotional and psychological problems. Though the Education Commission
recommended it long before, yet no concrete step has been taken to translate it into
action.
Counseling service can be successfully applied when the students in general face
problems in their studies, emotional lives and personality adjustments. Every person
must have good mental health for achieving success in life. Now technology enables as to
recover our mental health by online counseling also.
Online-Counseling Outcome Studies
The main goal of counseling is to alleviate the distress, anxiety, or concerns
experienced by a client when he or she enters therapy. Counseling psychologists also
focus on building on a client’s strength to improve overall functioning. As a result, it is
important to directly examine whether online counseling is effective. In our review of the
literature, we found several studies that have directly examined the effectiveness of
computer-mediated communication (CMC) technologies such as synchronous chat,
asynchronous e-mail, and videoconferencing in delivering online-counseling and
behavioral services.
These results provided some initial support for the use of CMC in delivering
mental and behavioral health services, but it should be noted that individuals with severer
presenting issues, such as major depression or substance abuse, were screened out of the
study. It may be that the clients allowed participating were experiencing very little
distress before the study, and thus, CMC counseling may not have been as effective as
Face to Face counseling for severer clients.
Conclusion
Eric Schmidt of Google called on the assembled students “to please turn off the
thing for one whole hour a day”. “You cannot let technology rule you.” That was his
message and this radiates solicitude.
Internet Paradox i.e. a technology that would theoretically increase
communication could also have negative social and psychological effects. Exposure to
cyber crime was a theme prevalent in about 16% of the participants. These experiences
varied from cyber-bullying, stalking to hacking. A high risk of fraud is also involved on
SNS that puts valuable personal information at risk. SNS have been criticized for serving
as a breeding ground for cyber-bullying and harassment by strangers. Many studies
associate loneliness and depression with a pathological use of social networking. Lonely
users are more likely to seek emotional support online, find more satisfaction with online
versus offline friends, and experience more disturbances in their daily lives. It may be
true for individuals who were troubled, experienced high degree of stress, vulnerability
and instability. Thus, a therapeutic dimension is a small but essential part of these online
spaces.
References
• V. K. Kool, Rita Agarwal (2006), Applied Social Psychology, Atlantic
Publishers & distributors (P) Ltd., New Delhi.
• Wang, Qingya et al, (2011) The Effects of Social Media on College Students,
MBA Student Scholarship. Paper5 .http://scholarsarchive.jwu.edu/mba_student/5
• Brydolf, C. (2007). Minding My Space: Balancing the benefits and risks of
students' online social networks. Education Digest, 73(2), 4.
• Jacobsen, W. C., & Forste, R. (2011). The Wired Generation: Academic and
Social Outcomes of Electronic Media Use Among University Students.
• Sander Duivestein & Jaap Bloem, 2013 Sogeti VINT, Research Institute for
New Technology
• Reema Malhotra Bhola, Gopal Chandra Mahakud (2014), A qualitative
analysis of social networking usage, International Journal of Research and
Development of Health.; Vol 2(1): 34-44
• Michael J. Mallen et al, January 2012, Online Counseling: Reviewing the
Literature From a Counseling Psychology Framework, The Counseling
Psychologist, Vol. 33 No. 6, November 2005 819-871
• http://source.southuniversity.edu/crime-and-social-media-sitescatching-criminals-
and-learning-to-avoid-them-75131.aspx

More Related Content

What's hot

Cybersafey
Cybersafey Cybersafey
Cybersafey
Vanessa Assumpção
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
Anne Collier
 
Digital citizenship basics
Digital citizenship basicsDigital citizenship basics
Digital citizenship basics
Anne Collier
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
Mohamed ElGabry
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
Anne Collier
 
Children and future internet
Children and future internetChildren and future internet
Children and future internet
University of Potsdam
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
egschool
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
Anirudhya Reevu
 
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
Stevecd
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write up
victoriahoo
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
Jose Luis Leon Gonzalez
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The Internet
Debra Boardman
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
MsCCostello
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
Mazni Salleh
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
Sumama Shakir
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
Zephyrum
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
Priscila Velázquez
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversation
lippertnicole
 
Online ethics
Online ethicsOnline ethics
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
Suna Gurol
 

What's hot (20)

Cybersafey
Cybersafey Cybersafey
Cybersafey
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
Digital citizenship basics
Digital citizenship basicsDigital citizenship basics
Digital citizenship basics
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
Children and future internet
Children and future internetChildren and future internet
Children and future internet
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
 
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write up
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The Internet
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversation
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
 

Viewers also liked

तुम्हें किसकी चाह
तुम्हें किसकी चाहतुम्हें किसकी चाह
तुम्हें किसकी चाह
Balaji Sharma
 
Amended - CURRICULUM VITAE Irene Thomas
Amended - CURRICULUM VITAE Irene ThomasAmended - CURRICULUM VITAE Irene Thomas
Amended - CURRICULUM VITAE Irene Thomas
Irene Thomas
 
Responsible Journalism vis a vis Indian Constitution: A critique
Responsible Journalism vis a vis Indian Constitution: A critiqueResponsible Journalism vis a vis Indian Constitution: A critique
Responsible Journalism vis a vis Indian Constitution: A critique
Shashank Shekhar Pandey
 
Tropical Tours Brochure
Tropical Tours BrochureTropical Tours Brochure
Tropical Tours Brochure
Ha Tran Thi
 
Oracle Primavera mobile team member interfaces deep dive and focus on whats...
Oracle Primavera mobile team member interfaces   deep dive and focus on whats...Oracle Primavera mobile team member interfaces   deep dive and focus on whats...
Oracle Primavera mobile team member interfaces deep dive and focus on whats...
p6academy
 
Информационни уроци с ученици в читалище „Светлина” в Поморие
Информационни уроци с ученици в читалище „Светлина” в ПомориеИнформационни уроци с ученици в читалище „Светлина” в Поморие
Информационни уроци с ученици в читалище „Светлина” в ПомориеGlob@l Libraries - Bulgaria Program
 
Programming II LAB 4 (OOP) inheritance
Programming II LAB 4 (OOP)  inheritanceProgramming II LAB 4 (OOP)  inheritance
Programming II LAB 4 (OOP) inheritance
Fares Younis
 

Viewers also liked (8)

तुम्हें किसकी चाह
तुम्हें किसकी चाहतुम्हें किसकी चाह
तुम्हें किसकी चाह
 
Metal(Commodity) Report 22 March By Mansukh Investment and Trading Solution
Metal(Commodity) Report  22 March By  Mansukh Investment and Trading SolutionMetal(Commodity) Report  22 March By  Mansukh Investment and Trading Solution
Metal(Commodity) Report 22 March By Mansukh Investment and Trading Solution
 
Amended - CURRICULUM VITAE Irene Thomas
Amended - CURRICULUM VITAE Irene ThomasAmended - CURRICULUM VITAE Irene Thomas
Amended - CURRICULUM VITAE Irene Thomas
 
Responsible Journalism vis a vis Indian Constitution: A critique
Responsible Journalism vis a vis Indian Constitution: A critiqueResponsible Journalism vis a vis Indian Constitution: A critique
Responsible Journalism vis a vis Indian Constitution: A critique
 
Tropical Tours Brochure
Tropical Tours BrochureTropical Tours Brochure
Tropical Tours Brochure
 
Oracle Primavera mobile team member interfaces deep dive and focus on whats...
Oracle Primavera mobile team member interfaces   deep dive and focus on whats...Oracle Primavera mobile team member interfaces   deep dive and focus on whats...
Oracle Primavera mobile team member interfaces deep dive and focus on whats...
 
Информационни уроци с ученици в читалище „Светлина” в Поморие
Информационни уроци с ученици в читалище „Светлина” в ПомориеИнформационни уроци с ученици в читалище „Светлина” в Поморие
Информационни уроци с ученици в читалище „Светлина” в Поморие
 
Programming II LAB 4 (OOP) inheritance
Programming II LAB 4 (OOP)  inheritanceProgramming II LAB 4 (OOP)  inheritance
Programming II LAB 4 (OOP) inheritance
 

Similar to Healing our online sickness by cyber path

Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Preet Hanspal
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
Heather Dionne
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYING
JaveriaZain1
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
SheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
nitss007
 
Il poster
Il posterIl poster
Il poster
fareezsham
 
Infographic Poster Report
Infographic Poster ReportInfographic Poster Report
Infographic Poster Report
Farah Sham
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
victoriahoo
 
Lesson 3 ethical issues
Lesson 3   ethical issuesLesson 3   ethical issues
Lesson 3 ethical issues
MLG College of Learning, Inc
 
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.pptPOWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
isaacmendoza76
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Shelby Mitchell
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Zekhaya Sithole
 
Cyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of InternetCyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of Internet
beh yong hua
 

Similar to Healing our online sickness by cyber path (13)

Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYING
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Il poster
Il posterIl poster
Il poster
 
Infographic Poster Report
Infographic Poster ReportInfographic Poster Report
Infographic Poster Report
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
 
Lesson 3 ethical issues
Lesson 3   ethical issuesLesson 3   ethical issues
Lesson 3 ethical issues
 
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.pptPOWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of InternetCyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of Internet
 

Recently uploaded

Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 

Recently uploaded (20)

Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 

Healing our online sickness by cyber path

  • 1. Healing Our Online-sickness by Cyber Path S. Detchanamurthy, Assistant Professor, Sri Venkateswara College of Education, Karaikal. Puducherry UT. Abstract Technology is a powerful weapon, which we can use to change the globe. Every positive thing has a negative thing, but which must be shown and tells to the fellow citizens, then only they will safeguard themselves from the problems. If anyone going towards the level of convicting a crime, that must be punished by developing judicial system. But here, after committed a crime or death, we wakes up and does our duty, that too not for a long time. So everyone must know the etiquette of using technological tools, internet, and social media. And even they must know cyber law and they must be aware what is happening in and around them, instead of downing their heads towards smart phones. This paper indicates that an approach is needed to better balance the relationship between social media and academic study and it stresses about the urgent need of 24 hours online counseling for today’s student’s welfare. Keywords: Social media, Cyber Crime, Cyber law, CMC, Student Community Introduction If there is trial there is an error. Most of the thing we want to import from foreign countries. Our citizens are want to build a maladjusted society by copying others technology, thereby spoiling the minds of our young citizens and poor people. Not only their minds, also their lives. All are want immediate transformation or immediate pleasure. Especially youth of today want to buy a mobile for their fame in social media or watching whatever they want to see or for any reason. Nobody wants to see the printed Catalogues, instructions, precautions, terms and conditions in the fastest world. The entire thing they want to learn in trial and error basis. All are thinking readings of those matters are waste of time. And they are asking, ‘is the instrument or software is user friendly?’ Those types of instruments are only selling and giving gain to the manufacturers. All are habituated for without knowing the consequences, started using the technological tools. Social media is attractive; it not only provides college students another world to make friends, also
  • 2. provides a good way to release pressure. To some degree, it absolutely affects the lives of college students including the grades. Particularly cyber crime cases were identified in our mother land due to the clash between techno-culture in the globe and societal norms prevailing in India. Cyber bullying, sexual harassment crimes by the usage of social media started showing its huge ugly face due to its users. Cyber Crime The cyber crime has been a problem as early as the late 1970s. The first spam e- mail took place in 1978 and the first virus was installed on an Apple Computer in 1982. In 2006, about 2000 complaints relating to cyber crime were received and the major reasons for such complaints were financial fraud, viruses and hackers. It has also been found that there has been a constant increase in the number of children being exposed to unwanted pornography, Internet harassment and bullying. Cyber crime is emerging as a serious threat in the world. Governments as well as Police and intelligence departments have started to react. Indian police has initiated special cyber cells across the country and have started educating the people. Hence it is very important that students should have awareness about the cyber crime. To day when everywhere there is demand for change, it is computer as a nerve, which is so appropriate and most versatile device. Its use is prevalent in every field. So cyber crime awareness is required. Among the students there must be awareness about issue like hacking, copyright theft, child pornography and pedophilia. The students should be aware about the preventive measures of using computers and internet. Failed Impulse Control Kimberly young (1996) reported that using any computer network, like the Internet, forms a habit in some people that could be compared to pathological gambling. It involves “failed impulse control” without any intoxicant. After watching Internet users for a long time, she developed criteria for assessing one’s dependence on the Internet. Those who were addicted to the Internet often: • “Felt preoccupied with the Internet; Felt a need to use the Internet with increasing amounts of time in order to achieve satisfaction; had an inability to control their Internet use.
  • 3. • Felt restless or irritable when attempting to cut down or stop Internet use. • Used the Internet way of escaping from problems or of involvement with the Internet. • Jeopardized or risked the loss of a significant relationship, job, educational or career opportunity because of the Internet. • Kept returning even after spending an excessive amount of money for online fees. • Went through withdrawal when offline. • Stayed online longer than originally intended.” Facebook Depression Medical practitioners now observe depression in teenagers that is not brought on by typical teen angst, but by Facebook. Researchers coin this symptom “Facebook Depression,” and teens who experience it are at risk of isolation and depression and may turn to inappropriate online resources that promote substance abuse, unsafe sexual practices, or aggressive or destructive behaviors. Unless parents monitor their child’s Facebook usage and ensuing behavior, they won’t know their child is depressed. Source: Diagnosis: Social Media Syndrome (2011) Retweet Depression You are often thrown into bouts of manic depression when you discover that your tweets have not been re-tweeted enough. This depression often deepens when you find that your Tumblr posts have not been re- blogged, or your Facebook status updates have not been liked. Source: “Do You Need a Social Media Detox?” (2011) Computers are banned Google, Apple and Yahoo executives are sending their children to California’s Waldorf schools, where computers are banned. The masters of the e-universe appear convinced that computers “reduce attention spans and inhibit creative thinking, movement and human interaction”. Classes have reverted to using blackboards, chalk, pens, paper, books and even teachers.
  • 4. Source: “The private school in Silicon Valley where tech honchos sends their kids so they DON’T use computers” Cyber law Cyber law was the first step taken by the crime. According to Indian law cyber crime has to be voluntary and willful, an act or omission that adversely affects a person or property. Cyber law encompasses laws relating to cyber crimes, Electronic and digital signatures, Intellectual property, data Protection and Privacy. The Indian Parliament passed its first “Information technology Act, 2000” on 17th October 2000 to deal with cyber crime in the field of e-commerce, e-governance, e-banking as well as penalties and punishments. The Information Technology (IT) Act, 2000, specifies the acts which have been made punishable. Almost all developed and developing countries have established rules and regulations to control the cyber crime. In India, the Information Technology Act 2000 was undoubtedly a welcome a step at a time when there was no legislation in this specialized field. Most of the cyber crimes are not new. Criminals simply devise different ways to undertake standard criminal activities such as fraud, theft, blackmail, forgery and embezzlement using the new medium, often involving the Internet. A computer can be the target of crime, for example, when a person intends to steal information, or causing damage to, a computer or computer network (Svensson, 2011). The computer may be used as a tool in the following kinds of activity-financial crimes, sale of illegal articles, pornography, online gambling, intellectual property crime, email spoofing forgery, cyber defamation, cyber stalking etc. Need of Counseling Service for Students The Education Commission (1964-66) under the Chairmanship of D.S. Kothari emphasized and recommended the inclusion of guidance and counseling services in institution of higher education, to assist students in the choice of courses, and in dealing with other emotional and psychological problems. Though the Education Commission recommended it long before, yet no concrete step has been taken to translate it into action.
  • 5. Counseling service can be successfully applied when the students in general face problems in their studies, emotional lives and personality adjustments. Every person must have good mental health for achieving success in life. Now technology enables as to recover our mental health by online counseling also. Online-Counseling Outcome Studies The main goal of counseling is to alleviate the distress, anxiety, or concerns experienced by a client when he or she enters therapy. Counseling psychologists also focus on building on a client’s strength to improve overall functioning. As a result, it is important to directly examine whether online counseling is effective. In our review of the literature, we found several studies that have directly examined the effectiveness of computer-mediated communication (CMC) technologies such as synchronous chat, asynchronous e-mail, and videoconferencing in delivering online-counseling and behavioral services. These results provided some initial support for the use of CMC in delivering mental and behavioral health services, but it should be noted that individuals with severer presenting issues, such as major depression or substance abuse, were screened out of the study. It may be that the clients allowed participating were experiencing very little distress before the study, and thus, CMC counseling may not have been as effective as Face to Face counseling for severer clients. Conclusion Eric Schmidt of Google called on the assembled students “to please turn off the thing for one whole hour a day”. “You cannot let technology rule you.” That was his message and this radiates solicitude. Internet Paradox i.e. a technology that would theoretically increase communication could also have negative social and psychological effects. Exposure to cyber crime was a theme prevalent in about 16% of the participants. These experiences varied from cyber-bullying, stalking to hacking. A high risk of fraud is also involved on SNS that puts valuable personal information at risk. SNS have been criticized for serving as a breeding ground for cyber-bullying and harassment by strangers. Many studies
  • 6. associate loneliness and depression with a pathological use of social networking. Lonely users are more likely to seek emotional support online, find more satisfaction with online versus offline friends, and experience more disturbances in their daily lives. It may be true for individuals who were troubled, experienced high degree of stress, vulnerability and instability. Thus, a therapeutic dimension is a small but essential part of these online spaces. References • V. K. Kool, Rita Agarwal (2006), Applied Social Psychology, Atlantic Publishers & distributors (P) Ltd., New Delhi. • Wang, Qingya et al, (2011) The Effects of Social Media on College Students, MBA Student Scholarship. Paper5 .http://scholarsarchive.jwu.edu/mba_student/5 • Brydolf, C. (2007). Minding My Space: Balancing the benefits and risks of students' online social networks. Education Digest, 73(2), 4. • Jacobsen, W. C., & Forste, R. (2011). The Wired Generation: Academic and Social Outcomes of Electronic Media Use Among University Students. • Sander Duivestein & Jaap Bloem, 2013 Sogeti VINT, Research Institute for New Technology • Reema Malhotra Bhola, Gopal Chandra Mahakud (2014), A qualitative analysis of social networking usage, International Journal of Research and Development of Health.; Vol 2(1): 34-44 • Michael J. Mallen et al, January 2012, Online Counseling: Reviewing the Literature From a Counseling Psychology Framework, The Counseling Psychologist, Vol. 33 No. 6, November 2005 819-871