From home, school, or work; any of these areas some may encounter a range of unethical behavior, bullying or harassment. Throughout the years this behavior has been conducted at work and social media, which for some time was easy, even undetected. There’s individuals that sits behind a screen name and pretend to be someone else with no morals or ethics about them that will purposely try and hurt someone emotionally and mentally to cause them harm with the use of vulgar hurtful words or actions. Cyber harassment, harassment that takes place through online forums, over the last 10 years have evolved with the use of social media. Social media is networks that encourage individuals to share their thoughts, feelings, likes, and dislikes to others that share their interest. It is a fast, easy, and proficient way to stay connected to others but at the same time opens a new way for people to be harassed. Cyber harassment has harmful effect such as emotional distress, withdrawal from society, and consequently mental issues on users. In the United States, it is estimated that half a million of citizens ages 18 or older have been a victim of cyber harassment. Though cyber harassment often has a negative effect on social media sites, the victims will avoid or leave the site, the victims often suffers serious distress. Often victims try to or will commit suicide over online harassments. To counteract cyber harassments in social media, network …show more content…
the meaning of “privacy” is vague and elusive; it is a term that is related yet distinct from other things. As previously mentioned computers usage has grown and in that growth, so to our lack of privacy. Many uses computers for one reason or another so there are loads of important information stored. It’s important to have a safe and secured security system to protect the data loss, misused, and abused. For an example, businesses often keep their information secured from hackers. Hackers often claim that they hack into networks to find leaks in the security of the networks but often it comes down to financial gains. Crackers are individuals that intentionally access computers for malicious intent; to destroy or steal information. To protect privacy adequately there must be a program in place that identifies the risks. Another thing that can help protect privacy is users must think before sharing personal information, monitor what is posted about them, guard their information by creating a strong password or security code known only by themselves, and protect themselves from fraud. Watch for deals too good to be true for often they are click bait sites created by scammers to lure individuals into giving up personal