CSR India

Antivirus: A software program used to detect, prevent and remove viruses from your device(s) like – computer/laptop and/or mobile phones. They are also used for the emails, chats that you receive, and even the web pages you open.

Antivirus

Sources
https://www.csum.edu/c/document_library/get_file-uuid-c637bc13-7f5f-4104-8f8b-be0f028ba3e8-groupId-72269.pdf
https://in.pcmag.com/software/31825/how-we-test-malware-removal

 

 

It’s a short form for ‘application’ and is a software program designed to fulfill the purpose and is downloaded by the user to mobile and computer/laptop devices. Eg: Whatsapp, Instagram, Facebook.

App

Sources
https://www.buzinga.com.au/buzz/how-many-app-types-are-there/

A file/document/media that is sent along with the message through various platforms of communication.

 

Attachment

 

The web pages that one wants to save for future reference/use can be stored in your browser directly. You can see a ‘star’ icon on the top right side of you the URL bar; by clicking the same the web page will be saved.

Bookmark

Sources
https://etc.usf.edu/techease/win/internet/how-do-i-bookmark-a-site-i-like-so-i-can-view-it-later/

It is the act of copying information on another media device such a CD, Pen drives, Hard Disk, etc.

Burning

Sources
https://helpdeskgeek.com/how-to/burn-cd-dvd-windows-7-8-10/

A deceptive activity of setting up a fictitious online profile, most often for the purpose of luring another by monetarily trapping them or forging a fraudulent relationship using subtle manipulation.

Catfishing

 

Sources
https://xnspy.com/blog/catfishing-interesting-facts-statistics.html
https://medium.com/@taariqmutaliph/catfishing-the-danger-of-youth-352229710bd

A place where multiple users can communicate electronically. It can be both one-on-one and can also involve a number of people. Chat rooms can also be moderated and/or supervised.

Chatroom

 

Sources:
https://www.theguardian.com/education/2001/mar/20/itforschools.schools5
https://itstillworks.com/chat-rooms-dangerous-1073.html
https://www.betterhelp.com/advice/chat/problems-with-internet-chat-bored-and-vulnerable-users/

Some headlines on the web are eye catching, sensational and misleading. It definitely intrigues readers to click and view the story. Usually the purpose of click baits’ – to generate page views and/or revenues. But leads to viewing inappropriate content and even malware.

Clickbait

 

Sources

https://edu.gcfglobal.org/en/thenow/what-is-clickbait/1/https://roundpeg.biz/2018/03/clickbait-tactics-harm-good/Cookie

A cookie is a tiny file that sent to a web browser by a served and gets stored in the computer’s brain. The server reads it every time we go back to the same website, and keeps a track of our preferences. Example: Our shopping choices appear on other pages.

Cookies- glossary

 

Sources
https://www.youtube.com/watch?v=PzRjiCBZo6g
https://www.primedesignsolutions.com/learning-center/what-you-should-know-about-website-cookies/

 

 

It is to follow someone’s social media account closely and excessively. It’s also known as ‘online stalking’.

Creeping

 

 

 

Sources
https://thoughtcatalog.com/emma-golden/2014/02/the-dos-and-donts-of-internet-creeping/
https://www.lifewire.com/what-does-creeping-mean-2655280

Intentional and repeated harm inflicted through the use of computers, cell phones, and other electronic devices. It includes sending, posting, or sharing negative, harmful, false, or mean content about someone. It also includes sharing personal or private information about someone else causing embarrassment or humiliation.

Cyberbullying

 

 

 

Sources
https://firstsiteguide.com/cyberbullying-stats/
https://www.verywellmind.com/cyberbullying-and-depression-1066791
https://www.pewresearch.org/internet/2018/09/27/a-majority-of-teens-have-experienced-some-form-of-cyberbullying/

Methods used to repeatedly harass someone using networked technology; intimidating and being invasive of privacy.

Cyberstalking

 

 

Sources:
https://us.norton.com/internetsecurity-how-to-how-to-protect-yourself-from-cyberstalkers.html
https://blog.ipleaders.in/cyber-stalking/

A possible danger that exploits the vulnerability to breach security and cause harm, either intentionally and/or accidently.

Cyber threats

 

 

 

When their network starts doing everything digitally, then kids start substituting their physical presence with an online persona and apply personality development to the online profile.

Diary use

 

 

Sources:
http://www.jackcentral.org/opinion/social-media-is-not-a-diary/article_008579f3-70f8-53fc-bcf9-8ab7a1fd3dc7.html
https://www.niemanlab.org/2013/05/diaries-the-original-social-media-how-our-obsession-with-documenting-and-sharing-our-own-lives-is-nothing-new/

Searching for and the publishing of personal information of an individual. Doxers use the information to attack, threaten and harass them.

Doxing

 

 

Sources:
https://html.com/blog/doxing/
https://www.diggitmagazine.com/articles/doxing-and-online-communities

False information deliberately and covertly spread to mislead and influence public opinion or obscure the truth. The information is intentionally presented by the manipulation of facts to tweak the narrative, i.e., used as a tool of propaganda.  Example, if someone intentionally and strategically sends out information in the form of articles, photos, memes, videos, etc., that they know is untrue its disinformation.

Disinformation

 

 

Sources:
https://www.theglobeandmail.com/canada/article-how-do-our-brains-fall-for-disinformation/
https://web.uri.edu/quadangles/020-the-age-of-disinformation/

Meme culture and picture posts, we usually believe what we see, without proper verification. For example, with global news about Coronavirus reaching users, memes and fake news about symptoms have also been widespread.

 

Fake news

 

Sources:
https://theconversation.com/why-media-education-in-schools-needs-to-be-about-much-more-than-fake-news-129156
https://www.summer.harvard.edu/inside-summer/4-tips-spotting-fake-news-story
https://www.sciencemag.org/news/2019/01/majority-americans-were-not-exposed-fake-news-2016-us-election-twitter-study-suggests

Fear of Missing Out – a phenomenon in the digital age and world that describes the feeling of sadness, loss and/or of not being in pace with others, usually peer group in experiencing something that is considered as an “amazing experience” by others. It can lead to anger issues, anxiety and depression.

Fomo

 

 

Sources:
https://www.verywellmind.com/how-to-cope-with-fomo-4174664
https://time.com/4358140/overcome-fomo/
https://trustpulse.com/fomo-statistics/

The Gamer Gate controversy (August 2014) which targeted several women in the video game industry. It’s concerned with the ethics in game journalism and with protecting the `gamer” identity. The issue whirls around the issues of sexism in video game culture.

gamer gate

 

Sources:
https://www.theguardian.com/commentisfree/2019/aug/20/the-guardian-view-on-gamergate-when-hatred-escaped
https://gawker.com/what-is-gamergate-and-why-an-explainer-for-non-geeks-1642909080

The act of evading security and breaking into authorized locations, i.e., a network, computer, file, etc., usually with malicious intent.

hacking

 

 

Sources:
https://www.adweek.com/digital/blaise-grimes-viort-the-social-element-guest-post-defending-against-social-media-hacks/
https://wpdaddy.com/why-social-media-accounts-are-hacked-what-to-do-to-avoid-it-or-recover-your-one/

It is a fad that originated in 2005, in the United Kingdom. Here, one or more than one person attacks a victim for the purpose of recording it.

happy-slapping

 

 

 

Sources:
https://www.jugendundmedien.ch/themen/cybermobbing-happy-slapping.html
https://www.slideshare.net/asmedia/happy-slapping

It’s a word or phrase which is preceded by the sign “#” It is to categorize information so as to make it searchable and user friendly.

hashtag

The Joy of Missing Out – it’s about disconnecting, opting out and being okay with where you are, like a retreat from the real world.

JOMO

 

 

Sources
https://www.inquirer.com/philly/columnists/elizabeth_wellington/jomo-meaning-fomo-20180822.html
https://qrius.com/jomo-over-fomo-how-to-find-the-joy-of-missing-out/

The practice of explicitly requesting likes, shares, comments so as to increase engagement on social media, and to boast of having ‘n’ number of likes or followers. For example, ‘One like is equal to one prayer.’

Like baiting

 

 

 

 

Sources
https://www.writeraccess.com/blog/the-practice-of-like-baiting-and-why-you-should-avoid-it/
http://www.james-nicholson.co.uk/facebook-set-minimise-like-baiting-posts/

When genuine information is shared to cause harm, often by moving information designed to stay private into the public sphere.

Example, if someone sends out a personal picture and/or video to another person without their consent to take revenge and/or cause harm and harass.

mal-information

 

 

Sources
http://www.mikekujawski.ca/2019/09/05/misinformation-vs-disinformation-vs-malinformation/

False information that is inadvertently spread and published regardless of the intent to fabricate facts and/or mislead.

Example, when an individual sees this disinformation, in the form of articles, photos, videos, etc., and believes it, and then shares it, that’s misinformation.

misinformation

 

 

 

Sources
https://www.impactbnd.com/blog/facebook-outlines-steps-to-fight-misinformation-in-news-feeds
https://www.coe.int/en/web/campaign-free-to-speak-safe-to-learn/dealing-with-propaganda-misinformation-and-fake-news

 

Multimedia Messaging Service (MMS) is a standard way to send messages that includes multimedia content, i.e., images/videos, etc from one mobile to another over a cellular network.

MMS

 

Sources
https://searchmobilecomputing.techtarget.com/definition/Multimedia-Messaging-Service
https://clevertap.com/blog/mms-vs-sms/
https://www.coe.int/en/web/campaign-free-to-speak-safe-to-learn/dealing-with-propaganda-misinformation-and-fake-news

An abbreviation that comes from the amalgamation of two words – Network” and “Etiquette.” It marks the guidelines for courteous and responsible communication online. The purpose is to enable us to build and maintain a pleasant, comfortable, inclusive and responsible online environment.

nettiquette

 

 

Sources
https://www.rasmussen.edu/student-experience/college-life/netiquette-guidelines-every-online-student-needs-to-know/
https://www.rd.com/culture/social-media-etiquette/
https://pumpic.com/security/netiquette-rules-for-kids/

It’s a software program that can be installed on your devices (computers/tabs/mobiles) and even the television so as to restrict what children can view and do. The restriction to access is for websites, content, chat rooms, etc which may be age inappropriate. No parental control software should be used its isolation. It should always involve talking to children and sharing online activities with them.

parental-control-1

 

 

 

Sources
https://www.additudemag.com/screen-time-parental-control-apps/

The attempt to fraudulently acquire sensitive information such as usernames, passwords, or bank/card information, etc. by disguising as authentic electronic communication, usually email or even a phone call. It’s also a method of spreading electronic viruses.

Phshing

 

 

Sources
https://gasparinsurance.com/phishing/
https://in.pcmag.com/feature/127150/how-to-avoid-phishing-scams

The act of masquerading a good pretext to strive to steal victim’s personal information. The scammer builds up the pretext of asking for “bits of information” to verify their identity. The data acquired is used to commit identity theft.

A social media setting that enables and protects content from the public eye. Users have to offer a request to follow private accounts to see their content. Always keep your account safe by using the private mode! It’s a smart option!

Private

 

 

 

Sources
https://www.techcrates.com/how-to-secure-social-media-account/
https://gizmodo.com/how-to-make-your-social-media-accounts-as-private-as-po-1793949395
https://www.sallyahmed.com/private-was-the-norm-for-social-media/

Distribution of sexually explicit videos and/or photos of individuals without their permission. It can also be made and leaked by a partner, hence, revenge.

The possession of the explicit content is used by perpetrators to blackmail and harass individuals.

Revenge porn

 

 

Sources
https://www.theguardian.com/lifeandstyle/2018/may/07/many-revenge-porn-victims-consider-suicide-why-arent-schools-doing-more-to-stop-it
https://www.womenshealthmag.com/life/a19911633/stop-revenge-porn/
https://www.independent.co.uk/news/uk/home-news/what-is-revenge-porn-9580251.html

The act of emotionally exaggerating problems to gain sympathy. The other name for it is “cat fishing”. In other words, it’s basically to pretend to go through a hard time (at least pretend more than what’s reality).

It usually hurts the younger crowd making them open to bullying. It’s seen as an extension of cyber bullying as it seeks attention and attracts bullies and pedophiles in the loop.

Sad fishing

 

 

Sources
https://www.parents.com/parenting/better-parenting/teenagers/a-parents-guide-to-sadfishing/
https://www.newindianexpress.com/lifestyle/tech/2020/jan/18/how-social-media-users-fishing-for-sympathy-have-a-bearing-on-mental-health-2090992.html
https://www.independent.co.uk/news/uk/home-news/what-is-revenge-porn-9580251.html

Sending, receiving, or forwarding sexually explicit messages, photographs through a digital device, of oneself to others. It can be used for further blackmailing and harassment.

Sexting

 

 

Sources
https://theconversation.com/teenage-sexting-were-letting-young-people-down-by-not-talking-about-it-107054
https://theconversation.com/12-ways-to-keep-your-kids-safe-from-sexual-encounters-online-97655

Another form of revenge porn employing forms of coercion that isn’t physical so as to extort sexual favors from victims. It refers to sexual exploitation through coercion and threatening the release of information/images.

sextortion

 

 

 

Sources
https://securityledger.com/2019/02/research-finds-sextortion-scams-expand-in-scope-sophistication/
https://www.kaspersky.com/blog/sextortion/12716/
https://money.cnn.com/2016/06/23/technology/sextortion-thorn-study

A technique used to obtain information like PINs, passwords and other confidential data by literally looking over the victim’s shoulder. The attacker just needs to be close vicinity and keep a keen eye on the victim’s typing pattern and surroundings. Crowded places are open to more such kinds of attacks.

Shoulder surfing

 

 

Sources
https://password-managers.bestreviews.net/how-to-protect-yourself-from-shoulder-surfing/

Then “spam” or “junk” folder in your emails are a gateway to unnecessary and repetitive content so as to clog the inbox. Make sure you don’t respond to spam messages and delete them.

spam

 

Sources
https://www.talkd.co/2018/09/skip-the-spam/

Software which aims at gathers information about a person or organization, without their knowledge, and sends the information to another entity without their consent, through “cookies”.

Spyware

 

 

Sources
https://www.malwarebytes.com/spyware/
https://www.le-vpn.com/what-is-spyware/

Short Message Service (SMS) is the typical way of messaging someone that only contains alphabetical and numeric characters (now even emoticons) between user(s) on a mobile, computer/laptop or other electronic devices.

SMS

 

 

 

Sources
https://searchmobilecomputing.techtarget.com/definition/Short-Message-Service

Trojans leave our computer completely unprotected. They’re a type of malicious code or software that looks legitimate, but makes your computer susceptible to hacking without the hacker being detected.

 

 

Sources
https://www.educba.com/what-is-trojan-horse-virus/

 

Social media users, who can be found with malicious intentions and sometimes with a fake identity, which deliberately uses offensive, hateful remarks to annoy and/or ignite, with the sole aim of provoking and harassing others.

troll

 

 

 

Sources
https://southcoastmarketinggroup.com/ghosts-may-not-be-real-but-trolls-are-look-out-for-them-on-social-media/
https://www.grammarly.com/blog/social-media-negativity/

It is defined as taking interest or having interest in observing unsuspecting people – adults or children- without their knowledge and consent. The act of voyeurism gives precedent to the voyeur because the person being watched is unaware of the fact that s/he is being watched. A more common way of referring to the person doing the watching is “peeping Tom”.

Voyeurism

 

Sources
https://gendermatters.in/exposed-voyeurism-and-surveillance/

An advanced form of phishing used to guise as a part of an organization and target the senior or important members, with the intent to seize sensitive information and/or rob money.

Whalling attack

 

Sources
https://www.kaspersky.com/resource-center/definitions/what-is-a-whaling-attack