Blocking: Voluntary denial of access to particular parts of the internet, like sending messages or viewing posts.
Catfishing: A deceptive activity of setting up a fictitious online profile, most often for the purpose of luring another by monetarily trapping them or forging a fraudulent relationship using subtle manipulation.
Chat Rooms: A place where multiple users can communicate electronically. It can be both one-on-one and can also involve a number of people. Chat rooms can also be moderated and/or supervised.
Click bait: Some headlines on the web are eye catching, sensational and misleading. It definitely intrigues readers to click and view the story. Usually the purpose of click baits’ – to generate page views and/or revenues. But leads to viewing inappropriate content and even malware.
Cyber bullying: Intentional and repeated harm inflicted through the use of computers, cell phones, and other electronic devices. It includes sending, posting, or sharing negative, harmful, false, or mean content about someone. It also includes sharing personal or private information about someone else causing embarrassment or humiliation.
Cyber stalking: Methods used to repeatedly harass someone using networked technology; intimidating and being invasive of privacy.
Cyber threats: A possible danger that exploits the vulnerability to breach security and cause harm, either intentionally and/or accidently.
Diary Use: When their network starts doing everything digitally, then kids start substituting their physical presence with an online persona and apply personality development to the online profile.
Doxing: Searching for and the publishing of personal information of an individual. Doxers use the information to attack, threaten and harass them.
Disinformation: False information deliberately and covertly spread to mislead and influence public opinion or obscure the truth. The information is intentionally presented by the manipulation of facts to tweak the narrative, i.e., used as a tool of propaganda. Example, if someone intentionally and strategically sends out information in the form of articles, photos, memes, videos, etc., that they know is untrue its disinformation.
Fake News: Meme culture and picture posts, we usually believe what we see, without proper verification. For example, with global news about Coronavirus reaching users, memes and fake news about symptoms have also been widespread.
FOMO: Fear of Missing Out – a phenomenon in the digital age and world that describes the feeling of sadness, loss and/or of not being in pace with others, usually peer group in experiencing something that is considered as an “amazing experience” by others. It can lead to anger issues, anxiety and depression.
Gamer Gate: The Gamer Gate controversy (August 2014) which targeted several women in the video game industry. It’s concerned with the ethics in game journalism and with protecting the `gamer” identity. The issue whirls around the issues of sexism in video game culture.
Grooming: Some people use online mediums across the internet to connect with children so that they can exploit them or even blackmail them for sexual purposes.
Hacking: The act of evading security and breaking into authorized locations, i.e., a network, computer, file, etc., usually with malicious intent.
Happy Slapping: It is a fad that originated in 2005, in the United Kingdom. Here, one or more than one person attacks a victim for the purpose of recording it.
Hashtag: It’s a word or phrase which is preceded by the sign “#” It is to categorize information so as to make it searchable and user friendly.
Identity theft: Deliberately using someone identity as a method to milk financial and/or emotional advantage. The person involved is left to suffer a loss.
JOMO: The Joy of Missing Out – it’s about disconnecting, opting out and being okay with where you are, like a retreat from the real world.
Like Baiting: The practice of explicitly requesting likes, shares, comments so as to increase engagement on social media, and to boast of having ‘n’ number of likes or followers. For example, ‘One like is equal to one prayer.’
Mal-information: When genuine information is shared to cause harm, often by moving information designed to stay private into the public sphere.
Example, if someone sends out a personal picture and/or video to another person without their consent to take revenge and/or cause harm and harass.
Misinformation: False information that is inadvertently spread and published regardless of the intent to fabricate facts and/or mislead.
Example, when an individual sees this disinformation, in the form of articles, photos, videos, etc., and believes it, and then shares it, that’s misinformation.
Netiquette: An abbreviation that comes from the amalgamation of two words – “Network” and “Etiquette.” It marks the guidelines for courteous and responsible communication online. The purpose is to enable us to build and maintain a pleasant, comfortable, inclusive and responsible online environment.
Passwords: A personalized (memorized) code to confirm the identity of a user. It should be strong enough for securing your information.
Permission: A formal consent/authorization granted by the user.
Pharming: A kind of a cyber attack intended to redirect a website’s traffic to a fake website.
Phishing: The attempt to fraudulently acquire sensitive information such as usernames, passwords, or bank/card information, etc. by disguising as authentic electronic communication, usually email or even a phone call. It’s also a method of spreading electronic viruses.
Pretexting: The act of masquerading a good pretext to strive to steal victim’s personal information. The scammer builds up the pretext of asking for “bits of information” to verify their identity. The data acquired is used to commit identity theft.
Private: A social media setting that enables and protects content from the public eye. Users have to offer a request to follow private accounts to see their content. Always keep your account safe by using the private mode! It’s a smart option!
Revenge Porn: Distribution of sexually explicit videos and/or photos of individuals without their permission. It can also be made and leaked by a partner, hence, revenge.
The possession of the explicit content is used by perpetrators to blackmail and harass individuals.
Sad Fishing: The act of emotionally exaggerating problems to gain sympathy. The other name for it is “cat fishing”. In other words, it’s basically to pretend to go through a hard time (at least pretend more than what’s reality). It usually hurts the younger crowd making them open to bullying. It’s seen as an extension of cyber bullying as it seeks attention and attracts bullies and pedophiles in the loop.
Sexting: Sending, receiving, or forwarding sexually explicit messages, photographs through a digital device, of oneself to others. It can be used for further blackmailing and harassment.
Sextortion: Another form of revenge porn employing forms of coercion that isn’t physical so as to extort sexual favors from victims. It refers to sexual exploitation through coercion and threatening the release of information/images.
Shoulder Surfing: A technique used to obtain information like PINs, passwords and other confidential data by literally looking over the victim’s shoulder. The attacker just needs to be close vicinity and keep a keen eye on the victim’s typing pattern and surroundings. Crowded places are open to more such kinds of attacks.
Spam: Then “spam” or “junk” folder in your emails are a gateway to unnecessary and repetitive content so as to clog the inbox. Make sure you don’t respond to spam messages and delete them.
Trojan Horse: Trojans leave our computer completely unprotected. They’re a type of malicious code or software that looks legitimate, but makes your computer susceptible to hacking without the hacker being detected.
Troll: Social media users, who can be found with malicious intentions and sometimes with a fake identity, which deliberately uses offensive, hateful remarks to annoy and/or ignite, with the sole aim of provoking and harassing others.
Voyeurism: It is defined as taking interest or having interest in observing unsuspecting people – adults or children- without their knowledge and consent. The act of voyeurism gives precedent to the voyeur because the person being watched is unaware of the fact that s/he is being watched. A more common way of referring to the person doing the watching is “peeping Tom”.
Whaling Attack: An advanced form of phishing used to guise as a part of an organization and target the senior or important members, with the intent to seize sensitive information and/or rob money.