Antivirus: A software program used to detect, prevent and remove viruses from your device(s) like – computer/laptop and/or mobile phones. They are also used for the emails, chats that you receive, and even the web pages you open
App: It’s a short form for ‘application’ and is a software program designed to fulfill the purpose and is downloaded by the user to mobile and computer/laptop devices. Eg: Whatsapp, Instagram, Facebook.
Blocking: Voluntary denial of access to particular parts of the internet, like sending messages or viewing posts.
Bookmarks: The web pages that one wants to save for future reference/use can be stored in your browser directly. You can see a ‘star’ icon on the top right side of you the URL bar; by clicking the same the web page will be saved.
Catfishing: A deceptive activity of setting up a fictitious online profile, most often for the purpose of luring another by monetarily trapping them or forging a fraudulent relationship using subtle manipulation.
Chat Rooms: A place where multiple users can communicate electronically. It can be both one-on-one and can also involve a number of people. Chat rooms can also be moderated and/or supervised.
Click bait: Some headlines on the web are eye catching, sensational and misleading. It definitely intrigues readers to click and view the story. Usually the purpose of click baits’ – to generate page views and/or revenues. But leads to viewing inappropriate content and even malware.
Cookie: A cookie is a tiny file that sent to a web browser by a served and gets stored in the computer’s brain. The server reads it every time we go back to the same website, and keeps a track of our preferences. Example: Our shopping choices appear on other pages.
Creeping: It is to follow someone’s social media account closely and excessively. It’s also known as ‘online stalking’.
Cyber bullying: Intentional and repeated harm inflicted through the use of computers, cell phones, and other electronic devices. It includes sending, posting, or sharing negative, harmful, false, or mean content about someone. It also includes sharing personal or private information about someone else causing embarrassment or humiliation.
Cyber stalking: Methods used to repeatedly harass someone using networked technology; intimidating and being invasive of privacy.
Cyber threats: A possible danger that exploits the vulnerability to breach security and cause harm, either intentionally and/or accidently.
Diary Use: When their network starts doing everything digitally, then kids start substituting their physical presence with an online persona and apply personality development to the online profile.
Doxing: Searching for and the publishing of personal information of an individual. Doxers use the information to attack, threaten and harass them.
Disinformation: False information deliberately and covertly spread to mislead and influence public opinion or obscure the truth. The information is intentionally presented by the manipulation of facts to tweak the narrative, i.e., used as a tool of propaganda. Example, if someone intentionally and strategically sends out information in the form of articles, photos, memes, videos, etc., that they know is untrue its disinformation.
Fake News: Meme culture and picture posts, we usually believe what we see, without proper verification. For example, with global news about Coronavirus reaching users, memes and fake news about symptoms have also been widespread.
FOMO: Fear of Missing Out – a phenomenon in the digital age and world that describes the feeling of sadness, loss and/or of not being in pace with others, usually peer group in experiencing something that is considered as an “amazing experience” by others. It can lead to anger issues, anxiety and depression.
Gamer Gate: The Gamer Gate controversy (August 2014) which targeted several women in the video game industry. It’s concerned with the ethics in game journalism and with protecting the `gamer” identity. The issue whirls around the issues of sexism in video game culture.
Grooming: Some people use online mediums across the internet to connect with children so that they can exploit them or even blackmail them for sexual purposes.
Hacking: The act of evading security and breaking into authorized locations, i.e., a network, computer, file, etc., usually with malicious intent.
Happy Slapping: It is a fad that originated in 2005, in the United Kingdom. Here, one or more than one person attacks a victim for the purpose of recording it.
Hashtag: It’s a word or phrase which is preceded by the sign “#” It is to categorize information so as to make it searchable and user friendly.
Identity theft: Deliberately using someone identity as a method to milk financial and/or emotional advantage. The person involved is left to suffer a loss.
JOMO: The Joy of Missing Out – it’s about disconnecting, opting out and being okay with where you are, like a retreat from the real world.
Like Baiting: The practice of explicitly requesting likes, shares, comments so as to increase engagement on social media, and to boast of having ‘n’ number of likes or followers. For example, ‘One like is equal to one prayer.’
Mal-information: When genuine information is shared to cause harm, often by moving information designed to stay private into the public sphere.
Example, if someone sends out a personal picture and/or video to another person without their consent to take revenge and/or cause harm and harass.
Misinformation: False information that is inadvertently spread and published regardless of the intent to fabricate facts and/or mislead.
Example, when an individual sees this disinformation, in the form of articles, photos, videos, etc., and believes it, and then shares it, that’s misinformation.
MMS: Multimedia Messaging Service (MMS) is a standard way to send messages that includes multimedia content, i.e., images/videos, etc from one mobile to another over a cellular network.
Netiquette: An abbreviation that comes from the amalgamation of two words – “Network” and “Etiquette.” It marks the guidelines for courteous and responsible communication online. The purpose is to enable us to build and maintain a pleasant, comfortable, inclusive and responsible online environment.
Passwords: A personalized (memorized) code to confirm the identity of a user. It should be strong enough for securing your information.
Parental Control: It’s a software program that can be installed on your devices (computers/tabs/mobiles) and even the television so as to restrict what children can view and do. The restriction to access is for websites, content, chat rooms, etc which may be age inappropriate. No parental control software should be used its isolation. It should always involve talking to children and sharing online activities with them.
Permission: A formal consent/authorization granted by the user.
Pharming: A kind of a cyber attack intended to redirect a website’s traffic to a fake website.
Phishing: The attempt to fraudulently acquire sensitive information such as usernames, passwords, or bank/card information, etc. by disguising as authentic electronic communication, usually email or even a phone call. It’s also a method of spreading electronic viruses.
Pretexting: The act of masquerading a good pretext to strive to steal victim’s personal information. The scammer builds up the pretext of asking for “bits of information” to verify their identity. The data acquired is used to commit identity theft.
Private: A social media setting that enables and protects content from the public eye. Users have to offer a request to follow private accounts to see their content. Always keep your account safe by using the private mode! It’s a smart option!
Revenge Porn: Distribution of sexually explicit videos and/or photos of individuals without their permission. It can also be made and leaked by a partner, hence, revenge.
The possession of the explicit content is used by perpetrators to blackmail and harass individuals.
Sad Fishing: The act of emotionally exaggerating problems to gain sympathy. The other name for it is “cat fishing”. In other words, it’s basically to pretend to go through a hard time (at least pretend more than what’s reality). It usually hurts the younger crowd making them open to bullying. It’s seen as an extension of cyber bullying as it seeks attention and attracts bullies and pedophiles in the loop.
Sexting: Sending, receiving, or forwarding sexually explicit messages, photographs through a digital device, of oneself to others. It can be used for further blackmailing and harassment.
Sextortion: Another form of revenge porn employing forms of coercion that isn’t physical so as to extort sexual favors from victims. It refers to sexual exploitation through coercion and threatening the release of information/images.
Shoulder Surfing: A technique used to obtain information like PINs, passwords and other confidential data by literally looking over the victim’s shoulder. The attacker just needs to be close vicinity and keep a keen eye on the victim’s typing pattern and surroundings. Crowded places are open to more such kinds of attacks.
Spam: Then “spam” or “junk” folder in your emails are a gateway to unnecessary and repetitive content so as to clog the inbox. Make sure you don’t respond to spam messages and delete them.
SMS: Short Message Service (SMS) is the typical way of messaging someone that only contains alphabetical and numeric characters (now even emoticons) between user(s) on a mobile, computer/laptop or other electronic devices.
Trojan Horse: Trojans leave our computer completely unprotected. They’re a type of malicious code or software that looks legitimate, but makes your computer susceptible to hacking without the hacker being detected.
Troll: Social media users, who can be found with malicious intentions and sometimes with a fake identity, which deliberately uses offensive, hateful remarks to annoy and/or ignite, with the sole aim of provoking and harassing others.
Voyeurism: It is defined as taking interest or having interest in observing unsuspecting people – adults or children- without their knowledge and consent. The act of voyeurism gives precedent to the voyeur because the person being watched is unaware of the fact that s/he is being watched. A more common way of referring to the person doing the watching is “peeping Tom”.
Whaling Attack: An advanced form of phishing used to guise as a part of an organization and target the senior or important members, with the intent to seize sensitive information and/or rob money.