Mayaa SH Speaks on Cybersecurity Risks, Internet Addiction and Impersonation

Social Activist and Literary Trailblazer Mayaa SH speaks on the increasing trends of cybersecurity risks, Impersonation and Defamatory Content.

Some sections notably women, girls and marginalised groupsare at higher risk of cyber violence, bullying, harrasy and cyberattacks just because of who they are and where in the world they are. Predominantly, the root cause of violence against women and girls is gender inequality.."

Mayaa SH Speaks on Cybersecurity Risks, Internet Addiction and Impersonation

What is the extend to cybersecurity risks nowadays?

Defending against cyberthreats is a critical and ongoing process that requires a proactive and multifaceted approach. Social engineering, third-party exposure, cloud vulnerabilities, ransomware, are the top threats that organizations should focus on to protect their data, systems, and reputations. Social media platforms like X (formally Twitter), Facebook, Instagram, Reddit, YouTube, Discord, and Twitch are the new arenas for discussion, community, and yes, defamation and harassment. Many platforms allow users to post anonymously which only further emboldens online impersonation, cyberstalking, blackmail, and other unlawful speech. Not all offending speech is defamation, however. An online post, tweet (or retweet), video, or comment is online defamation only if it is a (1) false statement about a specific person; (2) posted or communicated to another person (or to the internet generally); and (3) damages a person’s reputation. If you believe you have been defamed , there are several steps you can take to squarely address it, to unmask anonymous posters, and to hold them accountable. Every social media platform has terms of service which provide specific ways for users to report prohibited posts. Posts which promote violence, divulge private information such as someone’s credit card number or street address or which are otherwise harassing violate those policies. If the offending post falls into those categories, you can report the post directly to the platform (after you preserve the post). Reporting the post is the quickest path to its removal. If the nature of the online defamation is sufficiently extreme, then a letter to the defamer (from a law firm) possibly followed by a lawsuit may be appropriate. Online offending speech often supports lawsuits alleging defamation, false light invasion of privacy, intentional or negligent infliction of emotional distress among other claims seeking removal of the offending speech and monetary damages. Lawsuits are especially useful however, to unmask anonymous users.

How can you help prevent Internet Addiction And Cyberbullying?

Internet addiction is a problem because it can lead to problems in our personal lives and in our relationships. There are many reasons why people become addicted to the Internet. Sometimes people become addicted because they find it difficult to stop using the Internet. Other times, people become addicted because they use the Internet to escape from problems in their lives. Internet addiction can also lead to cyberbullying. Cyberbullying is bullying that takes place online. It can happen when one person bullies another person online. Cyberbullies often take advantage of people who are weak or vulnerable. They can make their victim feel very uncomfortable and scared. Cyberbullying can be done through texts, emails, social media posts, and even online games. Cyberbullying can be a very serious problem. It can cause depression, anxiety, and even suicide in some cases. It’s important to know what cyberbullying is and how to identify it. Cyberbullying can take many forms, including:

(1) Harassment: 

Repeatedly sending offensive, rude, and insulting messages.

(2) Denigration: 

Posting harmful or false information about someone.

(3) Impersonation:

Pretending to be someone else to damage that person’s reputation.

(4) Outing: 

Sharing someone’s secrets or personal information online.

(5) Exclusion:

Intentionally excluding someone from an online group or activity. You can also help prevent cyberbullying by being aware of the warning signs and talking to your children about it. One of the ways that cyberbullying works is by using technology to bully people. Cyberbullying often takes the form of online comments, messages, and photos. It can also involve sending harmful emails or making mean phone calls and even threats.To prevent internet addiction and cyberbullying the following can be done:

1) Talk about the issue: 

It’s one thing to read about cyberbullying and think “that couldn’t happen to me,” but it’s another thing altogether when you’re face-to-face with someone who is harassing you online. Open up about what’s happening to you so that others can understand and hopefully provide some support.

2) Set boundaries:

If something online is making you feel uncomfortable or like you’re going too far, set boundaries for yourself and stick to them. Don’t let anyone push you around or make you do anything that makes you feel uncomfortable or scared.

3) Use social media responsibly:

Social media has been shown time and time again to be one of the most effective ways for people to bully others. We need to use social media responsibly, stay aware of our surroundings, and never post anything that would embarrass or hurt someone.

 What Is Impersonation and Protection Around It?

Impersonation refers to the overarching concept of assuming another person's identity, while impersonating focuses on the specific action or behavior of pretending to be someone else.
Impersonation can involve various activities, including creating fake profiles, assuming a false identity, or deceiving others by imitating someone's characteristics or traits. On the other hand, impersonating refers to the active engagement in the act of assuming another person's identity, whether online or in person, with the intent to deceive or defraud others. Protecting Yourself from Impersonation is very important amidst today's technologically advancements and to mitigate any cybersecurity risks. While it may not be possible to completely eliminate the risk of impersonation, there are several measures individuals can take to protect themselves:

(1) Strengthen Online Security: Use strong, unique passwords for all online accounts and enable two-factor authentication when available. Regularly update software and be cautious of phishing attempts.

(2) Privacy Settings: Adjust privacy settings on social media platforms to restrict access to personal information and posts. Be mindful of the information shared publicly, as it can be used by impersonators for their advantage.

(3) Verify Identity: Be cautious when interacting with individuals or organizations online. Verify the identity of unknown contacts through independent channels or official websites before sharing personal information or engaging in financial transactions.

(4) Educate Yourself: Stay informed about the latest impersonation techniques and scams. Be skeptical of suspicious requests for personal information or financial transactions, especially from unfamiliar sources. Cybercrimes such as online defamation can be filed with the Cyber Crime Investigation Cell, which is a branch of the Criminal Investigation Department. These Cells have branches across various cities such as New Delhi, Tamil Nadu, Gurgaon, Pune, etc. They deal with all the crimes whose subject matter is related to crimes in cyberspace and offences related to the computer, computer resources, internet, etc. Before filing an online defamation claim, the complainant must note that these crimes are taken seriously and put their reputation at stake as well. The burden of proof lies on the complainant and if they are not able to establish the offence, the respondent can file a counter-suit for defamation and damages thereto.

 Conclusion:

Cybersecurity Risks, Internet Addiction and Impersonation are classified as deceptive practices with serious consequences for individuals and society. By understanding the risks, examples, and implications of impersonation, individuals can take proactive steps to protect themselves and mitigate the potential damage caused by impersonators. It is crucial to remain vigilant, practice good online security habits, and report any suspected impersonation incidents to the appropriate authorities or platforms. By staying informed and proactive, we can navigate the digital landscape with greater confidence and protect ourselves from the threats of impersonation.

"Social Media is a powerful catalyst for social change, but it’s also a reflection of our mindset and ideology. We must use it to amplify unheard voices, challenge any harrassment and build a more equitable world for a greater purpose on highlights on responsible and judicious use."


About The Author

Mayaa SH also known as Mayaa Devi, Mayaa Tai, Mayaa Di,Mayaa Audio SH, Pushpa ‘The Fire’, Padma Of The East, Lady Robin Hood, MS Dhoni Of Writing, Lady Singham, Lady Karl Marx, Lady Thor, Phantom Mayaa and Lady Gandhi is a known name in Contemporary Literature. She is a Multi-National Award Winner, a thirteen times a World Record Holder, An Artist, a Podcaster, a Record Chart Topping International Fastest Anthology Co-Authoress and has been chosen as number 1 The Modern Literary Stars Of India, 2022 by Cherry Book Awards for making valuable contribution to Contemporary Indian Literature. She has Won In Memorable Performance in the category termed as ‘Other than English write ups “ for her appreciation of hard work, creativity and dedication in Grand Christmas Competition 2.0 which has been a world record event of the largest creative event hosted online with more than 1000+participants. Mayaa SH is a Women Empowerment Culturist and a gender equality exponent to position and contextualize her work within the 2030 Agenda for Sustainable Development.
She has depicted gender inclusivity and equality through her certifications from the United Nations and powerful writings on Feminism, Gender Equality, Transforming Vision Into Action: Transmogrification on Transgender Community and Mental Health Awareness Topics. Her work depicts the identity, economic and social freedom of many. She has co-authored more than hundred and fifty plus anthologies with 14 solo books and has been aligned with more than 85 publication houses. She has been featured in several magazines and women oriented like Tejaswi -The Imperishable on Women Power and Honour including few international magazines. Her first poem “The Candle In The Wind” made her win an Award at the National Level. She navigates many women through stress by deploying talking as a medium to combat stress and fear.

Publishing Pitaara

Publishing Pitaara is your go-to platform for the latest happenings, insightful analyses, and thought-provoking articles from the world of public relations, branding, and beyond.

Post a Comment

Previous Post Next Post

ADS

ADS