prevention of cyber stalking safety of teenagers … · family members ( real girls, real pressure:...

11
Abstract r r Banasthali University, Jaipur, Email: [email protected] The Doon School, Dehradun Keywords: Cybersafe, Cyberstalking, Teenagers safety, cyber crime, prevention cyber stalking Introduction Teenagers are besieged with multiple insecurities for various reasons ranging from social/peer pressure, self doubts and hormonal changes and are trying to find an identity for themselves. Girls felt that they were not good enough or did not measure up in some ways be it looks, performance in school and /relationships with friends and family members ( Real Girls, Real Pressure: A National Report on the State of Self- Esteem, Dove , 2008). It is not just females; teenage boys also worry about their body image, which is a risk factor for elevated depressive symptoms among adolescent boys (Blashill, Aaron J.; Wilhelm, Sabine (2014)). These insecurities, impact on their behavior; Teens who were insecure about their social status, try to increase their social status, while others who wanted to be more likeable adopt and exhibit prosocial behavior. (Michelle Wright 2013) Internet is emerging as one of the platforms that teenagers are adopting to socialize. Internet has become a must for information access for teens (and all ages alike) due to its voracious capability to fetch information sought in a matter of seconds, making it an essential informational/ educational tool that parents find hard to deny92% of teens go online daily while 24% r r Lalita Minocha Shreyas Minocha PREVENTION OF CYBER STALKING SAFETY OF TEENAGERS OVER INTERNET AS A MEDIUM- A STUDY “Prevention is better than cure” not only for health measures, but also for being alert when it comes to safety, offline as well as online. As per the NCRB report (2014, chapter 18) the number of cases reported under cyber crime was 9622 as compared to 5693 in 2013. This indicates a significant 69.0% increase over the previous year. Further, Cyber crime is a category of crime, which seems to be affecting a wide spread of ages including teenagers, which is alarming. Children get exposed to Internet at a young age due to educational requirement, self interest or due to peer/social pressure. How aware are they of Do's and Don'ts of cyberspace? Exploitation of children in cyberspace can create havoc on the victim's mind, and can lead to disastrous consequences as in the case of Amanda Todd, a 15-year-old Canadian girl, whose suicide caused lots of shock waves in the minds of masses. A survey was conducted to assess cyber alertness of the audience. Survey results of a sample group where over 93% were teenagers are being published herewith. It was concluded that though the target audience indicated that their safety on the net being very important to them and over 97% of the segment had sufficient or more knowledge of technology, but a significant number of them were doing things in the cyber space, which are not advisable from the perspective of cyber safety. 37 12 ®…“b˜™…… ®…“®……Δ∫…… July - September 2017

Upload: others

Post on 21-May-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: PREVENTION OF CYBER STALKING SAFETY OF TEENAGERS … · family members ( Real Girls, Real Pressure: A National Report on the State of Self- ... the number of cases reported under

Abstract

r

r

Banasthali University, Jaipur, Email: [email protected] Doon School, Dehradun

Keywords: Cybersafe, Cyberstalking, Teenagers safety, cyber crime, prevention cyber stalking

IntroductionTeenagers are besieged with multiple

insecurities for various reasons ranging fromsocial/peer pressure, self doubts andhormonal changes and are trying to find anidentity for themselves. Girls felt that theywere not good enough or did not measure upin some ways be it looks, performance inschool and /relationships with friends andfamily members ( Real Girls, Real Pressure:A National Report on the State of Self-Esteem, Dove , 2008).

It is not just females; teenage boys alsoworry about their body image, which is a riskfactor for elevated depressive symptomsamong adolescent boys (Blashill, Aaron J.;

Wilhelm, Sabine (2014)).These insecurities, impact on their

behavior; Teens who were insecure abouttheir social status, try to increase their socialstatus, while others who wanted to be morelikeable adopt and exhibit prosocial behavior.(Michelle Wright 2013)

Internet is emerging as one of theplatforms that teenagers are adopting tosocialize. Internet has become a must forinformation access for teens (and all agesalike) due to its voracious capability to fetchinformation sought in a matter of seconds,making it an essential informational/educational tool that parents find hard todeny92% of teens go online daily while 24%

r

r

Lalita MinochaShreyas Minocha

PREVENTION OF CYBER STALKINGSAFETY OF TEENAGERS OVER INTERNET

AS A MEDIUM- A STUDY

“Prevention is better than cure” not only for health measures, but also for being alertwhen it comes to safety, offline as well as online. As per the NCRB report (2014, chapter18) the number of cases reported under cyber crime was 9622 as compared to 5693 in2013. This indicates a significant 69.0% increase over the previous year.Further, Cyber crime is a category of crime, which seems to be affecting a wide spread ofages including teenagers, which is alarming. Children get exposed to Internet at a youngage due to educational requirement, self interest or due to peer/social pressure. Howaware are they of Do's and Don'ts of cyberspace? Exploitation of children in cyberspacecan create havoc on the victim's mind, and can lead to disastrous consequences as in thecase of Amanda Todd, a 15-year-old Canadian girl, whose suicide caused lots of shockwaves in the minds of masses.A survey was conducted to assess cyber alertness of the audience. Survey results of asample group where over 93% were teenagers are being published herewith. It wasconcluded that though the target audience indicated that their safety on the net beingvery important to them and over 97% of the segment had sufficient or more knowledgeof technology, but a significant number of them were doing things in the cyber space,which are not advisable from the perspective of cyber safety.

13

July - September 2017

3712

®…“�b˜™…… ®…“®……∆∫……

July - September 2017

of teenagers go online “almost constantly”.More than half (56%) of teens, who weresurveyed in this report go online several timesa day, and 12% reported once-a-day use. Justabout 6% of teens reported going onlineweekly, while just about 2% go online lessoften. (Pew Research Center, 2015 ), withFacebook being the most popular andfrequently used social media platform amongteenagers (41%). This was followed byInstagram (20%) and Snapchat (11%).

The challenging aspect is that it alsoexposes the child to all the information that isavailable on the World Wide Web, that mightnot be appropriate for their young minds andalso to various social networking sites, wherethey tend to be-friend strangers, who couldactually be masked people with hiddenobjectives, ranging from money making toseeking sadis t ic / sexua l p leasures .Befriending these people, eventually adds upto the stress on these young minds, loweringtheir self-esteem and increasing depression(Anderson, Bresnahan, and Musatics(2014)), sometimes leading them to take theextreme step of committing suicide.

The top five teen Internet activitiesare: using SNS; accessing current event newsand information; purchasing items; sharingartwork, photos, videos, and stories; andfinding (Pew, 2010).

While it might not be practical to denyaccess to Internet to students, it will also beimproper to give up completely on the state ofaffairs, as they stand and hope for the best.

Prevention is always better than cure,across all media, offline or online. Sincedifferent age groups are likely to havedifferent motivations and behaviouralpatterns on the internet, it might be moreappropriate to study them as separate groups.To come up with preventive measures, itmight be worthwhile to study the problem

and its root cause in more details, and collectsome primary information from the usersthemselves to start with.

There was a study conducted bySameer Hinduja and Justin W. Patchin (2015)on a random sample of students between theages of 11 and 15 from a middle school in theMidwestern United States. Approximately43% of the students had experienced cyberbullying during their lifetime. 15% ofstudents confirmed cyber bullying others.More number of Adolescent girls hadexperienced cyber bullying than boys in theirlifetime (40.6% compared to 28.2%). Thereport also indicated that girls had a highertendency to post nasty comments, while boyshad a greater tendency to post offensivepictures or videos online.

As per another study by Anderson,Bresnahan, and Musatics (2014), Cyberbullying has negative effects on victims,which include lowering self-esteem andincreasing depression. It also developsfeelings of powerlessness.

Yet another research that analysedmultiple studies of Cyber bullying, found thatCyberbullying is linked to depression inteenagers. (Psych Central News, 2015).

In 2013, many teenagers' suicideswere linked to a particular social networkingsite Ask.fm, after which victimization ofyoung people was scrutinised. The siteask.fm, users can ask each other questionsanonymously. This prompted the site toinitiate new safety measures. Another socialnetworking site, Twitter, also announced itsplans to suspend bullying users and filter outbullying tweets.

Studies of Michele Hamm, aresearcher at the University of Alberta reflectthat the use of Social media is very commonamong teenagers, but impact of cyber

Prior studies

Page 2: PREVENTION OF CYBER STALKING SAFETY OF TEENAGERS … · family members ( Real Girls, Real Pressure: A National Report on the State of Self- ... the number of cases reported under

Abstract

r

r

Banasthali University, Jaipur, Email: [email protected] Doon School, Dehradun

Keywords: Cybersafe, Cyberstalking, Teenagers safety, cyber crime, prevention cyber stalking

IntroductionTeenagers are besieged with multiple

insecurities for various reasons ranging fromsocial/peer pressure, self doubts andhormonal changes and are trying to find anidentity for themselves. Girls felt that theywere not good enough or did not measure upin some ways be it looks, performance inschool and /relationships with friends andfamily members ( Real Girls, Real Pressure:A National Report on the State of Self-Esteem, Dove , 2008).

It is not just females; teenage boys alsoworry about their body image, which is a riskfactor for elevated depressive symptomsamong adolescent boys (Blashill, Aaron J.;

Wilhelm, Sabine (2014)).These insecurities, impact on their

behavior; Teens who were insecure abouttheir social status, try to increase their socialstatus, while others who wanted to be morelikeable adopt and exhibit prosocial behavior.(Michelle Wright 2013)

Internet is emerging as one of theplatforms that teenagers are adopting tosocialize. Internet has become a must forinformation access for teens (and all agesalike) due to its voracious capability to fetchinformation sought in a matter of seconds,making it an essential informational/educational tool that parents find hard todeny92% of teens go online daily while 24%

r

r

Lalita MinochaShreyas Minocha

PREVENTION OF CYBER STALKINGSAFETY OF TEENAGERS OVER INTERNET

AS A MEDIUM- A STUDY

“Prevention is better than cure” not only for health measures, but also for being alertwhen it comes to safety, offline as well as online. As per the NCRB report (2014, chapter18) the number of cases reported under cyber crime was 9622 as compared to 5693 in2013. This indicates a significant 69.0% increase over the previous year.Further, Cyber crime is a category of crime, which seems to be affecting a wide spread ofages including teenagers, which is alarming. Children get exposed to Internet at a youngage due to educational requirement, self interest or due to peer/social pressure. Howaware are they of Do's and Don'ts of cyberspace? Exploitation of children in cyberspacecan create havoc on the victim's mind, and can lead to disastrous consequences as in thecase of Amanda Todd, a 15-year-old Canadian girl, whose suicide caused lots of shockwaves in the minds of masses.A survey was conducted to assess cyber alertness of the audience. Survey results of asample group where over 93% were teenagers are being published herewith. It wasconcluded that though the target audience indicated that their safety on the net beingvery important to them and over 97% of the segment had sufficient or more knowledgeof technology, but a significant number of them were doing things in the cyber space,which are not advisable from the perspective of cyber safety.

13

®…“�b˜™…… ®…“®……∆∫……

July - September 2017

3712

July - September 2017

of teenagers go online “almost constantly”.More than half (56%) of teens, who weresurveyed in this report go online several timesa day, and 12% reported once-a-day use. Justabout 6% of teens reported going onlineweekly, while just about 2% go online lessoften. (Pew Research Center, 2015 ), withFacebook being the most popular andfrequently used social media platform amongteenagers (41%). This was followed byInstagram (20%) and Snapchat (11%).

The challenging aspect is that it alsoexposes the child to all the information that isavailable on the World Wide Web, that mightnot be appropriate for their young minds andalso to various social networking sites, wherethey tend to be-friend strangers, who couldactually be masked people with hiddenobjectives, ranging from money making toseeking sadis t ic / sexua l p leasures .Befriending these people, eventually adds upto the stress on these young minds, loweringtheir self-esteem and increasing depression(Anderson, Bresnahan, and Musatics(2014)), sometimes leading them to take theextreme step of committing suicide.

The top five teen Internet activitiesare: using SNS; accessing current event newsand information; purchasing items; sharingartwork, photos, videos, and stories; andfinding (Pew, 2010).

While it might not be practical to denyaccess to Internet to students, it will also beimproper to give up completely on the state ofaffairs, as they stand and hope for the best.

Prevention is always better than cure,across all media, offline or online. Sincedifferent age groups are likely to havedifferent motivations and behaviouralpatterns on the internet, it might be moreappropriate to study them as separate groups.To come up with preventive measures, itmight be worthwhile to study the problem

and its root cause in more details, and collectsome primary information from the usersthemselves to start with.

There was a study conducted bySameer Hinduja and Justin W. Patchin (2015)on a random sample of students between theages of 11 and 15 from a middle school in theMidwestern United States. Approximately43% of the students had experienced cyberbullying during their lifetime. 15% ofstudents confirmed cyber bullying others.More number of Adolescent girls hadexperienced cyber bullying than boys in theirlifetime (40.6% compared to 28.2%). Thereport also indicated that girls had a highertendency to post nasty comments, while boyshad a greater tendency to post offensivepictures or videos online.

As per another study by Anderson,Bresnahan, and Musatics (2014), Cyberbullying has negative effects on victims,which include lowering self-esteem andincreasing depression. It also developsfeelings of powerlessness.

Yet another research that analysedmultiple studies of Cyber bullying, found thatCyberbullying is linked to depression inteenagers. (Psych Central News, 2015).

In 2013, many teenagers' suicideswere linked to a particular social networkingsite Ask.fm, after which victimization ofyoung people was scrutinised. The siteask.fm, users can ask each other questionsanonymously. This prompted the site toinitiate new safety measures. Another socialnetworking site, Twitter, also announced itsplans to suspend bullying users and filter outbullying tweets.

Studies of Michele Hamm, aresearcher at the University of Alberta reflectthat the use of Social media is very commonamong teenagers, but impact of cyber

Prior studies

Page 3: PREVENTION OF CYBER STALKING SAFETY OF TEENAGERS … · family members ( Real Girls, Real Pressure: A National Report on the State of Self- ... the number of cases reported under

bullying on social media sites is largelyunknown. In the new review, Hamm and hercolleagues stated that, "There were consistentassociations between exposure to cyberbullying and increased likelihood ofdepression" In subsequent studies, it wasfound that Regular, face-to-face bullyingduring the teen years may double the risk ofdepression in adulthood, and effects ofbullying can be as bad as or worse than childabuse.

The methodology applied in the studyis a survey of children primarily in their teensand take a closer look at their cyber habits.The methodology was to administer aquestionnaire with some multiple choicequestions and some questions with numericrating scale aimed at studying their cyberhabits as well as cyber alertness levels.

The study does this at two levels -apart from asking them upfront questions ontheir alertness on the cyber medium, safety onthe internet, and thought process beforeposting any message online, the survey alsotakes a closer look at their cyber habits andanalyses whether all that they did on the cybermedium in the process of chatting,downloading movies, applications, softwaresetc. was in the best interest of their own cybersafety.

The study has been conducted in anurban city among population, which hasunlimited access to internet. Most of thesample audience is primarily in their teens,with Computers as a study subject. Thesestudents invariably need computers to accessmore information on other subjects. Also, asthe study revealed the audience were techsavvy enough to find their way throughtechnology.

The questionnaire was administeredonline and students as well as teachers wereencouraged to take the survey. The surveywas undertaken by 91 participants, of whichover 93% participants were in the age Groupof 12 to 17.

The measure included three categoriesof questions, which were deliberatelyinterspersed. The first category of questionswas aimed at getting their demographicdetails, checking their access to the internetcomfort level with the technology.

The answers were multiple choiceoptions where the participants had to selectthe option that was closest to the answer ontheir mind; and numeric rating scale, whereparticipants choose the number on the scale,which they consider best described theiranswer with a rating of 10 indicatingmaximum, and a rating of 1 indicatingminimum level.

The other category of questions wereaimed at studying their cyber alertness levelfrom a theoretical perspective and includedquestions aimed at assessing their thoughtprocess before posting messages online,tendency to be-friend unknown peopleonline, interest in learning best onlinepractices . The answer options were multiplechoice questions or numeric rating scale,where the respondents could pick up thenumeric rating/option close to the answer ontheir mind.

The third categories of questions wereaimed at taking a closer look at their cyberhabits, which reflected their actions from theperspective of cyber safety. There werequestions related to the use of latest Operatingsystem, downloading torrents, use of Internetof Things, ad blockers, pirated software andso on. The answer options were multiple

Method

Sample

The Measure

15

July - September 2017

3714

®…“�b˜™…… ®…“®……∆∫……

July - September 2017

choices, as it provides for ease of categorisingand analyzing.

The objective of the study is tounderstand the underlying reasons behindcyber stalking / cyber bullying. To be able tocompletely tackle a problem, we shouldunderstand the process as a whole, thevictims, their awareness/alertness levels,their behavioural patterns; the offenders, theirmindset, objectives, modus operandi andlaws and regulations.

This survey intends assessing degreeof awareness and alertness among massesabout cyber safety measures, (especiallyteenagers) and also their comfort levels withtechnology. A similar survey will be doneacross different age group/ sociodemographic sector as well.

The survey intends analysing theircyber habits in terms of the reasons that pullthem to internet, and their tendency to do/notdo what is in the best interest of their owncyber safety.

The survey also assessed their thoughtprocess prior to posting messages online.These questions and answers will give us afairly good insight into whether the bestpractices are being followed by teens in theircyber journey for various interests.

Awide age group falls victim to Cyberstalking but different age groups havedifferent reasons for visiting Internet. As perNCRB Chapter18 out of 2867 persons, 1583persons (55.2%); were arrested in cybercrime cases under different sections of IPCwere in the age group of 18-30, while out of2867, 1035 people (36.1%) were in the agegroup of 30-45 years. 52 of the offenders werejuvenile (18%), The age group spread seen in

cases registered against SLL (special andlocal laws) and IT act 2000 was similar.

Same is the case of victims of cyberstalking. There have been cyber stalkingteens victims and cases reported in media oftheir committing suicide as a consequence ofit. Different demographic groups are likely tohave different reasons and fascinations, andbehavioural patterns on the internet, so it isbest to study their patterns separately as theunderlying reasons for these demographicsections being stalked might be different. So,to start with, a study was conducted focusedprimarily on teenagers, as now-a-daysComputer science being a subject of study formany of them, they are likely to be familiarwith IT techniques. On the Internet many ofus have a tendency to befriend strangers, whocould be their masked foes, or people with notso neat intentions, resulting in their fallingvictim to cyber stalking. So the survey wasaimed at a population with high percentage ofteens (over 93%).

According to a report by theUniversity of Michigan C.S. Mott Children'shospital national poll on children's health, ofthe top 10 health concern for 2015 Internetsafety appeared as fourth biggest safetyconcerns.

Internet has emerged as a newmedium, and has made many aspects of ourlives easier and efficient - be it official work,

The Objectives of the survey were asfollows:

How important is your privacy and safetyon the internet to you?

Results and discussionAge group of the audience

Page 4: PREVENTION OF CYBER STALKING SAFETY OF TEENAGERS … · family members ( Real Girls, Real Pressure: A National Report on the State of Self- ... the number of cases reported under

bullying on social media sites is largelyunknown. In the new review, Hamm and hercolleagues stated that, "There were consistentassociations between exposure to cyberbullying and increased likelihood ofdepression" In subsequent studies, it wasfound that Regular, face-to-face bullyingduring the teen years may double the risk ofdepression in adulthood, and effects ofbullying can be as bad as or worse than childabuse.

The methodology applied in the studyis a survey of children primarily in their teensand take a closer look at their cyber habits.The methodology was to administer aquestionnaire with some multiple choicequestions and some questions with numericrating scale aimed at studying their cyberhabits as well as cyber alertness levels.

The study does this at two levels -apart from asking them upfront questions ontheir alertness on the cyber medium, safety onthe internet, and thought process beforeposting any message online, the survey alsotakes a closer look at their cyber habits andanalyses whether all that they did on the cybermedium in the process of chatting,downloading movies, applications, softwaresetc. was in the best interest of their own cybersafety.

The study has been conducted in anurban city among population, which hasunlimited access to internet. Most of thesample audience is primarily in their teens,with Computers as a study subject. Thesestudents invariably need computers to accessmore information on other subjects. Also, asthe study revealed the audience were techsavvy enough to find their way throughtechnology.

The questionnaire was administeredonline and students as well as teachers wereencouraged to take the survey. The surveywas undertaken by 91 participants, of whichover 93% participants were in the age Groupof 12 to 17.

The measure included three categoriesof questions, which were deliberatelyinterspersed. The first category of questionswas aimed at getting their demographicdetails, checking their access to the internetcomfort level with the technology.

The answers were multiple choiceoptions where the participants had to selectthe option that was closest to the answer ontheir mind; and numeric rating scale, whereparticipants choose the number on the scale,which they consider best described theiranswer with a rating of 10 indicatingmaximum, and a rating of 1 indicatingminimum level.

The other category of questions wereaimed at studying their cyber alertness levelfrom a theoretical perspective and includedquestions aimed at assessing their thoughtprocess before posting messages online,tendency to be-friend unknown peopleonline, interest in learning best onlinepractices . The answer options were multiplechoice questions or numeric rating scale,where the respondents could pick up thenumeric rating/option close to the answer ontheir mind.

The third categories of questions wereaimed at taking a closer look at their cyberhabits, which reflected their actions from theperspective of cyber safety. There werequestions related to the use of latest Operatingsystem, downloading torrents, use of Internetof Things, ad blockers, pirated software andso on. The answer options were multiple

Method

Sample

The Measure

15

®…“�b˜™…… ®…“®……∆∫……

July - September 2017

3714

July - September 2017

choices, as it provides for ease of categorisingand analyzing.

The objective of the study is tounderstand the underlying reasons behindcyber stalking / cyber bullying. To be able tocompletely tackle a problem, we shouldunderstand the process as a whole, thevictims, their awareness/alertness levels,their behavioural patterns; the offenders, theirmindset, objectives, modus operandi andlaws and regulations.

This survey intends assessing degreeof awareness and alertness among massesabout cyber safety measures, (especiallyteenagers) and also their comfort levels withtechnology. A similar survey will be doneacross different age group/ sociodemographic sector as well.

The survey intends analysing theircyber habits in terms of the reasons that pullthem to internet, and their tendency to do/notdo what is in the best interest of their owncyber safety.

The survey also assessed their thoughtprocess prior to posting messages online.These questions and answers will give us afairly good insight into whether the bestpractices are being followed by teens in theircyber journey for various interests.

Awide age group falls victim to Cyberstalking but different age groups havedifferent reasons for visiting Internet. As perNCRB Chapter18 out of 2867 persons, 1583persons (55.2%); were arrested in cybercrime cases under different sections of IPCwere in the age group of 18-30, while out of2867, 1035 people (36.1%) were in the agegroup of 30-45 years. 52 of the offenders werejuvenile (18%), The age group spread seen in

cases registered against SLL (special andlocal laws) and IT act 2000 was similar.

Same is the case of victims of cyberstalking. There have been cyber stalkingteens victims and cases reported in media oftheir committing suicide as a consequence ofit. Different demographic groups are likely tohave different reasons and fascinations, andbehavioural patterns on the internet, so it isbest to study their patterns separately as theunderlying reasons for these demographicsections being stalked might be different. So,to start with, a study was conducted focusedprimarily on teenagers, as now-a-daysComputer science being a subject of study formany of them, they are likely to be familiarwith IT techniques. On the Internet many ofus have a tendency to befriend strangers, whocould be their masked foes, or people with notso neat intentions, resulting in their fallingvictim to cyber stalking. So the survey wasaimed at a population with high percentage ofteens (over 93%).

According to a report by theUniversity of Michigan C.S. Mott Children'shospital national poll on children's health, ofthe top 10 health concern for 2015 Internetsafety appeared as fourth biggest safetyconcerns.

Internet has emerged as a newmedium, and has made many aspects of ourlives easier and efficient - be it official work,

The Objectives of the survey were asfollows:

How important is your privacy and safetyon the internet to you?

Results and discussionAge group of the audience

Page 5: PREVENTION OF CYBER STALKING SAFETY OF TEENAGERS … · family members ( Real Girls, Real Pressure: A National Report on the State of Self- ... the number of cases reported under

communicat ion, matr imony, socialnetworking or e-learning, but like every otherthing, it has its own cons as well. Theanonymity and speed at which things moveon Internet, makes it all the more prone tocrime, a fact that is known to anycasual/serious users of the cyber medium.U n l i k e i n a n y o t h e r m e d i a l i k ePress/Electronic medium; on Internet, it is somuch easier to post any message aboutanyone, upload or download any piece ofinformation so it becomes all the moreimportant on our part to exercise caution,when interacting/transacting over theinternet. Gauging somebody's concern aboutprivacy and safety over the internet can bevery subjective open ended answer and theexpected answers will be,Yes, I am extremelyconcerned, highly concerned, concerned,why? not at all concerned, why should I be?and like, which would be hard to analyse.Hence, for the ease of analysis purpose, wedecided to use the numeric rating scale, andthe respondents were asked to rate them overa scale of 1-10, on how concerned did theyfeel about their safety over the internet.

When checked on how important istheir privacy and safety on the internet tothem? 47% rated themselves at 10 on a scaleof 10, indicating that they were highlyconcerned about their safety. 31.9% of theaudience gave themselves a rating of 8/9,which is also a very high rating. This ratingindicates that they were very concerned abouttheir safety on the internet. Respondents ofthese two categories put together comprise78.9%, which indicates that a significantlyhigh percentage of audience consider theirsafety and privacy on the net very important.

How aware they cons ideredthemselves of the risks of careless browsingon a scale of 10?

e-transactions, e-banking, e-learning.What is common across these processes iselectronic mode as well as ease andconvenience, speed and flexibility; but likeeverything else, there are cons of thiselectronic mode too, which is inherent due toanonymity inbuilt in this.

All the information in the world is nowliterally on your fingertips; available at a fewsmart clicks of the finger tips. It is true thatinternet has transformed the world into aglobal village and has brought speed andefficiency into processes, but carelessbrowsing on the internet carries lots of risk.The profile picture that you create foryourself, the data you submit to register toany website, your uploaded pictures,address, e-mail id, number of dependents etc.is information enough to enable somebodywilling to, to cyber stalk you.

If a hacker is able to decode passwordto your e-mail account, he/she would be ableto peep into everything that has beenhappening in your life (official/personal)depending on whether i t i s yourpersonal/official e-mail id. The risks ofcareless e-transactions do not need anyexplanation, as a single careless transaction,can rob you off your life-earned savings.

Uploading some of your personalpictures, or sharing them with your friends,carries the risk of passing them on to peoplewho might morph it and upload it at sites, withany message that they want. There have beensuch cases filed, and have created havoc onteens' minds before. It might be a good idea tolearn from others' mistakes than from yourown.

For analysis purpose, a numeric ratingscale was put as an answer option assubjective open ended answers might bedifficult to categorise and analyse.

17

July - September 2017

3716

®…“�b˜™…… ®…“®……∆∫……

July - September 2017

Participants were asked to rate themselves ona scale of 10 on how aware they consideredthemselves of the risks of careless browsing,with 10 being for extremely careful and 1being least careful, a significant 16.5% ratedthemselves at 9 or10., which indicates thatthey consider themselves to be highly carefulof the risks of careless browsing, while 43.1%rated themselves at 7 or 8, which alsoindicates significant level of alertness,thereby implying that around 60% of them arehighly aware of the risks of carelessbrowsing, while the rest of them ratedthemselves less aware.

About 30% gave themselves amoderate rating of 4-6. Only 9.9% ratedthemselves at 1,2 or 3 indicating that theywere not much aware of the risks of carelessbrowsing on the internet. These two puttogether comprise around 40%. If 40% of thesample size is not completely aware of therisks of careless browsing, there is a strongneed for some intervention.

Also, though about 60% say that theyare aware of the risks of careless browsing, itcannot be assumed at this stage, that due totheir awareness of the threats that carelessbrowsing holds, they are doing everythingright in terms of their cyber safety, whichneeds to be further checked.

How best did they describe themselves ontheir tech saviness?

As per the Cambridge EnglishDictionary, tech-savvy means : knowing a lotabout modern technology, especiallycomputers. Off late technology has found itsway into multiple aspects of life. Most of the

gadgets around are remote controlled.Beingtech-savvy refers to one's ability to findhis/her way through technical products,without being lost, confused and withminimal frustration.

The underlying reason for assessingthe participants' self assessment on beingtech-savvy was that not everybody fallsvictim to cyber stalking/cyber bullying.There are preventive measures and certaincyber safety measures that should befollowed. It can be assumed that cyberstalking happens only to people who are notaware of these cyber safety measures or tothose who have minimal knowledge oftechnology, but browse Internet. When askedhow they rated themselves on their beingtechsavvy, 47.3% claimed that they weretech-savvy and knew their way aroundtechnology sufficiently well, while 48.4%claimed that they had sufficient level ofexperience with technology to carry out dailytasks. Only 2.2% of the survey sample hadminimal to no experience with technology,while the rest had sufficient or moreknowledge of technology to carry out dailytasks. It might be easy to assume that thesetech-savvy participants are doing everythingright in terms of cyber-safety, but it needs tobe investigated further.

The necessary information needed todownload a larger file using BitTorrentprotocol are the small Torrent files. Theunderlying concept behind BitTorrent issharing computers for using largerdownloads.

Do you download Torrents?

Page 6: PREVENTION OF CYBER STALKING SAFETY OF TEENAGERS … · family members ( Real Girls, Real Pressure: A National Report on the State of Self- ... the number of cases reported under

communicat ion, matr imony, socialnetworking or e-learning, but like every otherthing, it has its own cons as well. Theanonymity and speed at which things moveon Internet, makes it all the more prone tocrime, a fact that is known to anycasual/serious users of the cyber medium.U n l i k e i n a n y o t h e r m e d i a l i k ePress/Electronic medium; on Internet, it is somuch easier to post any message aboutanyone, upload or download any piece ofinformation so it becomes all the moreimportant on our part to exercise caution,when interacting/transacting over theinternet. Gauging somebody's concern aboutprivacy and safety over the internet can bevery subjective open ended answer and theexpected answers will be,Yes, I am extremelyconcerned, highly concerned, concerned,why? not at all concerned, why should I be?and like, which would be hard to analyse.Hence, for the ease of analysis purpose, wedecided to use the numeric rating scale, andthe respondents were asked to rate them overa scale of 1-10, on how concerned did theyfeel about their safety over the internet.

When checked on how important istheir privacy and safety on the internet tothem? 47% rated themselves at 10 on a scaleof 10, indicating that they were highlyconcerned about their safety. 31.9% of theaudience gave themselves a rating of 8/9,which is also a very high rating. This ratingindicates that they were very concerned abouttheir safety on the internet. Respondents ofthese two categories put together comprise78.9%, which indicates that a significantlyhigh percentage of audience consider theirsafety and privacy on the net very important.

How aware they cons ideredthemselves of the risks of careless browsingon a scale of 10?

e-transactions, e-banking, e-learning.What is common across these processes iselectronic mode as well as ease andconvenience, speed and flexibility; but likeeverything else, there are cons of thiselectronic mode too, which is inherent due toanonymity inbuilt in this.

All the information in the world is nowliterally on your fingertips; available at a fewsmart clicks of the finger tips. It is true thatinternet has transformed the world into aglobal village and has brought speed andefficiency into processes, but carelessbrowsing on the internet carries lots of risk.The profile picture that you create foryourself, the data you submit to register toany website, your uploaded pictures,address, e-mail id, number of dependents etc.is information enough to enable somebodywilling to, to cyber stalk you.

If a hacker is able to decode passwordto your e-mail account, he/she would be ableto peep into everything that has beenhappening in your life (official/personal)depending on whether i t i s yourpersonal/official e-mail id. The risks ofcareless e-transactions do not need anyexplanation, as a single careless transaction,can rob you off your life-earned savings.

Uploading some of your personalpictures, or sharing them with your friends,carries the risk of passing them on to peoplewho might morph it and upload it at sites, withany message that they want. There have beensuch cases filed, and have created havoc onteens' minds before. It might be a good idea tolearn from others' mistakes than from yourown.

For analysis purpose, a numeric ratingscale was put as an answer option assubjective open ended answers might bedifficult to categorise and analyse.

17

®…“�b˜™…… ®…“®……∆∫……

July - September 2017

3716

July - September 2017

Participants were asked to rate themselves ona scale of 10 on how aware they consideredthemselves of the risks of careless browsing,with 10 being for extremely careful and 1being least careful, a significant 16.5% ratedthemselves at 9 or10., which indicates thatthey consider themselves to be highly carefulof the risks of careless browsing, while 43.1%rated themselves at 7 or 8, which alsoindicates significant level of alertness,thereby implying that around 60% of them arehighly aware of the risks of carelessbrowsing, while the rest of them ratedthemselves less aware.

About 30% gave themselves amoderate rating of 4-6. Only 9.9% ratedthemselves at 1,2 or 3 indicating that theywere not much aware of the risks of carelessbrowsing on the internet. These two puttogether comprise around 40%. If 40% of thesample size is not completely aware of therisks of careless browsing, there is a strongneed for some intervention.

Also, though about 60% say that theyare aware of the risks of careless browsing, itcannot be assumed at this stage, that due totheir awareness of the threats that carelessbrowsing holds, they are doing everythingright in terms of their cyber safety, whichneeds to be further checked.

How best did they describe themselves ontheir tech saviness?

As per the Cambridge EnglishDictionary, tech-savvy means : knowing a lotabout modern technology, especiallycomputers. Off late technology has found itsway into multiple aspects of life. Most of the

gadgets around are remote controlled.Beingtech-savvy refers to one's ability to findhis/her way through technical products,without being lost, confused and withminimal frustration.

The underlying reason for assessingthe participants' self assessment on beingtech-savvy was that not everybody fallsvictim to cyber stalking/cyber bullying.There are preventive measures and certaincyber safety measures that should befollowed. It can be assumed that cyberstalking happens only to people who are notaware of these cyber safety measures or tothose who have minimal knowledge oftechnology, but browse Internet. When askedhow they rated themselves on their beingtechsavvy, 47.3% claimed that they weretech-savvy and knew their way aroundtechnology sufficiently well, while 48.4%claimed that they had sufficient level ofexperience with technology to carry out dailytasks. Only 2.2% of the survey sample hadminimal to no experience with technology,while the rest had sufficient or moreknowledge of technology to carry out dailytasks. It might be easy to assume that thesetech-savvy participants are doing everythingright in terms of cyber-safety, but it needs tobe investigated further.

The necessary information needed todownload a larger file using BitTorrentprotocol are the small Torrent files. Theunderlying concept behind BitTorrent issharing computers for using largerdownloads.

Do you download Torrents?

Page 7: PREVENTION OF CYBER STALKING SAFETY OF TEENAGERS … · family members ( Real Girls, Real Pressure: A National Report on the State of Self- ... the number of cases reported under

Most of the Torrent sites checkBitTorrents before hosting them fordownloads, but it does not imply that all sitesare safe. Some sites might be distributingmalware deliberately, while others might bedoing it , and not be aware of it, While somesites offer legitimate content, some othersoffer pirated and that decides how legal andsafe your downloads are. Also, what youdownload might be infected, if a BitTorrentclient is uploading from an infected file. Thequestion was aimed at checking their tech-savviness and also cyber-safety alertness.

Of the 91 respondents, 29.7%confirmed downloading torrents; 25.3% doso infrequently, and 45.1% do not downloadtorrents. It is important to note that 55% dodownload Torrents frequently or non-frequently.

.Do you use pirated versions of softwares andoperating systems?

With the software prices soaring, thetendency to use pirated versions ofsoftware/operating systems is high, though itcomes with lots of security risks. With piratedSoftware, there is a risk of infecting your PC,It could also slow down your system. There isa likelihood of infecting your system withvirus. While working on a system withpirated operating system or pirated software,there is a likelihood of your systemdisseminating your important/confidentialdata. The consequences of your confidentialdata /family pictures/ other pictures going to

an outsider's hand can easily be imagined.There have been cases of people's picturesmorphed and uploaded with insane messageson different media, which have later causedhavoc on the victim's minds.

For the safety of data and system, it isadvisable to use genuine versions ofsoftwares and operating systems, even if itcomes at a price.

The participants, when asked if theyused pirated versions of softwares andoperating system, 14.3% confessed use ofpirated versions of software/operatingsystems. 20.9% said that they did soinfrequently. So, both put together, around35% of the audience use piratedsoftwares/operating system frequently orinfrequently.

There were about 64.8% of participantswho denied the use of pirated versions ofsoftwares or operating systems. On an overall35% use pirated versions of softwares oroperating systems, either regularly orinfrequently, which is unsafe and notadvisable from the aspect of cyber safety.When this information is compared to theinformation received as an answer to earlierquestion on how concerned were they abouttheir safety on Internet, around 85.7%considered their safety on the internet veryimportant.

Are you on the latest version of youroperating system?

19

July - September 2017

3718

®…“�b˜™…… ®…“®……∆∫……

July - September 2017

Being on the latest version of operatingsystem improves the reliability of a systemand also improves its safety and security, Justlike using genuine versions of softwares is inthe best interest of cyber safety, using thelatest version of operating system is alsorecommended.

The audience was asked if they wereon the latest version of the operating system.The objective was again to check, theiralertness, tech-savviness as well as theirmoves and steps taken to ensure safety in thecyber medium.

64.8% of the participants confirmedbeing on the latest version of operatingsystem, while 23.1% denied being on thelatest version, while 12.1% did not evenknow, if they were on the latest version of theoperating system.

The data obtained in this question iscompared to the information received as ananswer to earlier question on their tech-saviness (comfort with technology) 95.7%confirmed that they had sufficient or moreknowledge of technology to find their wayaround technology sufficiently well and78.9%, of participants had indicated theirsafety and privacy on the net very important.The contradiction between what was saidabout the concern for cyber security and whatis being followed is apparent.

An ad blocker is software thatprevents advertising content to appear,thereby minimizing the distractions, It ratherdoes more than that, it saves bandwidth asthese advertisements consume bandwidthtoo.

Tom Simonite on March 16, 2016reported that some security experts stated thatapart from the ethical and business questionsof whether it's okay to block online ads thatsupport free content, it is something that mustbe done, to stay safe in the cyber medium. Adblockers protect you from malware and well,that is not all, they also protect your privacy.Using ad blocker, indicates your concern forprotecting yourself in the cyber world. Whenquestioned about use of an adblocker, 33.9%of the participants indicated that they useadblockers, 54.9% do not use adblockers,while 11% enable ads on the websites theytrust. 54.9% of the participants not usingadblockers is a concern and shows scoperather need for some intervention to increaseeducation on the necessary steps to be takenfor cyber safety.

Do you use same password across onlineuniverse?

Password is the lock that you use forany cyber gate, be it your system, e-mail id,bank account, your social networking site andevery identity that you create for yourself fordifferent purposes. While it is in our owninterest that we create a different passwordfor every profile, and that too, preferably a

Do you use adblockers?

Page 8: PREVENTION OF CYBER STALKING SAFETY OF TEENAGERS … · family members ( Real Girls, Real Pressure: A National Report on the State of Self- ... the number of cases reported under

Most of the Torrent sites checkBitTorrents before hosting them fordownloads, but it does not imply that all sitesare safe. Some sites might be distributingmalware deliberately, while others might bedoing it , and not be aware of it, While somesites offer legitimate content, some othersoffer pirated and that decides how legal andsafe your downloads are. Also, what youdownload might be infected, if a BitTorrentclient is uploading from an infected file. Thequestion was aimed at checking their tech-savviness and also cyber-safety alertness.

Of the 91 respondents, 29.7%confirmed downloading torrents; 25.3% doso infrequently, and 45.1% do not downloadtorrents. It is important to note that 55% dodownload Torrents frequently or non-frequently.

.Do you use pirated versions of softwares andoperating systems?

With the software prices soaring, thetendency to use pirated versions ofsoftware/operating systems is high, though itcomes with lots of security risks. With piratedSoftware, there is a risk of infecting your PC,It could also slow down your system. There isa likelihood of infecting your system withvirus. While working on a system withpirated operating system or pirated software,there is a likelihood of your systemdisseminating your important/confidentialdata. The consequences of your confidentialdata /family pictures/ other pictures going to

an outsider's hand can easily be imagined.There have been cases of people's picturesmorphed and uploaded with insane messageson different media, which have later causedhavoc on the victim's minds.

For the safety of data and system, it isadvisable to use genuine versions ofsoftwares and operating systems, even if itcomes at a price.

The participants, when asked if theyused pirated versions of softwares andoperating system, 14.3% confessed use ofpirated versions of software/operatingsystems. 20.9% said that they did soinfrequently. So, both put together, around35% of the audience use piratedsoftwares/operating system frequently orinfrequently.

There were about 64.8% of participantswho denied the use of pirated versions ofsoftwares or operating systems. On an overall35% use pirated versions of softwares oroperating systems, either regularly orinfrequently, which is unsafe and notadvisable from the aspect of cyber safety.When this information is compared to theinformation received as an answer to earlierquestion on how concerned were they abouttheir safety on Internet, around 85.7%considered their safety on the internet veryimportant.

Are you on the latest version of youroperating system?

19

®…“�b˜™…… ®…“®……∆∫……

July - September 2017

3718

July - September 2017

Being on the latest version of operatingsystem improves the reliability of a systemand also improves its safety and security, Justlike using genuine versions of softwares is inthe best interest of cyber safety, using thelatest version of operating system is alsorecommended.

The audience was asked if they wereon the latest version of the operating system.The objective was again to check, theiralertness, tech-savviness as well as theirmoves and steps taken to ensure safety in thecyber medium.

64.8% of the participants confirmedbeing on the latest version of operatingsystem, while 23.1% denied being on thelatest version, while 12.1% did not evenknow, if they were on the latest version of theoperating system.

The data obtained in this question iscompared to the information received as ananswer to earlier question on their tech-saviness (comfort with technology) 95.7%confirmed that they had sufficient or moreknowledge of technology to find their wayaround technology sufficiently well and78.9%, of participants had indicated theirsafety and privacy on the net very important.The contradiction between what was saidabout the concern for cyber security and whatis being followed is apparent.

An ad blocker is software thatprevents advertising content to appear,thereby minimizing the distractions, It ratherdoes more than that, it saves bandwidth asthese advertisements consume bandwidthtoo.

Tom Simonite on March 16, 2016reported that some security experts stated thatapart from the ethical and business questionsof whether it's okay to block online ads thatsupport free content, it is something that mustbe done, to stay safe in the cyber medium. Adblockers protect you from malware and well,that is not all, they also protect your privacy.Using ad blocker, indicates your concern forprotecting yourself in the cyber world. Whenquestioned about use of an adblocker, 33.9%of the participants indicated that they useadblockers, 54.9% do not use adblockers,while 11% enable ads on the websites theytrust. 54.9% of the participants not usingadblockers is a concern and shows scoperather need for some intervention to increaseeducation on the necessary steps to be takenfor cyber safety.

Do you use same password across onlineuniverse?

Password is the lock that you use forany cyber gate, be it your system, e-mail id,bank account, your social networking site andevery identity that you create for yourself fordifferent purposes. While it is in our owninterest that we create a different passwordfor every profile, and that too, preferably a

Do you use adblockers?

Page 9: PREVENTION OF CYBER STALKING SAFETY OF TEENAGERS … · family members ( Real Girls, Real Pressure: A National Report on the State of Self- ... the number of cases reported under

strong password which should be acombination of alpha numeric characters, anda special character,

Having said that, how easy is it for ahuman brain already engrossed in numerousprocesses, chores and challenges toremember multiple alpha numeric specialcharacter passwords for which profile/id theywere created? And the result is facing theannoying forgot password? Screen andsending request to send password hint to yourregistered e-mail address and creating apassword for you again. An unpleasant,experience that many of us frequently gothrough. The easy way out that many of uscreate is to have same password for all ouronline identities. While, it saves us from thepainful experience narrated above, it again isnot in the best interest of our cyber safety.

Using the same password acrossonline universe is yet another threat, and it isnot advisable to do so. This is becausedifferent websites have different levels ofsecurity measures embedded in, the safetymeasures that a banking site would haveembedded would be much higher than whatan e-mail server site would have and thatagain is different from what a socialnetworking site will have. Though looking atthe rising number of cyber stalking cases, thesocial networking sites too need to raise thesecurity measures embedded. Hackersacquire certain degree of skills to breakthrough the safety wall of certain websites,probably the not so strong ones and are able todecode the passwords. Using the samepassword for multiple sites, makes it easierfor a hacker to guess the used password, forother sites too. The aftereffects of their beingable to decode your id and password can bewell imagined. When asked if participantswere using the same password across the

online universe, 24.2% said they used thesame password across the online universe,38.5% preferred not to say and only 37.4%did not use the same password for entireonline universe. This when compared to theearlier answer, about their concern ofcybersafety again reflects a contradiction.

Do you use Internet of things devices athome, such as smart lights, refrigerators etc?

Internet of Things (IoT) can changethe way a common man interacts withtechnology and brings in numerous benefits,but from a cyber security perspective, therecould be challenges posed.

When checked on the use of Internet ofThings (IoT) devices at home, such as smartlights, refrigerators etc. 33% of theparticipants affirmed having them at home,while 56% of the participants deniedpossessing them, and 11% of the participantswere not sure of having them at home, andanswered in “may be”.

Do you think before posting messagesonline?

21

July - September 2017

3720

®…“�b˜™…… ®…“®……∆∫……

July - September 2017

Posting messages online is so mucheasier than doing it on other medium, whichbrings in benefits, but also poses challenges,thinking twice before posting any messageonline, is likely to be helpful. When askedabout their alertness on posting somethingonline. 86.8% asserted that did think beforeposting something online, 9.9% answered in“may be” , while a small 2.3% said they didnot think much before posting somethingonline. Both put together comprise 12.2% ofthe audience, which does not always thinkmuch before posting messages.

Do you make friends online, with people notknown in person?

Making friends online, with people wedo not know personally, comes with risk asthese could be people with hidden objectivesagainst you, could be somebody using fakeidentity to get your confidential information,and could be somebody genuinely looking formaking friends online as well, but they allappear the same in the cyber space. Whenchecked on, if the participants befriendedpeople online, while 9.9% affirmed they did,15.4% of the participants answered in “maybe”, majority of them (74.7%) denied so.

When checked about their ever beingaffected by malware, identity theft, cyberfraud and being aware of it, 27.5% confirmedbeing affected, 51.4% said that they were notaffected, while 27.5% were not sure andresponded in “maybe”.

Would you be interested in learningabout some basic practices to follow that canprotect you from

Cyber threats and help you stay safeonline

49.5% were an absolute yes, while to45.1% it sounded interesting, while 5.5% feltthat they were unlikely to be the victim ofcyber stalking.

Advent of Internet and Technology,has brought in speed and efficiency in everyaspect of our lives and also comforts that allof us have got addicted to. However, it alsobrought a medium, which is leading to somenot so desirable social changes andconsequences such as cyber stalking andcyber bullying.

There have been studies conductedearlier, which have looked at modes of cyberbullying, patterns of cyber bullying andimpact of cyber bullying on teenagers.

There is a need to conduct study of theunderlying reasons behind cyber stalking.However, the cyber-alertness, of the victims,their desire to prevent themselves from Cyberstalking and behavioural pattern on theInternet, in terms of cyber safety might also

Conclusion

Yes

No

May be

Yes

No

Maybe

Yes

No

Maybe

Yes

No

Prefer Not to say

Page 10: PREVENTION OF CYBER STALKING SAFETY OF TEENAGERS … · family members ( Real Girls, Real Pressure: A National Report on the State of Self- ... the number of cases reported under

strong password which should be acombination of alpha numeric characters, anda special character,

Having said that, how easy is it for ahuman brain already engrossed in numerousprocesses, chores and challenges toremember multiple alpha numeric specialcharacter passwords for which profile/id theywere created? And the result is facing theannoying forgot password? Screen andsending request to send password hint to yourregistered e-mail address and creating apassword for you again. An unpleasant,experience that many of us frequently gothrough. The easy way out that many of uscreate is to have same password for all ouronline identities. While, it saves us from thepainful experience narrated above, it again isnot in the best interest of our cyber safety.

Using the same password acrossonline universe is yet another threat, and it isnot advisable to do so. This is becausedifferent websites have different levels ofsecurity measures embedded in, the safetymeasures that a banking site would haveembedded would be much higher than whatan e-mail server site would have and thatagain is different from what a socialnetworking site will have. Though looking atthe rising number of cyber stalking cases, thesocial networking sites too need to raise thesecurity measures embedded. Hackersacquire certain degree of skills to breakthrough the safety wall of certain websites,probably the not so strong ones and are able todecode the passwords. Using the samepassword for multiple sites, makes it easierfor a hacker to guess the used password, forother sites too. The aftereffects of their beingable to decode your id and password can bewell imagined. When asked if participantswere using the same password across the

online universe, 24.2% said they used thesame password across the online universe,38.5% preferred not to say and only 37.4%did not use the same password for entireonline universe. This when compared to theearlier answer, about their concern ofcybersafety again reflects a contradiction.

Do you use Internet of things devices athome, such as smart lights, refrigerators etc?

Internet of Things (IoT) can changethe way a common man interacts withtechnology and brings in numerous benefits,but from a cyber security perspective, therecould be challenges posed.

When checked on the use of Internet ofThings (IoT) devices at home, such as smartlights, refrigerators etc. 33% of theparticipants affirmed having them at home,while 56% of the participants deniedpossessing them, and 11% of the participantswere not sure of having them at home, andanswered in “may be”.

Do you think before posting messagesonline?

21

®…“�b˜™…… ®…“®……∆∫……

July - September 2017

3720

July - September 2017

Posting messages online is so mucheasier than doing it on other medium, whichbrings in benefits, but also poses challenges,thinking twice before posting any messageonline, is likely to be helpful. When askedabout their alertness on posting somethingonline. 86.8% asserted that did think beforeposting something online, 9.9% answered in“may be” , while a small 2.3% said they didnot think much before posting somethingonline. Both put together comprise 12.2% ofthe audience, which does not always thinkmuch before posting messages.

Do you make friends online, with people notknown in person?

Making friends online, with people wedo not know personally, comes with risk asthese could be people with hidden objectivesagainst you, could be somebody using fakeidentity to get your confidential information,and could be somebody genuinely looking formaking friends online as well, but they allappear the same in the cyber space. Whenchecked on, if the participants befriendedpeople online, while 9.9% affirmed they did,15.4% of the participants answered in “maybe”, majority of them (74.7%) denied so.

When checked about their ever beingaffected by malware, identity theft, cyberfraud and being aware of it, 27.5% confirmedbeing affected, 51.4% said that they were notaffected, while 27.5% were not sure andresponded in “maybe”.

Would you be interested in learningabout some basic practices to follow that canprotect you from

Cyber threats and help you stay safeonline

49.5% were an absolute yes, while to45.1% it sounded interesting, while 5.5% feltthat they were unlikely to be the victim ofcyber stalking.

Advent of Internet and Technology,has brought in speed and efficiency in everyaspect of our lives and also comforts that allof us have got addicted to. However, it alsobrought a medium, which is leading to somenot so desirable social changes andconsequences such as cyber stalking andcyber bullying.

There have been studies conductedearlier, which have looked at modes of cyberbullying, patterns of cyber bullying andimpact of cyber bullying on teenagers.

There is a need to conduct study of theunderlying reasons behind cyber stalking.However, the cyber-alertness, of the victims,their desire to prevent themselves from Cyberstalking and behavioural pattern on theInternet, in terms of cyber safety might also

Conclusion

Yes

No

May be

Yes

No

Maybe

Yes

No

Maybe

Yes

No

Prefer Not to say

Page 11: PREVENTION OF CYBER STALKING SAFETY OF TEENAGERS … · family members ( Real Girls, Real Pressure: A National Report on the State of Self- ... the number of cases reported under

lead to some preventive measures.A study was done of the teenagers'

cyber behaviour, and it was seen that whilemost of the audience was tech-savvy(95.7%), and considered their safety andprivacy on the internet to be extremelyimportant (78.9%) the number of participants

who were actually adopting cyber safetymeasures, and exercising caution in the cyberspace, were relatively much smaller. Thisindicates the need for some educationalintervention aimed at educating andreinforcing cyber safety measures at schoolchildren.

References:·

·

·

·

·

·

·

·

Blashill, Aaron J.; Wilhelm, Sabine (2014) Body Image Distortions, Weight, andDepression in Adolescent Boys: Longitudinal Trajectories into Adulthood. Psychologyof Men & Masculinity.;15(4):445-451. 2014Anderson, Bresnahan, and Musatics (2014). Cyberpsychology, behavior and Socialnetworking Combating weight-based cyberbullying on Facebook with the dissentereffect. May; 17(5):281-6. 2014Sameer Hinduja and Justin W. Patchin (2015). Science Direct Aggression and ViolentBehavior Volume 23, Pages 69-74, 2015,Michelle Wright 2013. Journal of Youth and Adolescence, The Association BetweenCyber Victimization and Subsequent Cyber Aggression: The Moderating Effect of PeerRejection Volume 42, Issue 5, pp 662–674, 2013Pew Research 2015. Pew Research Center Teens, Amanda Lenhart, Social Media &Technology Overview 2015Psych Central News 2015 Teen Cyberbullying Linked to Depression By Rick Nauert20158 Tips for Parents of Teens with Depression. By Cari Nierenberg, Live ScienceContributor 2016Real Girls, Real Pressure: A National Report on the State of Self-Esteem : A NationalReport on the State of Self-Esteem, commissioned by the Dove® SelfEsteem Fund 2008

23

July - September 2017

3722

®…“�b˜™…… ®…“®……∆∫……

July - September 2017

IntroductionPeople spend a maximum duration of

their waking hours at work means theircomfort level of working atmosphere,peaceful mind and calm attitude is mostrequired. These all attributes are directlyfocused to job satisfaction. In that waysatisfaction of job also played an importantrole in one's life. While one looks for thedream career or job that will make him/herhappy, whatever job he/she are doing now

must significantly contribute to him/herhappiness. That is the crucial importance ofjob satisfaction. It is true there are elementsof work one cannot control. For example,company policies, which boss is, salary level,colleagues' characters and relationships withthem, and the conditions where to work. Atits most general level of conceptualization,job satisfaction is simply how content anindividual is with his or her job. At the morespecific levels of conceptualization used by

Abstract

Keywords: Job satisfaction, Motivation, Optimistic Encourage, Workers Work Environment,co-employees,Attitude, Intrinsic and Extrinsic

r

r

r

Dr. Manisha PandeyDr. Krishna Kumar Pandey

Aditya Sharma

PREDICTORS OF EMPLOYEE JOB SATISFACTION:A STUDY ON THE TIMES OF INDIA EMPLOYEES

The study of job satisfaction enriches management with a range of informationpertaining to job, employee, environment etc. which facilitated it in decision making andcorrecting the path of organizational policies and behaviour. It indicates the generallevel of satisfaction in the organization about its programmes, policies etc. It encouragesworkers to always give their best shot in everything they do. It inspires sense ofbelongingness and sense of participation leading to the overall increase in theproductivity of the organization. It helps unions to know exactly what employees wantand what management is doing. In addition, a person who is truly satisfied with his orher career life helps create a more positive work environment. All business includingMedia Industry also must need the job satisfaction of employees as one of the key factorfor busting themselves to bring out the best out of them at work place. This enhances theorganisations growth coupled with the employee's carrier graph. This study foundseven factors namely; “Pay scale; Workload and Stress Level; Compensation andBenefit; Teamwork, support and Communication; Working Conditions; Opportunityfor Advancement; and Respect from Co-Workers & Relationship with employees”which played vital role to satisfi the employees. Since the present study is based ongender demography, it is found that females shown comparatively more satisfactionwith their job. It means it is the alarm for the male employees that they are needed to beplump for cool in nature, optimistic and managing attitude like female rather thanaggressive approach.

r

r

r

Associate Professor, CHIMC, IndoreAssociate Professor, IPSAcademy, IndoreEx Student, CHIMC, Indore

qqqqq