Skip navigation

Tag Archives: Trauma

 Image result for cyberbully

Information Security:

Methods & Children

&

Overcoming Bullies

Image result for cyberbully

Cyber-bullying is defined as, ” the posting of malicious comments or offensive photos to victimize another on a website, the sending of derogatory texts, or the use of any form of media with the intention to cause harm (Martorell, Papalia, & Feldman, 2014), has become a fairly common place. Bullying in general is simply a form of abuse and may include neglect, teasing, social isolation, slander, derogatory comments, and even physical or sexual harm (Martorell, Papalia, & Feldman, 2014).

Abuse and neglect often is a blend of a multiplicity of compounds of sexual, physical, verbal, economic and social variables and as such, neglect and abuse has long lasting affects to all properties of development. The long lasting effect of abuse range from dysfunction and distress in cognitive and emotional abilities to behavioral issues and physical ailments (Martorell, Papalia, & Feldman, 2014). Even feelings of betrayal the inability to form long lasting relationship and negative spiritual consequence such as feeling unloved or abandoned by God and in some cases even concluding that God does not exist are common.

The most effective cure for victims of bullying and betrayal is to aid in the reestablishment of trust and one’s Actualized –identity. The  first step often begins by the expression of empathy, compassion and love in conjunction with meeting unmet needs while help the wounded friend realize, forgive and release without retaliation and then to love past transgressors,  accepting hold-ups and habits and flaws within the other person and self.

Additionally, upon becoming willing the individual should receive the message of the Good News that Jesus is the foundation and Way to Freedom. Thus, it is not a matter of effort or any moral deed that will produce happiness or prosperity and peace or one’s salvation.

After receiving such a revelation. The next step is to instruct the curious and convinced believer in the Gospel. In the process of building -up a Disciple through imitation of action and instruction on spiritual disciplines through modeling and scaffolding the wounded friend learns to walk the path that brings new freedom and reestablishes faith, hope and trust. This allows the individual realization that one’s significance or what we are about and do, and additionally that ones’ security, or whom we belong to and who shall provide and protect us, is found only in our Lord- Jesus Christ.

In our continual growth aided by the Holy Spirit, who comforts and inspires us, and through serving the Father, The Great I Am or that, which is the existence of everything, we trudge through life in worshipful glory in all our thoughts, thinking and actions. Thus, as we attempt to align our will and hearts with his purposes as we serve the various plans as we are called as “Ambassadors of the Kingdom of Heaven” (2 Cor. 5:20:21, 1 Pt. 2 NIV).

While the use of technology and the internet can be, a useful tool for cognitive and social development from early childhood onward (Martorell, Papalia, & Feldman, 2014) the context must be monitored as well media content to safeguard against predators, bullying and other malicious intent or harm. Most devices have the ability to enable built in content filters, set up secondary log on accounts, and password protect settings based on a recommended age normative rating scale.  Additionally computers, tablets and other devices that have access to the internet should be monitored or the devices may be used in common areas to ease the ability of parents and guardians with the ability in safeguarding children against unwanted activity.

As a former owner of an information technology and security consulting firm I and have training in internet security and various hardware and firmware although it is a bit out of date by current guidelines, as I have switched my professional focus. However, through hacking, spoofing of location, and other means, cameras and one’s own system, network and information may be used against unsuspecting users for the malicious intent or profit and unfortunately, predators often do so frequently in the case of children and youths (Rindoks, 2016)

Thus, Parents should have easy access to the passwords of social media sites, and in addition, the use of third party content filtering software, anti- malware, anti spyware and other security measures should be in place on all devices. Further steps such as disabling or covering of cameras when not in use, checking, and emptying cache and history folders help safeguard privacy of all users (Rindoks, 2016).

Another suggestion is for children never to post their age, physical location, or other demographic information as predators may use such data to target victims. Additionally one should use caution when posting photos. Predators and criminals in general use pictures and other forms of data that reveal location leading to a variety of crimes from burglary to abuse. Thus, in the profile for youths less personal information is always the best policy. Although information security measures are important to safeguard against identity theft and predators it is also easy to become a techno-phobic and overly protect a system resulting in network or computer that does not perform effectively (Rindoks, 2016).

Finally, parents must learn to trust their children and possibly the best policy is to teach awareness and virtues and values coupled with Biblical truth, dignity and above all empathy, compassion and love ( 1 Cor. 13). It is easy to have a desire to overprotect, overindulge, or even over control hose we love. Either out of our own insecurities, our own past issues or fears of harm to self or others in present and future circumstances.

However, true freedom comes in the loving grace and Mercy of Christ and thus, “All anxiety and care should be cast on his loving shoulders” (1 Pt. 5:7). “For if God is for us whom shall we fear” (Ps. 27:1, Rom. 8:31, Heb. 13:6 NIV).

 

In God, Christ and Spirit,

Trent Rindoks

Word Count # 980

 

Image result for whom shall i fearReferences

Martorell, G., Papalia, D. E., & Feldman, R. D. (2014). A Child’s World: Infancy through Adolescence (13th ed.). New York: McGraw Hill Education.

Rindoks, T. (2016). The influence of Media and Young Children. PSYCH 221: Db 4 Reply. TN: Liberty University.

 

Image result for Jesus

 

Advertisements
%d bloggers like this: