personal information

share

 

Cyber bullying occurs when the internet or mobile phones are used to send mean and threatening messages in a deliberate, repeated and hostile manner. Cyberbullying has been a major concern in Brunei, as it is common for people to vent their anger or frustration though social networks. Most cyber bullies are motivated by jealousy, anger, revenge or frustration. Many do it for their own entertainment or to get a reaction.  

 

Examples of cyber bullying 

share

 

There used to be a time when shopping on the internet was very rare and uncommon, but thanks to the emergence of Facebook and Instagram e-shops, Bruneians have now learned to gain trust in making purchases with the click of a mouse, whether for clothing, electronics or car parts. While this has proven to be convenient, there are also risks involved with online shopping and people should be aware of them. 

 

Risks of online shopping 

share

 

It’s common in Brunei for people to catch up on social news by reading local blogs on a daily basis. Blogs (short for web logs) are online journals that are usually set up to share opinions, photos, information and more. Blogs may be set up by individuals or companies. 

 

share

 

The popular use of online communications has given rise to online sexual predators who come up with creative ways to take advantage of unsuspecting men, women and teens. These predators use various methods to seduce or pressure a victim to perform sexual favors, and often threaten the victim with embarrassment if they don’t do it. 

 

Online sexual blackmail is sometimes called Sextortion, or Romance Scam. Victims are usually lured through social media sites, and the blackmailers are often part of criminal gangs from foreign countries. 

 

share

 

Spam are unwanted bulk messages sent through electronic messaging systems. The most widely recognized form of spam is sent through email, but can also refer to bulk messages sent through other media such as: 

  • Instant messaging spam 
  • Search engine spam 
  • Mobile phone text messages 
  • Junk fax transmissions 
  • File sharing spam 

 

share

 

Identity theft occurs when someone steals personal information such as your name, identity card number or credit card number, so that they can pretend to be someone else. This is usually done to gain access to finances, get medical benefits, to avoid the police, or to commit other crimes. 

 

How do identity thieves find your personal information? 

Pages