ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

How To Handle Tech Abuse

Updated on September 2, 2016

Technological advances such as smartphones and other gadgets are wonderful because these tools enable people to be more interconnected. Back in the 1970s, people had to use friends' phones, pay phones, or hotel phones if they traveled. If anyone has ever seen the Woody Allen movie Play it Again, Sam, then you will laugh when you notice how many times his friend stops to use other people's phones.

The friend of Wood Allen's character in this movie is always leaving people detailed messages about how to reach him, and you can tell he sure would have liked to have a cell phone! Mostly this movie is about how Woody Allen plays a character who is not very savvy when it comes to dating women, but it is funny to see how technology has advanced since this movie was made in 1972. I wanted to start this hub out on a light-hearted note because the topic I am going to cover here is the sobering topic of tech abuse. Technology has opened up the number of opportunities for stalkers, so it is always good to be vigilante. In movies made before 1989 one always sees a woman sitting at home alone and receiving scary prank calls. In the 2000s, you now see movies where women receive text messages and Facebook messages that are abusive. Even men can are susceptible to tech abuse, so do not think you are completely safe just because you are a man! This hub will give readers a few suggestions on how to avoid tech abuse.

Now most people have a cell phone, and many of us cannot leave home without it!
Now most people have a cell phone, and many of us cannot leave home without it!

Modern Technologies And Stalkers

Also, a male friend of mine had an ex-girlfriend who continually sent him harassing text messages at all hours of the night. This situation escalated to the point where he warned her to stop or that he would change his phone number. With the advent of modern technologies, people are able to message each other during any time of the day, which is a scary and real invasion of privacy. There have been several studies conducted on how teenagers are often targted by tech abuse. It is imperative you talk to your children about these issues because they need adults to protect them from stalker and predators who use technological devices to hurt their victims.

I have had several female friends and even one male friend who were stalked via Facebook, Instagram, and text messaging. My female friends were most often stalked via text messaging by former boyfriends who wanted to see who they were talking to. One friend had blocked her ex-boyfriend on Facebook, so he made a new profile and started talking to her under a new name. He won her trust as an anonymous person, which tells us we should always be suspicious regarding strangers we talk to via the Internet.

Another story was that of Megan Meier, who met a boy who left her very nice comments on her Myspace page. The sad thing about that particular story was this was not really a real boy, but Megan's estranged friend and her parents continued to send the Megan nice messages and then one day they turned around and said she was horrible. All the while this Megan believed this was a real person. Sadly she committed suicide over what these people said to her. It is scary to contemplate that people create fake social networking profiles to harass others, so beware if your child is using one of these social networking sites. MySpace is not longer the social media site du jour, but stalking and harassment often now takes place on Facebook or Instagram.

Who May Be Controlling Your Phone?

Does your phone ever act funny? Have you ever received odd messages on your phone? People have had their cell phone hacked and are stalked via their own technological devices, which is a paramount invasion of privacy. Here are some simple tips you can use to protect your cell phone:

1. Turn off the Bluetooth:

These devices are very handy but are connected to your cell phone at all times. Turning off your Bluetooth will minimize the opportunities for hackers to attack your device.

2. Keep A Copy of Contact Phone Numbers:

Keep this on your home computer or in a small address book. This way you will have access to your numbers if you lose your phone, or if your phone is hacked. Sometimes you have to reformat your phone if it is hacked, and important contact information could be lost.

3. Do not give strangers your cell phone number:

Get to know the individual first and give him or her your email address if you really want to talk to them. Even a loved one can put spyware on your mobile device, but at least by then you might have seen enough signs to let you know they are up to such malicious behavior. Always keep your mobile device with you and do not share it with strangers or even acquaintances. Guard your mobile device and monitor it from time to time to make sure there are no suspicious calls or texts. Tech abuse is not one percent preventable, but individuals can do everything in their power to curb it.

Comments

    0 of 8192 characters used
    Post Comment

    • profile image

      cutiebug1 

      8 years ago

      very nice hub! it helped me a lot with my persuasive paper!!

    • SweetiePie profile imageAUTHOR

      SweetiePie 

      10 years ago from Southern California, USA

      Thank for the comment Zsuzsy Bee!

    • Zsuzsy Bee profile image

      Zsuzsy Bee 

      10 years ago from Ontario/Canada

      Lots of important information in your hub.

      great hub regards Zsuzsy

    • SweetiePie profile imageAUTHOR

      SweetiePie 

      10 years ago from Southern California, USA

      Thank you for all the nice comments!

    • robie2 profile image

      Roberta Kyle 

      10 years ago from Central New Jersey

      Good advice--and nice comment on the pace of technological advances. In the days of my mis-spent youth, phones had rotary dials and no voicemail or caller ID, but stalkers and con artists still managed somehow. Some things are eternal, I guess. Thanks for a good read.

    • Peter M. Lopez profile image

      Peter M. Lopez 

      10 years ago from Sweetwater, TX

      "Does your phone ever act funny?" LOL - Always. Nice hub, good luck.

    • funride profile image

      Ricardo Nunes 

      10 years ago from Portugal

      Nice hub. My partner once had her cellphone jammed due to some kind of virus :/

    • stephhicks68 profile image

      Stephanie Hicks 

      10 years ago from Bend, Oregon

      Great work - very well done.

    • Angela Harris profile image

      Angela Harris 

      10 years ago from Around the USA

      Excellent tips on a scary subject

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://hubpages.com/privacy-policy#gdpr

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)