When children start to abuse the convenience of the internet by harassing other people, the internet becomes very dangerous. What makes cyber bullying so dangerous? Cyber bullying is dangerous because it has the ability to take the smallest incident and build up so much tension around it that it results in a murder or suicide. Some people may blame the victim for lacking self control and not being able to ignore the situation. Some people may claim it was just a joke and may blame the victim for being too sensitive or insecure.
However, with the advancement in technology and its wide use, a new type of bullying has developed, cyberbullying, which is when a person uses technology and/or electronic devices to bully another person, typically by sending messages or posting comments of an intimidating or threatening nature. What makes cyber-bullying much more dangerous than regular bullying is that because if it on the internet, it will stay there for a long time and for everyone to see. What’s worse, is that the bully can easily hide under a different name or profile, making it harder to find out who is responsible in terms of facing consequences. It is very important to delete cyberbullying because when teenagers begin to abuse the convenience of the internet to harass others, it creates a very dangerous environment that extends outside the classroom or school. When someone is being harassed or embarrassed online, it reaches far outside of their world, and strangers all
Critique on Do Video Games Kill? This article “Do Video Games Kill” by Karen Sternheimer addresses the wide spread idea; video games are the cause for “young killers” (210). Sternheimer believes concern for the influence video games may have on youth is spiraling out of control. She put most of the blame for this out of control concern on the media. She also writes some about politicians and the Juvenile Justice system.
Cyber terrorists can be motivated to target organizations that will result in the radical’s group to cause the most harm and/or receive the most attention for their party. Cyberterrorists use the internet to spread propaganda and enlist new members and use DoS/DDoS attacks to cause disruption to companies that represent actions against their belief’s (Vacca & Rudolph, 2011). Cyber terrorists can also steal information to be used for self-serving strategic purposes. Kostadinov (2012) makes the distinction between cybercrime and cyberterrorism in that the latter should resemble terrorist attacks via traditional methods but perpetrated virtually. Kostadinov goes on to note that most cyberterrorism actions are generally focused on website sabotage and email blasting.
Hooking Up on the Internet Analysis Paper Kati Horne Introduction to Sociology Dr. Lawson September 19, 2014 Research Questions In today’s society the demand for the internet has increased significantly over the years. The internet today has allowed us the capability to accessing information all around the world and even in the classroom. Access to the network allows for online banking, paying bills, shopping and even research without leaving the comfort of your own home. Much unlike it was ten years ago. The internet today can even allow you to be in a virtual world and in that world you can be anywhere at any given place and time.
Across the vast digital world that is the Internet, children and adults can access any type of content they want with ease. We live in a world where young adolescents and children are venturing into the digital world with ambitions and hopes of seeking and finding illicit material, material that is shaping the minds of the male sex across the world. It is estimated that up to 90% of children between the ages of 12 and 18 have access to the Internet. Young people in this age bracket are not only being exposed to but they are choosing to expose themselves to digital pornography. Such exposure to illicit material such as porn has negative effects on the sexual development of children and young adults.
Drug gangs continue to lower the bar on age when recruiting children. Children as young as 9 years old are helping such gangs by becoming lookouts, informants, and assassins. I can go deep into the subject of child warriors because I just wrote a long paper on drug trafficking. It is something I strongly disagree with, once again, and find it should be highly illegal all around the world. Lenn Goodman quotes, “They are exploited to commit atrocities in irregular armies-notably, the Tamil Tigers, but in many other forces too-for their relative physical and moral helplessness, childish fearlessness, desperate poverty, alienation, anger, or isolation,” (Goodman, 2010).
The Internet: a Clear and Present Danger summary Only a couple of clicks of a mouse can ruin your life. The Internet a seemingly harmless software is full of scams, and graphic video and photos. With a few clicks of the mouse you can give all important information away. Cathleen A. Cleaver wrote this essay entitled The Internet: a clear and Present Danger. In this essay she writes about Children and the internet, pornography and the internet, internet transactions, technology must serve man.
On the show “To Catch a Predator” the predators that fall for the bait are arrested. This is just one of the reasons why parents are becoming more worried for their children to be using the Internet. Television shows like “To Catch a Predator” have parents asking themselves, is the internet safe for my children? The internet can be very dangerous, but there are ways for parents to better insure their child’s safety while online. One great way to start protecting your children is to have a computer in a high traffic area in the house where children can be observed.
The homicide and suicide rates among the cyberbullied adolescent is growing with these encounters. Most teens that have considered becoming violent toward others want to because they want to get back at the cyberbully that harmed them. (School) Cyberbullying is defined as “intentional and harmful behavior inflicted through technological mediums such as cell phones or the internet” (Pettalia, Levin and Dickinson). Many people may not even realize that with the use of the electronic device, to engage in cyberbullying, it creates a record that can be used against them. There are numerous ways that a cyberbullies can torment their victims; here are just a few.