Children and young people are at risk of bullying when using the internet, mobile phone and other technologies as it provides an anonymous method of bullying by way of text messages and emails which can be emotionally damaging to a child or young person. Racist, anti-social and cult groups use modern technologies to preach and spread what they are and what they stand for, leaving children and young people very venerable to becoming part of their activity which is unhealthy, unsafe and often illegal. Children and young people are very venerable to predators of all natures using the internet and other technologies, by the encouragement of giving out personal information about them and others close to them, which will put not
How Social Media Hurting In Our Real Life An interesting fact that says, more than 350 million Facebook users suffer from Facebook Addiction Syndrome (Brown p.1)! It shows how the social networking sites like Facebook are taking control over our life. These social networking sites are virtual communities that help and encourage its user to share their personal information, making new friends and communicate with other users. However, its role is very questionable. There are many reasons to worry about it.
Bystander(s) in cyberbullying are the ones that see the text messages, emails, social media posts, pictures, and videos, but do not forward them onto their contacts. There is also a secondary cyberbully, this person sees the texts, emails, embarrassing photos and/videos, and passes them on to their contacts (Bhat, C.S., Chang, S.H., & Linscott, J.A., 2010). Now I want to look at the risk factors that could be involved with being a bully and a victim. The person being victimized generally may have risk factors like being
A child or young person may find cruel messages or pictures about themselves and having their username stolen to spread lies or rumours about someone else. Techniques used by a cyber- bully involves setting up websites to target certain individuals and inviting others to post hate comments about that person. • A child or young person may unknowingly download viruses and malware; a programme that can attach itself to another programme, if this is opened through a spam email it can then damage or create files and generate unwanted behaviour to your computer. • Young people also use mobile phones to send images of themselves to their friends or publish them on the internet, once that image has been published then the sender has lost the power as to what happens to it, it may then be used in contexts other than what it was originally intended for. • Even more seriously they may be groomed by individuals or paedophile rings that use the internet and mobile technology to identify and target potential victims.
Ping sweeps and port scans has been a notorious and yet a useful tool for hackers and system administrators. Ping sweeps and port scans at times can be a nuisance to system administrators. Ping sweeps and port scans work together and can be dangerous but it also can be prevented. A ping sweep, also known as an Internet Control Message Protocol sweep (ICMP) is a basic
In addition there is the danger of exposure to online predators. Facebook is a dangerous network site and taking the risk of using it will cause you harm in one way or another. The biggest risk to children using social networking sites comes from their own peers and from their own behaviour. The most pressing issue on Facebook is the cyber bullying and online harassment. According to Consumer Reports study, over one million children had been bullied online via Facebook in the past year.
Privacy is slowly corroding, and all this information can be obtained from any social networking site. Young adults who are struggling to find themselves can face some level of identity crisis. He or she may become involved in drugs or criminal behavior, which could result in negative circumstances. Many young adults find themselves in possession of an identity characterized by these rebellious behaviors. They claim to be non-conformist to show that they're different from their peers.
Cyber terrorists can be motivated to target organizations that will result in the radical’s group to cause the most harm and/or receive the most attention for their party. Cyberterrorists use the internet to spread propaganda and enlist new members and use DoS/DDoS attacks to cause disruption to companies that represent actions against their belief’s (Vacca & Rudolph, 2011). Cyber terrorists can also steal information to be used for self-serving strategic purposes. Kostadinov (2012) makes the distinction between cybercrime and cyberterrorism in that the latter should resemble terrorist attacks via traditional methods but perpetrated virtually. Kostadinov goes on to note that most cyberterrorism actions are generally focused on website sabotage and email blasting.
Examples are instant messaging, text messaging, blog, emails, etc. cyber bullying through proxy is when the bully gets someone else to do their dirty work. Cyber bullying by proxy is consider the most dangerous type do cyber bullying because adults often get involved and majority of the time the adults are unaware that they are bullying a child. Statistics says that nearly 46% of kids have been bullied online. 70% of students report seeing bullying online.
People have the opportunity to construct one’s identity on social networking sites such as Facebook and My space. This allows cyber bullies with the freedom of performing horrific acts and also the intention of upsetting victim. Some social networking sites such as Little Gossip encourage anonymity. This allows cyber bullies to comment anonymously about victims. People are also able to vote on the comment in terms of whether they are true or false.