Cybercrimes Cybercrimes are very annoying. These crimes include scams, viruses, and stealing information. Have you ever heard of the FBI VIRUS? If not, I am going through it now and can tell you all about it. This scam/ virus tell you, you have been watching child pornography and to clear it from your computer you have to pay a fee.
Portable devices such as laptops, cellphones and iPads have encouraged communication via text and instant messaging. An amalgamation of these factors has resulted in increased vices among teenagers, in particular cyber bullying, sexting and slut shaming. This paper will discuss these three practices, analyzing their causes and effects on teenagers today, and giving suggestions on how they can be controlled. Although technology has been associated with many positive effects, cyber bullying, sexting and slut shaming among teens are detrimental practices that have been encouraged by the advancement of technology owing to the obscurity that the cyber space provides. The first practice that this paper will focus on is bullying.
Some experts say it has made us lazy and other say it’s beneficial to us.The Internet has changed our life enormously; there is no doubt about that. There are many advantages of the Internet that show you the importance of this new way of life. What I want to say is that Internet changed our life in a positive way. It has made research easier for us. If you need any type of information you just type it in the search engine of your chose.
Cyber terrorists can be motivated to target organizations that will result in the radical’s group to cause the most harm and/or receive the most attention for their party. Cyberterrorists use the internet to spread propaganda and enlist new members and use DoS/DDoS attacks to cause disruption to companies that represent actions against their belief’s (Vacca & Rudolph, 2011). Cyber terrorists can also steal information to be used for self-serving strategic purposes. Kostadinov (2012) makes the distinction between cybercrime and cyberterrorism in that the latter should resemble terrorist attacks via traditional methods but perpetrated virtually. Kostadinov goes on to note that most cyberterrorism actions are generally focused on website sabotage and email blasting.