Cyber Bullying Essays
Did you know that approximately 43 percent of young adults and teens have had experiences with bullying online? In fact, studies show that 1 in 4 young adults and teens has experienced it more than once and 81 percent of young people feel that bullies get away with bullying online because it is so much easier than doing it in person. Social media, such as Facebook, Twitter, and Instagram, has become the home of so many young adults and teens. It has grown popular worldwide with people of all ages using them. With the increase in popularity of social networking sites, online activity and messaging apps, online bullying is increasing every day and has tripled within the last year. Users do not realize how easy it has become for someone to get their information, and how easy it is to have that information used against them for bullying. Social media lacks when it comes to the privacy and security of its users, leaving its users to become easy targets for bullies to get away with verbally abusing and threatening other users.
The loss of privacy on social media over the years has led to an increase in online bullying. For example, all your personal information such as what city and state you live in, your phone number, what school you attend, and email addresses can be seen by people who aren’t even on your friend’s list. According to internetsafety101.org, statistics say 72 percent of teens have a profile on a social networking site or app, and roughly 47 percent have a profile on a social networking site or app that can be seen by anyone. This has made it easy for people to be able to use user information to bully social media network users. Social media network users do not realize how easy it is to be able to use their information. Not only is your information used as a weapon against you, but your information can even be used by bullies to be able to find you. Your information such as what school you attend, what city you live in, phone number, and email, are displayed to everyone, even those who aren’t on your friends list, and even strangers. Bullies can even copy all of your photos and information to make a fake profile of you. I myself, am a victim to a fake with all my information.
It seems unfair to become a victim of bullying, and no one suffering any kind of consequences for it. Social networking users have to go through being insulted, humiliated, and not be able to do anything about it. It is very easy for a bully to change their name and age on a social networking profile. They can open profiles with different photos too. Having a fake profile makes it easier for someone to bully you and go unpunished for it. Bullies can even tag a photo of you without your permission, and also tag others in the same photo who will also bully you, leaving you and your profile exposed for everyone to join in on the bullying by leaving mean comments about you on the photo.
Since the introduction of computers to our society, and in the early 80s the Internet, the world has never been the same. Suddenly our physical world got smaller and the electronic world set its foundations for an endless electronic reality. As we approach the year 2000, the turn of the millenium, humanity has already well […]
With all today’s continuing technology we have a responsibility to help and look after children and young people. E-safety is a safeguarding issue and we must have an understanding of it. Children and young people are open to many risks while being online or using their mobile phones, they may be lured into giving personal […]
A security weakness in the field of IT refers to a situation where a resource is susceptible to attacks, whether they come from internal or external sources. The level of vulnerability of a resource depends on how easily it can be rendered non-functional by an attack, leading to disruptions in business operations (Schellenberg, 1995).
The economy has been affected by the pollution resulting from electricity production and usage. However, computers and new technology continuously enhance life for everyone. Despite the freedom provided by these advancements, it is crucial that we assume greater responsibility for our well-being. The growing prevalence of computers and technology has resulted in a decrease in […]
Science – a systematic enterprise that builds and organizes knowledge in the form of testable explanation and prediction about the world. Technology – the making, usage and knowledge of tools, techniques, crafts, system or methods of organization in order to solve a problem or serve some purpose. Science and technology affects our daily life activities, […]
Cybercrime, hacking, blackmailing, fraud, theft and extortion; these are the first few types of crimes come into my mind when we are presented with the words “technology” and “crime”. One of the reasons might be that we all have been prone to the nuisance caused by any of these crimes at least once, as almost […]
Crimes have been existent throughout human history. In fact, some experts believe that crime is actually an important aspect of society, in which the balance of a society as a whole also depends upon the presence or occurrence of crimes (Henry 13). Actually, it is apparent that even though there are different measures to deter […]
The role of computers and the internet has become significantly more important in our daily lives. They are now essential for quick communication, banking, public administration, social networking, data sharing, business activities, and other tasks. Many people would face significant difficulties without computers. However, despite the numerous advantages that information technology offers us, we must […]
In “Douse the Online Flamers” Andrew Keen writes about individuals who choose to hide behind a facade in cyber crime. He goes on to speak of the unlawful acts inflicted upon innocent individuals of cyber space. Keen reflects on three major cases where cyber criminals are protected under the freedom of speech act while the […]
Computers rule the business world. Through interconnection of various networks, one can easily and readily access the information that he needs, that is, through the Internet. The American Heritage Dictionary defines the Internet as an interconnected system of networks that connects computers around the world via the TCP/IP protocol. It is one of the most […]
The UK enacted the Computer Misuse Act in 1990 to outlaw certain activities, including hacking into others’ systems, software misuse, and assisting someone in accessing others’ protected files. The Act’s primary aim was to deter such actions in the future. It specifically highlights three misdemeanors: 1. Unauthorized entry into computer data. 2.Attempting to access a […]
As the world becomes technologically advanced, computer plays a significant role in various aspects, in terms of the business. Nowadays, we can see that there are many of commercial activities in the internet such as product advertising. This holds a considerable discussion amongst group people. Some people believe that this provides plenty benefits, while other […]
Before readers can understand the difference between cybercrimes and traditional crimes, they must know what a cybercrime is. Cybercrimes, also known as computer crimes can be described as any crime committed through the use of a computer or computer technology (Jones, 2007). Though definitions vary, cybercrimes can be placed in four broad categories-unauthorized accesses to […]
What makes a large organization look like Wal-Mart financially successful? One could say it is the result of outstanding personnel or perhaps a strong determination to succeed. These factors certainly contribute. However the key to financial success in organizations lies in good accounting. Since early civilization began, accounting has been an important part of our […]
The contents of Firion’s Cyber Security Policy and Implications on May 10, 2011 includes the following: – Security Policy Structure as it Relates to Humans – Cyber Crime and Cyber Warfare – Profile and Motivations of a Cyber Criminal – Attack Methods and Firion Vulnerabilities – Cyber Crime Trends – Laws and Regulations Driving Company […]
In our society, smart phones have become an essential tool for communication, internet access, email exchange, and document storage. Consequently, personal contact information and sensitive financial and business data are stored on these devices. Therefore, it is crucial to prioritize the privacy of this information in cases of device theft. The security of these devices […]
Almost 90 percent of our society now depends on complex computer based system. With the increasingly use of computer and explosive growth of the Internet has brought many good things: electronic commerce, online banking, e-mail, video conferencing etc. The improvement of systems security to prevent criminal hacker has become an important concern to society. There […]
Analyzing the growth of wearable computing technology and its impact on electronic crime victimizations 3.Conclusion a.Summarizing the findings on computer viruses as a new form of threat b.Highlighting the role of wearable computing in increasing electronic crime victimizations.The text discusses the vulnerabilities and threats in computer and networking technology, including configuration errors and passwords as […]
kaygusuz1 It is the weekend you have nothing to do so you decide to play around on your computer . You turn it and than start up , calling people with your modem , conneciting to another world with people. This is all fine but what happens when you start getting into other peoples computer […]
The hot debated topic in the informative age is computer crime. These crimes are committed with the help of computers which wreak havoc and completely paralyse the economy. These crimes are with high intensity and more deadly and destructive than physical crimes. There are no precise, reliable statistics on the amount of computer crime and […]
Disgruntled employees who alter, damage, steal files, or engage in embezzlement contribute significantly to companies’ financial losses. Criminal activities involving computer systems also encompass unlawful access to government records, including manipulation of criminal history and want and warrant information, creation of fraudulent identification documents like driver’s licenses and passports, alteration of tax records, and unauthorized […]
In today’s society, the value of information surpasses that of grain, steel, or technology. Thanks to computer networks, almost everyone now has the ability to access a vast amount of information. The Internet, which is predominantly used by the United States with an 80 percent usage rate, provides an immense wealth of free information on […]