Cyber Bullying Essays
Did you know that approximately 43 percent of young adults and teens have had experiences with bullying online? In fact, studies show that 1 in 4 young adults and teens has experienced it more than once and 81 percent of young people feel that bullies get away with bullying online because it is so much easier than doing it in person. Social media, such as Facebook, Twitter, and Instagram, has become the home of so many young adults and teens. It has grown popular worldwide with people of all ages using them. With the increase in popularity of social networking sites, online activity and messaging apps, online bullying is increasing every day and has tripled within the last year. Users do not realize how easy it has become for someone to get their information, and how easy it is to have that information used against them for bullying. Social media lacks when it comes to the privacy and security of its users, leaving its users to become easy targets for bullies to get away with verbally abusing and threatening other users.
The loss of privacy on social media over the years has led to an increase in online bullying. For example, all your personal information such as what city and state you live in, your phone number, what school you attend, and email addresses can be seen by people who aren’t even on your friend’s list. According to internetsafety101.org, statistics say 72 percent of teens have a profile on a social networking site or app, and roughly 47 percent have a profile on a social networking site or app that can be seen by anyone. This has made it easy for people to be able to use user information to bully social media network users. Social media network users do not realize how easy it is to be able to use their information. Not only is your information used as a weapon against you, but your information can even be used by bullies to be able to find you. Your information such as what school you attend, what city you live in, phone number, and email, are displayed to everyone, even those who aren’t on your friends list, and even strangers. Bullies can even copy all of your photos and information to make a fake profile of you. I myself, am a victim to a fake with all my information.
It seems unfair to become a victim of bullying, and no one suffering any kind of consequences for it. Social networking users have to go through being insulted, humiliated, and not be able to do anything about it. It is very easy for a bully to change their name and age on a social networking profile. They can open profiles with different photos too. Having a fake profile makes it easier for someone to bully you and go unpunished for it. Bullies can even tag a photo of you without your permission, and also tag others in the same photo who will also bully you, leaving you and your profile exposed for everyone to join in on the bullying by leaving mean comments about you on the photo.
Introduction Nowadays, computer crimes have become a disappointment for businesses due to the advanced technology used by criminals to avoid being detected. In the 1950s, computer programs and data were stored on punched cards. If a criminal broke into an office and damaged or stole these cards, they could face severe punishment under breaking and […]
If you don’t have any weekend plans, you can choose to enjoy yourself. To start a computer, one must make contact with people. With a simple button press, the modem instantly links you to a parallel world where individuals similar to yourself can be encountered. When you start exploring other things, what happens? Computer crime […]
The increase in computer crimes, which have grown in both quantity and variety, necessitates the implementation of laws. Over the past two decades, computers have become an essential part of society. They are extensively used in sectors such as airlines, banking, industry, and businesses. This widespread adoption is primarily due to people using computers at […]
Overview Issues of online scams and hacking have been disturbing for quite long. A large number of those involved in such activities are majorly driven by the desire to acquire money easily. They take it as a kind of business in which a very minute efforts result into lots of profits. This analysis starts by […]
The digital media is being celebrated as an innovative and exciting platform that represents global development. The utilization of cell phones, the internet, and other social technologies is helping to strengthen global communities by providing information and empowering the voiceless. While the internet and communication technologies can be utilized for positive social change, like any […]
Cyber-attacks are the new tools of national power. The attacks provide a means of influence, coercion and attack. The use of cyber techniques does date back to the 1980s while cyber-attacks for militaries do date back to the 1990s. In the Gulf region, the use of cyber techniques and tools does serve as the instrument […]
Introduction The significance of information technology in our everyday lives cannot be overstated. Nevertheless, the swift advancement of technology has led to numerous concerns, specifically regarding data security. These issues encompass cyber-attacks, hacking, and identity theft, which are universally acknowledged as calamitous and are also widespread within the United States. The purpose of this research […]
Introduction Cybercrime involves all illegal activities through a computer or any telecommunication network. It includes hacking and other crimes conducted through the internet like identity theft and credit card account theft. Financial crimes involve misrepresentation of financial records with an intent of obtaining financial benefits. This includes unauthorized altering of financial data by entering of […]
Cyber terrorism is the intentional use of computers, networks and internet to cause harm and destruction (Conway, 2014). It is done to intimidate a government in furtherance of social and political objectives. An attack should result in violence against people and property or at least cause enough harm to generate fear in order to qualify […]
Routine activity theory is a crime event theory which focuses on explaining why some people commit a crime. The theory, therefore, states that, for a crime to occur three elements must come together in any given space and time: an available target, a motivated offender, and absence of a capable guardian that could intervene. In […]
Computer hacking is the practice of illegally creating a fake copy of the original software or accessing into unauthorized computer networks to achieve other intentions rather than the original purposes (Levy). Hacking may cause loss of vital documents, reduced privacy, and financial losses. Sensitive data such as Personally Identifiable Information that can be used in […]
Security in Businesses: Protecting Against Cybercrime Modern businesses heavily rely on technology to enhance productivity and cut costs. However, the widespread use of technology also puts them at risk of cybercrime. Malicious hackers can exploit vulnerabilities in a company’s systems to steal sensitive data, including competitive strategies. Cybercriminals can tarnish the reputation of a company […]
Abstract Singapore is well recognized as a leading partner in Waste management, strategic security, and technological innovation. The development of Singapore Smart City introduces the country into the leadership of global smart cities in the history of the world. But, Smart Cities comes with their own package of challenges which Singapore Smart City concept must […]
Introduction Cities all over the world are increasing growing smart. These include San Diego, Barcelona, New Yolk, and Dubai among many others. However, this has been posed them in the fatal risk of compromised cyber security and potential loss of their assets such as information system concerning the local department, general security, schools, power plants, […]
Cyber bulling refers to the act in which someone deliberately threatens to harm or makes an harassment by the use of the internet and other information technology avenues in a manner that is consistent. The act of cyber bulling can take different methods ranging from acts like spreading rumors to even performing acts of defamation […]
Introduction The Internet has forever changed the way the world does business, communicates, and shares information. Because the Internet and computers provide a convenient, fast method to communicate, do business, and share information, there are a growing number of businesses, individuals, and governments that have shifted its functions and activities to the Internet. Like all […]
Introduction The internet is amongst the fastest-growing fields of technical infrastructure advancement. Currently, information and communication technologies (ITCs) are everywhere, and the world is becoming more digitized by the minute. The bidding for computer and internet connectivity has brought about a high degree of assimilation of computer technology into the field of production so that […]
Technological developments have had a great impact on people’s day to day activities and more arguably ways of communication. Extensive research in the recent years has been done to study the current relationship between people and their phones and other technologies and also their face to face communication with other people. According to my general […]
Introduction Cyber security, which refers to the protection of information systems from damage or theft (Glantz et al, 2014), involves measures aimed at preventing unauthorized physical access to hardware containing sensitive information (Glantz et al, 2014). Although these measures are in place, unauthorized individuals often attempt to breach data protection by hacking into the system […]
Individuals value their privacy as well as the protection of their personal areas in life. They do value some control over who does know anything about them. Most of the time they do not want their personal information being accessed by anybody at any time. Analyzing personal privacy issues that are related to various business-related […]
Introduction The concept of cybersecurity involves a range of technologies, practices, and processes that aim to protect computers, programs, networks, and data from harmful attacks or unauthorized intrusion (Von Solms & Van Niekerk, 2013). In the IT sector, the term security is generally used to refer to cybersecurity. To fully grasp the concept of cybersecurity, […]
Introduction The internet has transformed the lives of individuals in the digital age, connecting people worldwide and continuously expanding its influence. Businesses have reaped advantages from the accessible internet, achieving greater effectiveness, while individuals can now effortlessly participate in global commerce. Despite the numerous security challenges, cyber security remains a persistent global issue that affects […]