Today, we live in a modern world filled with technology. We as a society have so many different machines and gadgets to help make our lives and our daily tasks simpler. For the most part these machines and modern technology is used for the good. Whether it is to help find new cures for new diseases and cancers, designing the latest and greatest automobiles, meeting new people on social media, or social networking websites. However, not all people use these computer technologies available to us in a positive manner. With all of the modern technology today such as Social networking, social media, instant messaging, online shopping and purchasing, and emailing available to anyone and everyone it raises some major and real concerns. Now a day it has never been easier for a sexual predator to pose as someone that they aren’t to try and have sexual relations with underage persons, also known as cyber stalking. Also, let’s not forget about cyber bullying. Cyber bullying is a major issue that is a growing concern on today’s youth. And last but not least, we have computer hackers. Computer hackers are a Major issue due to the fact that they can just about hack any type of computer and get just about any kind of personal information that they want. Identity theft has never been easier due to this fact. (Cyber Security)
First off, let’s talk about cyber stalking. Cyber-stalking usually consist of a few different types of activities, it’s usually considered the ongoing and deliberate harassment , threatening, or unwanted attention towards a person through the internet or other types of on-line and computer communications. Cyber-stalking is not considered occasional junk mail, but it does include many deliberate attempts to harass the victim. Cyber-stalkers usually find their victims from on line chat rooms, social networking, social media, and basically any type of on-line communications. Cyber Stalking can take on many different forms. Including but not limited to threatening or otherwise explicit emails, email bombing, web chat harassment, identity theft, impersonating someone to solicit sexual acts, sending viruses, and other things of that nature. This is a major example of a computer crime and there are many people out there that will do this.
Second, let’s touch on cyber bullying. Cyber bullying is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise made the target of such activities by another child, preteen or teen using the Internet, or mobile phones. It has to have a minor on both sides, that or instigated by a minor toward another minor. Cyber bullying is a major problem and can occur in a few different ways. The methods used are only limited by the minor’s imagination and access to technology. The cyber bully one moment may become the victim the next. Often times they will change roles, going from victim to bully and back again. Children have even gone as far as killing each other and/or committed suicide after being involved in a cyber-bullying incident. Cyber bullying is usually not something that only occurs once, unless it is something like a death threat or a threat of serious bodily harm. Kids usually know it when they see it, while parents may be more worried about the nasty language used by the kids than the hurtful effect of rude and embarrassing posts. As you can see, cyber bullying is a huge computer crime.
Last but not least, let’s talk about Identity theft. Identity theft is a crime in which someone acquirers key pieces of personal