Retrieved March 24, 2005 from the World Wide Web: http://software.itmanagersjournal.com/print.pl?sid=05/02/11/0028208. McArdle, D. (2005, February 18). Group tackles VoIP security fears. ElectricNews.Net. Retrieved March 24, 2005 from the World Wide Web: http://www.enn.ie/print.html?code=9589191.
The users within the peer-to-peer network form a virtual network that is independent of the actual physical network . The aspects resource distribution and self-organization are key to a P2P network. As such, they are discussed in more detail below: 2.1. Resource Distribution Within a P2P networking system, the resources to be shared throughout the network are equally distributed without providing unfair advantages for any peer. Each peer is interconnected through the formed virtual network and typically are dynamically given a new Internet address whenever connecting to the network [1, 2].
New Delhi: Penguin, 2005. Print. Kudchedkar, Shirin and Jameela Begum A., eds. Canadian Voices. Delhi: Pencraft International, 1996.
Many people forget what they put on Facebook affect how you are perceived or will affect the way people are judged. More importantly many people use social media to bully while being anonymous. This provides an easy way because there are limit amount of laws to regulate this form of abuse. Also technology makes it easy to get away with bullying. Another way ethical issues are violated online is through online scams.
There are many reasons for cyberbullying and the results may be life-threatening. History Cyberbullying started with the use of chat rooms that were available to users through various websites and internet providers. With these new platforms, teens were able to express themselves on the basis of anonymity. There was little to no monitoring of these sites and insults were very likely to come from people that one had never met and did not know the names of. Soon after, there was the creation of Social Networks.