Modern technology has laid the track for criminals. Many criminals have jumped on the train of cyber crimes by using the internet. Cyber crimes allows criminals to act fast and get instantaneous satisfaction, yet allows them to feel like they are being anonymous. Cyber crimes usually permits criminals to target individuals, ones finances, or the public, but avoiding these crimes by early detection and more importantly prevention are extremely imperative.
On the internet, there are an abundance of stalkers and predators. However, not all the people who use the internet is classified as a predator or stalker. In larger metropolitan areas the government has specialized units investigating cyber stalking. These specific units investigate and prosecute cyber stalking crimes (Cyber Stalking). Stalkers and predators have many personality profiles; however, once in a while, the police classify them as copy cats. According to National White Collar Crime Center:
The psychological profile of a stalker is that of a person who is somewhat sophisticated (i.e., computer literate) and able to financially support herself. Generally, they are emotionally distant loners who seek attention and companionship in cyberspace and often become obsessed with persons they met while online. (Cyber Stalking)
In most cases, the average person, could be considered as a stalker and or predator; most do not need to be computer literate. The stalker or the predator just needs to be able to know the general basics of using the computer and internet.
Surprisingly enough, defamation or slander is actually a crime where victims can take the wrongdoer to court. “If you defame someone, and you’re found guilty of defamation, civil fines usually apply. This mea...
... middle of paper ...
...b. 18 Feb 2014. .
"Protect your children." Australian Government Interactive . Stay Smart Online - Australian Government Interactive . Web. 18 Feb 2014. .
"2 plead guilty in one of largest child pornography cases in US history." ICE. U.S. Immigration and Customs Enforcement (ICE) - Homeland Security , 17 APRIL 2013. Web. 18 Feb 2014. .
Paul, Stephanie . How is Obscenity Regulated on the Internet?. Legal Zoom , 2007. 93. Print.
"ID Theft, Fraud & Victims of Cybercrime." Online.org. National Cyber Security Alliance. Web. 18 Feb 2014. .
Stewart, B., Boyd, M., & Nunnally, D. (2002). STALKING THE STALKER. People, 58(10), 74. Retrieved February 20, 2012, from EBSCOhost
“Stalking is conservatively defined as "a course of conduct directed at a specific person that involves repeated (two or more occasions) visual or physical proximity, nonconsensual communication, or verbal, written, or implied threats, or a combination thereof, that would cause a reasonable person fear." [1] Stalking behaviors also may include persistent patterns of leaving or sending the victim unwanted items or presents that may range from seemingly romantic to bizarre, following or laying in wait for the victim, damaging or threatening to damage the victim's property, defaming the victim's character, or harassing the victim via the Internet by posting personal information o...
Taylor, Charles. "Censorship is Not an Effective Way to Protect Children." n.d. Gale Opposing Viewpoints in Context. Web. 8 April 2012.
Thomas, Emily (01/16/14) “International Child Sex Abuse Sting Operation IDs Hundreds Of Suspects” The Huffington Post. Accessed < http://www.huffingtonpost.com/2014/01/16/philippine-cybersex-den_n_4605033.html> on 14/03/14
Stalking has been a label for a long-term pattern of persistent pursuit and intrusive behavior directed by one person toward another (Logan & Cole, 2007). It is a term that has been around since the late 1980’s coming about to describe the persistent pursuit of celebrities and today is used to describe all manner of unwanted following, approaching, and harassing behaviors directed toward any individual (Logan & Cole, 2007). Some of the most common forms of stalking are repeated phone calls, visiting home or the work place, sending unwanted gifts, emails, letters, or following the victim.
Technology has opened new encounters and opportunities for the criminal justice system. There are so many new practices of criminal activity, such as computer crimes. There are different types of computer crimes that many people become victims of every day. Computer crime is any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target ("Computer Crime: Chapter 2: What Are the Crimes?", n.d.). Crimes such as data diddling, pump and dump, social engineering and spoofing are computer crimes. Even though these crimes are difficult by privacy issues, the new technology has made investigations and prosecutions well organized and effective. Though views are different on the pros and cons of specific technological changes in the criminal justice system, there is an agreement the system has changed affectedly ("Effects of Technology in Criminal Justice | eHow", n.d.).
The government has passed some laws which are intended to protect children on the internet. The Children’s Online Privacy Protection Act (COPPA) and Children’s Internet Protection Act (CIPA) are to give protection for children who are accessing the internet. There are requirements and protective information for both COPPA and CIPA. Both acts are similar and different in ways to protect children but needed to be done with two acts. There are challenging elements with the COPPA and CIPA to implement in order to be compliant with the acts. There are reasons for the acts to define protection for different age groups such as COPPA defines a child under 13 and CIPA is under 17. When COPPA and CIPA was made into law, there were people who were for the acts but there were also people who opposed the acts.
In todays community no one is safe from targeted by a stalker, males and females become victims of this crime everyday. Men may not be victimized by this crime as much but it still causes a burden to the ones who are. Roughly around 8,000 men across the nation have been victimized by a stalker, narrowing it down to 2% being stalked at least once (Mechanic Mindy). Being a victim of a stalker means a lot of stress and precaution on how you live your life. Any wrong move could lead to your personal life being intruded and possibly getting hurt. Being aware of your surroundings and one's behavior will prepare you for what a stalker brings to the table. Stalkers are able of doing anything from watching you from far away or breaking into your home and getting into your personal belongings. 1 out of every 12 women and 1 out of every 45 men are victimized by a stalker (Mechanic Mindy). Does not really sound seem like a huge number but it adds up as stalkers are not stopped and continue to think what they are doing is okay. Four out of every five s...
The World Wide Web and Internet are great places to study, work, or even play. But there is an ugly side of cyberspace. Cyberspace reflects the real world and some people tend to forget that. Cyberstalking and harassment are problems that a large number of people (especially women) are realizing. (Jenson, 1996, p.1)
A cyber-crime is an illegal activity that takes place on the computer or internet (Williams). Before the internet was invented criminals were stealing information from the computers committing data theft (VPN). The first major cyber-crime was in the 80s, criminals would send a lot of scams to the inbox of emails (VPN). Most of the scams included a desperate story hoping that someone would feel bad for them and send them money or they asked for bank card numbers in order to send them some money. Shortly after is when Congress passed a bill making it illegal (VPN). In the 90s the major cyber-crime was viruses (VPN). Viruses were sent through various websites and once opened the virus puts copies of itself into the computer without the owner knowing (Williams). Once the virus makes copies it slows the computer down, sends pop-ups to the computer screen, and can even shut the computer down (Williams). When social media became essential in the 2000s identity theft became a problem (VPN). People upload all of their information to their accounts giving all of the criminals’ easy access to all personal information (VPN). Every day someone makes a new Facebook profile of someone to scam them and steal information from their friends. Cybercrimes
Haley, Jacqueline. "Anonymity of Cyberstalkers: The Cyber-Watchdog's Tough Collar." Georgia State University College of Law May 2001.
Just as traditional criminal activities, cybercrime can take many forms and occur virtually anytime and anywhere. Criminals committing cybercrime use very different methods, depending on their abilities and goals. This should not surprise anyone after all cybercrime is merely an activity "criminal" to the ingredient that adds a computer or an electronic network for its commission.
In today's society, many aspects of crime committed on a regular basis. Civilians take advantage of people all the time using online resources such as a fraudulent website requiring credit card information to get a free monthly trial. Other examples of cyber crimes are online chatting website, full of predators or websites needing a downloadable program that contains a hacking virus. Sadly, there are many cases of cyber crime all over the internet. The acts of cyber crimes are considered violent acts like any other. Every day citizens are constantly losing money and being victimized due to these fraudulent activities. Cyber crime, including fraud, identity theft, stalking, and hacking, is a growing problem which can be prevented by taking the proper precautions.
Cybercrime is a global issue plaguing the world. The dictionary defines cybercrime as “crime conducted via the Internet or some other computer network”(Merriam-Webster). The definition remains very broad because the word “cyber” is defined as “relating to the culture of computers, information technology, and virtual reality.” Due to the growing number of people gaining access to the internet, rapid development of technology, and the globalization of the world, more of the world population is becoming susceptible to involvement in cybercrime – whether it be as a victim or a criminal. Cybercrime involves different levels of the world on both the victim and criminal side, from an individual citizen, to small groups, businesses, and the government, to the countries of the world.