What is the approach you should take when someone has the same or similar domain name as you? What should you do about theft, defamation, and cybersquatting? To deal with these things you need to know about the tools and laws. There are meaning thing you see on the internet such as cyberbullying, theft of personal information, and denial-of-service attacks. What is really being done about these situations? Your answer would be hardly anything.
One thing I learned about is the WHOIS search. This requires you to register your domain name. Once the domain name is registered, anyone can look up your domain name using the WHOIS search. The thing is once you do this, you public information is out there for everyone to see. People tend to use this site to find out the expiration date of your domain name, the ownership, and to see if there is any criminal activity. They will know all this because besides your personal information, your web IP address and host name will be available. One the plus side, there are also private ...
... middle of paper ...
...I feel like we focus on so much on petty stuff and not something like this that truly matters. What I learned about this book is that you have to be careful. No matter who you are, someone on the internet is waiting to take advantage of you just because they can. Be cautions of what website you go on because it can all be a fraud. I personally would not buy anything off a website unless I absolutely knew it was safe. In addition, do download or take information that is not yours illegal. I am sure you would be upset if someone did that to you, so treat him or her how you want to be treated. Finally yet importantly, be smart! Be smart about things you look at, post about yourself and about other because it can come back to haunt you.
Blakeslee, M. R. (2010). Internet crimes, torts, and scams: investigation and remedies. Oxford: Oxford University Press.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- In Greek mythology, the Theogony recalls the lineage of Greek deities. Part of the story contains information about a monster named Orthrus. The beast is a two headed dog that was responsible for guarding the island. However, Orthrus was eventually slaughtered by the epic hero, Heracles. Obviously, a two headed, monster dog has potential to bring about catastrophe. But trained in the correct way, Orthrus could have been a valiant watchdog and become an honorable hero in Greek legend. Technology in the present is very much like Orthrus in that progress and advances can lead to a positive or negative impact on the world.... [tags: Internet, technology, cyberspace, abuse, Orthus]
1532 words (4.4 pages)
- Torts vs. Crimes When a wrongful act results in an injury or interferes with someone’s rights the results could become a tort case or a criminal case (LaMance n.d.). Torts can be from a wide variety of legal cases and are brought up in civil courts. A lawsuit is filed and charges are brought up buy the plaintiff or the person or persons who suffered the tortious injury, also known as the victim(s) of the tort. The defendant is the tortfeasor or the accused and if found guilty must cease the violation and pay for damages to the plaintiff.... [tags: liabilities, defective products, rights]
1245 words (3.6 pages)
- In today's society, many aspects of crime committed on a regular basis. Civilians take advantage of people all the time using online resources such as a fraudulent website requiring credit card information to get a free monthly trial. Other examples of cyber crimes are online chatting website, full of predators or websites needing a downloadable program that contains a hacking virus. Sadly, there are many cases of cyber crime all over the internet. The acts of cyber crimes are considered violent acts like any other.... [tags: Internet Crime, Cyber Crime Essays]
1424 words (4.1 pages)
- The United States legal system protects companies and employees from being affected by the constant moving, ever changing technology trend that is traveling across the world today. This paper will be comparing several events that have taken place at BUG, Inc. with their competitors, employees and customers. Comparison of the events and the legal torts that are being violated will be reviewed for each incident. We will discuss areas that the company or the employee or customer should be taking further action.... [tags: Intentional Torts and Negligence]
1903 words (5.4 pages)
- In this study, an analysis of financial healthcare scams will define one of the most prominent methods of stealing financial resources from the elderly in the United States. Most commonly, the use of Medicare fraud is a typical financial scam that exploits the elderly person through a criminal pretending to be a Medicare agent that takes their financial data and healthcare information. Another major scam in the field of healthcare is the selling of counterfeit drugs that are sold by non-regulated criminal organizations that take the money of the elderly through the guise of lower drug costs.... [tags: Fraud, Deception, Authentication, Drugs]
1044 words (3 pages)
- Cyber-Torts in the Workplace A tort is recognized as conduct that results in an injury or damages that are legally recognized (Lau & Johnson, 2014). Torts that occur on the Internet are referred to as cyber-torts. In the workplace, there are multiple cyber-torts that employees may commit, whether intentionally or unintentionally. Examples of such cyber-torts are cyber defamation, trespass to chattels, and conversion. Cyber-Defamation Cyber-defamation occurs when something is written about a company that is untrue and defamatory, meaning that it has the ability to damage the company’s reputation (Mew, 2013).... [tags: Tort, Tort law, Negligence]
1101 words (3.1 pages)
- Online Fraud, E-Crime, and Internet Scams In the mid-1980’s, computer-related crimes appeared in the United States. Computer-related crimes have now spawned into Internet crimes, and have raised issues regarding Internet security. Essentially, the Internet has become a playground for criminal mischief. Basically, 21st-century technology and Internet accessibility are providing arenas for criminals to use old-fashioned techniques to take advantage of consumers. Recently, Internet crime rates have skyrocketed.... [tags: Computers Technology Crime Essays]
1296 words (3.7 pages)
- Internet Scams From the comfort of an internet user’s own home they truly have the world at their finger tips. They have access to a Global Market place through the internet. Cyberspace offers unlimited options for quick and easy ways to shop, find investment opportunities, communicate, and much more. Unfortunately however, in today’s world fraudsters also find the internet to be a quick and easy way to fool and rob unsuspecting surfers with false advertising and false promises. The fraudsters target those who do not know how to determine the validity of online offers and sales.... [tags: Computer Fraud Fraudulent]
1696 words (4.8 pages)
- August 1991 was the day when people finally had public access to the internet. However, the internet gradually become populated with advertisements which stated things like, “you’ve won the lottery, click here to claim your reward!."” It was these very messages that began what we call internet fraud. What is internet fraud. Internet fraud is, simply put, saying one thing and doing another. It is the act of robbery on a whole new platform (check spelling). I.e. it is the process of lying and stealing through the use of “advirtisements” that, one, lie to users and state an “irrisistable offer” and two, have internet users fill out some kind of form for any “registration fees” that may appl... [tags: Online Scams]
1367 words (3.9 pages)
- Internet2 Internet2 was formed in 1006 with an original 34 institutions participating. With Internet2, the Clinton Administration was trying to advance technologies for many people. Their first step was to connect 100 institutions at 100 times the speed of the current internet. The applications generated by this research have already had a positive affect on fields such as health care, national security, distance learning, energy research, environmental monitoring, and manufacturing. Internet2 is an extremely interesting subject.... [tags: Internet Computers Technology Essays]
1512 words (4.3 pages)