Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
background of the study about cyberbullying
social media effects on the youth
social media effects on the youth
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: background of the study about cyberbullying
Vulnerability to Internet Predator The publicity about online predators that prey on naive and inexperienced young children using trickery and violence is largely inaccurate. Internet sex crimes involving adults and juveniles more often fit a model of statutory rape which is adult offenders who meet, develop relationships with, and openly seduce underage teenagers than a model of forcible sexual assault or pedophilic child molesting (Wolak et. al., 2008). However, prepubescent children are even less vulnerable because their internet use is generally more supervised by the parents and guardian. In addition, they use the internet less for communication and are for developmental reasons, less interested in sex and relationships than adolescents. Internet users at the ages of 12 to 13 years generally understand the social complexities of the internet at the same levels as adults. As they get older and gain experience online, they engage in more complexes and interactive internet use puts them at greater risk than younger, less experienced youth who use the Internet in simpler, less interactive ways ((Livingstone & Sonia,2006). Among youth ages 12- to 17-years-old, it was those ages 15 to 17 that were most prone to take risks involving privacy and contact with unknown people. On the other hand, the target who are the most vulnerable to online victimization that have histories of sexual abuse, sexual orientation concerns, and patterns of risk taking off- and online have minor risk in involved again because of the experienced (Jones & Jemmot, 2009) . According to Jones and Jemmot (2009) most victims are girls of all ages with the risk of family problem and this can happen at any age. Most reports suggest that the vulnerability begins in... ... middle of paper ... ...x Offender Registry, STOP SEX OFFENDERS ebook, Free Child ID, Registry News & More! (n.d.). Retrieved from http://www.stopsexoffenders.com/ Wooden , K., Webb, R., & Mitchell, J. (2012). A Profile of the Child Molester. Retrieved from www.childluresprevention.com/pdf/Profile-of-Molester.pdf? Wolak, J., Finkelhor, D., Mitchell, K. J., & Ybarra, M. L. (2008). Online “Predators” and their Victims: Myths, Realities and Implications for Prevention and Treatment. American Psychologist, 63. Retrieved from http://www.unh.edu/ccrc/pdf/Am%20Psy%202-08.pdf How Internet Predators Select Their Victims - Safer Internet. (n.d.). Retrieved December 23, 2013, from http://www.safer-internet.net/how-internet-predators-select-their-victims.html How to Stop Internet Predators | eHow. (n.d.). Retrieved December 23, 2013, from http://www.ehow.com/how_6534818_stop-internet-predators.html
Howitt, D., & Sheldon, K. (2007). Sex offenders and the internet. Retrieved from http://books.google.com/books?id=-XO_wPs6a-gC&printsec=frontcover&source=gbs_ge_summary_r&cad=0#v=onepage&q&f=false, 60-61.
We have all watched television shows, we have heard the warnings, and have read numerous articles that expose internet predators and pedophiles. Most of us are aware of the dangers surrounding children and teenagers as they navigate the internet’s virtual world. There is no shortage of predators online. Chris Hanson has a very popular show called To Catch a Predator that has helped bring awareness to the public of this heinous crime against children, and while this is extremely important to know and prevent, there is another large segment of society that is at risk too. This paper will focus on this “other” population.
The micro-theory that can be associated to explain the case study and why child exploitation occurs online is the social learning theory. The social learning theory is built off of differential association with the idea that criminal behavior is learned from others (Moore, 270). However, social learning theory determines that individuals not only engage in criminal behavior when around people associated with similar behavior, but that the behavior is also justified (Moore, 270). The Internet and technology have made social learning for pedophiles and child exploiters easier due to the access and opportunities it allows.
The internet has enabled our society to accomplish great things that would not have been achieved without the advanced technology available to us today. Everyone knows that there are both pros and cons to the advanced technology available practically worldwide. However, everyday youth are finding new ways to engage in inappropriate behaviors such as cyberbullying and sexual misconduct (sexting) with technology, and most adults are practically blind to this rising problem until it is too late. There are however, many solutions that schools, adults, and parents can do to put a stop to these cyberbullying and sexual misconduct activities occurring online.
In recent findings 75% of Europeans use the internet (Livingstone and Haddon, 2009) and 65% of the teenagers’ have a Face book or My Space account (Lenhart et al, 2008). Children find that having these accounts is a place for them to meet new people and have a feeling that they belong, and to expand their friendships, but it is also a place for pedophiles to attack especially because it is so easy to manipulate who, how and whey they want, this is where a parent needs to gain control and talk with their children about what can happen on these sties and watch for any warning signs that may appear example maybe their child is acting differently or they ask to meet someone that the parent has never heard about before, looking on computer and viewing what sites the child has entered are ways to catch these instances’ early. Research suggested that 25% of victims are boys who are gay or that are unsure of their sexuality and most of the offenders are
"Sweetie" was entered into a total of 19 chat rooms, in which she was propositioned to perform sexual acts by 20,172 adult men from 71 different countries, who had been informed of her age. Terre des Hommes' (2013) informal "sting" operation identified 1,000 online predators in just 10 weeks, and estimated there to be 750,000 predators online, at any given time (Terre des Hommes, 2013). No computer hacking or illegal methods were used to identify the perpetrators, which raises the question: why is child webcam sex tourism growing so rapidly if c...
A change has occurred regarding the increase of online predators. The internet has been one of the most important technological advancements this century. The internet has allowed people from all over the world to communicate with family, friends, and strangers. But it has also caused major concern. With everyone communicating through online forums, social networks, and chat rooms, it is impossible to figure out who the people are talking to. With the internet, people are able to live multiple lives. With this advance in technology, there has been a major increase of online predators. Predators can create different identities, pick new names, lie about their age, and use another person’s picture as their own. By being well educated on this topic, perceptions can be changed by parents and children of how they use the internet. Even though there are many more outlets for online predators to get to who they want than there used to be, there are still a variety of red flags and signs that parents can see to immediately take action, and with that action will come trouble with law enforcement for the accused. Also, educating the child and having open communication will help even further. There are also precautions regarding the parent that can help prevent it in the first place. Since technology is increasing so drastically and children are more readily able to access the internet at a much younger age, it is necessary to make online predation more known to parents, and they must be well versed in the strategies that they can take to prevent it from happening.
Wolak J., et al. (2009). Online “Predators” and Their Victims: Myths, Realities, and Implications for Prevention and Treatment. American Psychologist, 2008;63, 116-118
Certain individuals have a difficult time making new friends, either because they are shy, or just because society has deemed them to be “different” or “weird”. The Internet helps individuals overcome those barriers while socializing on the Internet. Most use social networking sites such as: Twitter, Facebook, and Tumblr. According to the supporters of social networking, these websites allow teenagers to socialize and make friends with peers they normally would not approach (Social Network Websites, n.d.). It seems their shyness melts away behind a computer screen and they are able to have any identity they want, and even find others with the same interests. On the other hand, it is argued that the Internet is dangerous. Sexual predators and pedophiles can join social networking sites too easily, and use websites to entice minors into meeting them in person. It is also argued that spending too much time on the Internet can stunt social growth (Social Network Websites, n.d.). The amount ...
A 14-year-old girl was chatting with a child predator on social media for a month before deciding to meet in the woods near the girls’ home. The sex predator, Jarred Workman was hiding in the girl’s closet for five days, raping her at night repeatedly. He was found by the little girl’s mother, when she was putting something in the girl’s closet. When he ran he dropped his wallet and phone, making it easier for authorities to locate him (Murdock). The victim’s story is not unique. Many young people are on social media and are unaware of the danger.
...n them and their friends. Online predators mainly exist on the Internet, because they take advantage of the anonymity that social networking sites provide. They usually treat their victims with kindness, attention and even gifts. Once the predator build trust with their victim, they will try to meet them in real life in hope that they can fulfill their fantasies of having sexual encounter with underage kids.
Large sums of individuals do not understand what cyber-stalking entails. In the past, stalking would take place using different procedures including finding a person’s house and watching them or following a person without being welcome. As time has passed, technology has grown at a rapid rate. The birth of the internet has caused many drastic changes to the world. Some have a very negative effect on society including cyber-stalking. Without the need to follow a person around, a sta...
The World Wide Web and Internet are great places to study, work, or even play. But there is an ugly side of cyberspace. Cyberspace reflects the real world and some people tend to forget that. Cyberstalking and harassment are problems that a large number of people (especially women) are realizing. (Jenson, 1996, p.1)
“People are very reluctant to talk about their private lives but then you go to the Internet and they’re much more open (Internet Quotes).” Paulo Coelho mentioned this on the topic of meeting strangers online. In a society so dependent on electronic communication, children are only accepted by making online connections. This means they will go to great lengths to have large numbers of people watching them on social media; adults tend to do the same. Children learn by observing our behavior. Acting as if a day without an online connection will ruin our civilization would corrupt the child’s mind, thus making them think the Internet is the most vital object. Of course, there are dangers when one allows a child onto the web. Without proper education on the dangers in the online world, children may fall into a trap and become potential victims. In order to have a well-rounded youth, parents must express healthy role modeling by teaching them how to identify dangerous interactions and carefully monitoring the web history to protect children from online threats.
Wolak, Janis, et al. "Online “predators” and their victims." Psychology of violence 1 (2010): 13-35. Web. 10 Nov. 2014 .