The New Age Criminal: How the Psychological Isolation of Cyberspace Contributes to Victimization.<br />1<br />New Age Crim...
The New Age Criminal<br />New Age Criminal<br />2<br />How safe are individuals when including personal information on the...
Internet Safety Conflicts<br />New Age Criminal<br />3<br />Many web-based businesses expect a certain level of personal i...
Weakness of Data<br />New Age Criminal<br />4<br />The weakness of the research does not show a directly connection from t...
Psychological Aspects of Some Internet Users<br />New Age Criminal<br />5<br />     Many other perpetrators may find his o...
Internet Accountability<br />New Age Criminal<br />6<br />The evidence enforces the need for awareness and vulnerability f...
Preventative Steps to Take to Avoid Becoming Victimized<br />New Age Criminal<br />7<br />How can we create devices to lim...
Conclusion	<br />New Age Criminal<br />8<br />Internet programs put the public at risk for victimization, targeting the yo...
References<br />New Age Criminal<br />9<br />Albanesius, C. (2010). Consumers Haven't Learned Not to Divulge Private Info ...
Upcoming SlideShare
Loading in …5
×

The New Age Criminal

298
-1

Published on

This presentation shows how new technology can put individuals at higher risk for victimization.

Published in: Health & Medicine, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
298
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • This perspective is based on enlightening different populations that rely on new technology as socialization devices. On-line dating, speed dating on cell phones, cell phone software that can digitally transmit a person’s location may cause an increase in victimization among the more current technology users.
  • How safe are individuals when including personal information on the internet? “It’s becoming not just a worldwide problem, but a worldwide business [of predators invading our homes to target the vulnerable] (Williams-Thomas, 2009, p 2). Cyber stalking, pornography, preying on children in the hopes of gaining better access to them is more common than individuals ever imagined. “Twenty years ago, a [predator] would have had to loiter around parks, funfairs and swimming pools to gain access to children, where his suspicious behavior – in full public view- would often have raised the alarm before he could cause any real harm” (Williams-Thomas, 2009, p 3). Today, the internet and cell phones give perpetrators easy access to individuals that may become victims. Youth may have difficulty interacting socially and may use the internet as a reliable source for finding friends. This group of friends may elicit personal information from the youth that may put the youth at risk of victimization.
  • Internet programs put the public at risk for victimization, targeting the youth and those that give too much personal information on public sites that can be used against them. Dating sites on phones can link individual’s GPS locations to determine who is in a person’s immediate surroundings. Predators use this information to create an illusion of false pretense to lure potential victims into a vulnerable situation. It is the responsibility of the public to mandate changes to help deter criminal activity and to ensure the safety of those that are using modern technology on a day-to-day basis. Laws are encountering crimes committed on those divulging information on internet programs. Offenders are being subjected to different sentencing restrictions, including website restrictions and communications.
  • The New Age Criminal

    1. 1. The New Age Criminal: How the Psychological Isolation of Cyberspace Contributes to Victimization.<br />1<br />New Age Criminal<br />
    2. 2. The New Age Criminal<br />New Age Criminal<br />2<br />How safe are individuals when including personal information on the internet? “It’s becoming not just a worldwide problem, but a worldwide business [of predators invading our homes to target the vulnerable] (Williams-Thomas, 2009, p 2). Cyber stalking, pornography, preying on children in the hopes of gaining better access to them is more common than individuals ever imagined. “Twenty years ago, a [predator] would have had to loiter around parks, funfairs and swimming pools to gain access to children, where his suspicious behavior – in full public view- would often have raised the alarm before he could cause any real harm” (Williams-Thomas, 2009, p 3). Today, the internet and cell phones give perpetrators easy access to individuals that may become victims. Youth may have difficulty interacting socially and may use the internet as a reliable source for finding friends. This group of friends may elicit personal information from the youth that may put the youth at risk of victimization.<br />
    3. 3. Internet Safety Conflicts<br />New Age Criminal<br />3<br />Many web-based businesses expect a certain level of personal information to be revealed in order to meet criteria for joining groups, signing up for email notifications, etc. Most sites require personal information to set up an account and can give predators insight into a person’s life without meeting the victim face-to-face. “Of the 2,000 people surveyed by the magazine (Consumer Reports), about 52 percent of adult Internet users have posted data that could be dangerous, including home addresses, full date of birth, and information about their children” (Albanesius, 2010, p 1). Divulging personal information can create a target pool for cyber predators. Some predators may target college persons by creating a false identity mirroring common activities to lure victims into believing he or she has met someone with shared interests. Dating sites may also give predator’s valuable personal information about individuals, making the individuals an easier population to target.<br />
    4. 4. Weakness of Data<br />New Age Criminal<br />4<br />The weakness of the research does not show a directly connection from the internet to the victimization. There needs to be more data in determining about the way a predator chooses his or her victim and the information that may attract a predator. Some sexual assaults have been reportedly linked to on-line dating services. Victims meet a person in an on-line dating chat room, over time feel comfortable with this person and decide the person is safe enough to meet in person. The victim does not know that the perpetrator has chosen the victim based on detailed information that was viewed from the dating profile.<br />
    5. 5. Psychological Aspects of Some Internet Users<br />New Age Criminal<br />5<br /> Many other perpetrators may find his or her victims through the internet support groups associated with those with low-self esteem. Many may look to the internet for advice among others, looking for groups for understanding and support. “Despite their popularity, there is little evidence as to the effectiveness of Internet support groups which provided peer-to-peer mutual support” (Depression, 2010, p 1). Are those using the internet more prone to experiencing depression, believing false information and have social difficulty? If so, do these characteristics alone may them more vulnerable to victimization? <br /> Social media was created to encourage social interaction. “Human factors are key issues for the development of Web-based applications, leading research into human factors to grow significantly” (Chen & Macredie, 2010, p1). “Sex offenders living in the United States are bound by multiple policies, including registration, community notification, monitoring via a global positioning system, civil commitment, and residency, loitering, and Internet restrictions” (Bonnar-Kidd, 2010, p 1). Laws are in place for predators to be restricted from areas such as internets, but what type of restrictions can be enforced with cell phones or community places that have internet accessibility, such as a library or community center? <br />
    6. 6. Internet Accountability<br />New Age Criminal<br />6<br />The evidence enforces the need for awareness and vulnerability for those using social media as a form of communication among strangers. How can we teach our children and teens how predators target them without making our children fearful of everyone?<br />Believing what you read about a person on line can create a false sense of comfort that may put a person at risk for becoming victimized. Although social networking sites were developed to increase social activity, cyberspace may contribute to individuals to become easier targets for crime”.<br />
    7. 7. Preventative Steps to Take to Avoid Becoming Victimized<br />New Age Criminal<br />7<br />How can we create devices to limit or prevent information discovery for those that should not be able to access it? Law enforcement is taking steps to capture incriminating evidence for prosecution for offenses that are considered grooming or for sending pornography over the internet. How can we keep our children safe from predatory actions based on miss-information and lies? The discussions of safety concerns need to be discussed with children, helping the child understand that some people lie about who they are and pretend to be their friends. When internet conversations become personal and private information is asked to be revealed, an alert in one’s mind should be triggered.<br />
    8. 8. Conclusion <br />New Age Criminal<br />8<br />Internet programs put the public at risk for victimization, targeting the youth and those that give too much personal information on public sites that can be used against them. Dating sites on phones can link individual’s GPS locations to determine who is in a person’s immediate surroundings. Predators use this information to create an illusion of false pretense to lure potential victims into a vulnerable situation. It is the responsibility of the public to mandate changes to help deter criminal activity and to ensure the safety of those that are using modern technology on a day-to-day basis. Laws are encountering crimes committed on those divulging information on internet programs. Offenders are being subjected to different sentencing restrictions, including website restrictions and communications.<br />
    9. 9. References<br />New Age Criminal<br />9<br />Albanesius, C. (2010). Consumers Haven't Learned Not to Divulge Private Info Online. PC <br /> Magazine, 29(6), 1. Retrieved from Business Source Elite database.<br />Bonnar-Kidd, K. (2010). Sexual Offender Laws and Prevention of Sexual Violence or <br /> Recidivism. American Journal of Public Health, 100(3), 412-419. Retrieved from <br /> Business Source Elite database.<br />Chen, S., & Macredie, R. (2010). Web-based interaction: A review of three important human <br /> factors. International Journal of Information Management, 30(5), 379-387. <br /> doi:10.1016/j.ijinfomgt.2010.02.009.<br />Depression; Research in the area of depression reported from Australian National University, <br /> Center for Mental Health Research. (2010, October). Psychology & Psychiatry <br />Journal,149.  Retrieved November 8, 2010, from ProQuest Health and Medical Complete. <br /> (Document ID: 2162326161).<br />Williams-Thomas, M. (2009). How safe is your daughter? Paedophiles using the web to trap <br /> girls are often middle-class and married. And the police are struggling to cope… <br /> Retrieved November 12, 2010 from http://www.dailymail.co.uk/femail/article- 1215189/How-safe-daughter-Paedophiles-using-web-trap-girls-middle-class- married-And-police-struggling-cope-.html<br />
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×