MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
Negative Effects Of Social Media Essay
1. Negative Effects Of Social Media Essay
The negative effects of social networking on youth and young adults are; cyber bullying, antisocial,
lack of independence, makes someone less patient, lack of confidence in their physical appearance,
identity theft, cyberstalking, sharing too much, decrease in productivity. Cyberbullying is when
someone is rude and disrespectful and bullies someone else online. Antisocial is when you are
unable or struggle to talk to someone in real life or face to face. The lack of independence is when
someone is unable to be independent and now relies on someone else. And impatient is when
someone is unable or struggle to tolerate delay or is quickly irritated. Cyber bullying is a negative
effect because they are putting people down and making them feel bad about themselves. This can
cause them to do terrible things such as committing suicide or cutting themselves and can make
them very depressed. Antisocial is a negative effect because they will be unable and struggle to talk
to people in real life. This happens when they are texting and aren't really talking to anyone for a
long period of time. Then when they do talk to someone in real life they struggle because they lost
all of their confidence in themselves. This is bad when they go for an interview or they are ordering
food, or even when they are meeting someone new. The lack of independence is a negative effect
because they will be more dependent on someone or something to get stuff done. They will struggle
to do anything by
... Get more on HelpWriting.net ...
2.
3. Pros And Cons Of Cyber Warfare
3.1 Cyber Warfare
Richard A. Clark, an expert in security sector governance in his book Cyber War (May 2010),
defines Cyber War as an act of penetration of a country against other computer network with the
intent of causing damage and disruption. The Economist magazine explained that cyber war is the
fifth domain of warfare, after land, sea, air and space. Cyber warfare, (also known as cyber war and
Cyber warfare), is a war with the use of computer networks and the Internet in cyberspace (cyber
space) in the form of defense and attack information. Cyber warfare is also known as cyber warfare
refers to the use of the World Wide Web and computer to conduct warfare in cyberspace. Although
sometimes relatively minimal and lightweight, so far cyber warfare could potentially cause a serious
loss of data and information systems, military activity and other service disruptions, cyber warfare
means can pose as disaster risk worldwide.
3.1.1 The development of Cyber Warfare
In 1991, someone in the air force reported a computer virus named AF / 91, the virus was created
and has been installed on the printer chips and make his way to Iraq via Amman and Jordan. His job
is to create an anti–aircraft weapon damage Iraq.
In 1998, the US and NATO in order to successfully bombed Serbian targets in Kosovo, the United
States needs to deceive and disrupt air ... Show more content on Helpwriting.net ...
Perhaps the US can serve as a reference for developing capability. Latest test results of five large
super computer capable of extremely high with Rmax and Rpeak are judged by the size of Tera
Flops / 1012 Flops (Floating Point Operations Per Second), numbers 1 to 3 US computer occupied.
Power of data measured in KW for the entire
... Get more on HelpWriting.net ...
4.
5. Taking a Look at Cyberbullying
In May 2013, Gabrielle Molina, a 12 year old excellent and outwardly positive student, took her life
after being called a "slut" and a "whore" online. Throughout the use of social media, teens are
potentially susceptible to become victims of cyber–bullying, and the drama that rises from it could
work as a catalyst in the development of psychological traumas. To help the prevention of bullying,
parents and schools must work hand in hand in this issue by incorporating anti–bullying education
in their curriculums, and establishing a channel of communication and trust between adults and
teens. The Centers for Disease Control and Prevention has identified cyber–bulling an "emerging
public–health problem," notes Thomas Billitteri from the CQ Researcher. Cyber–bullying is a
growing trend that has been blown out of proportion during recent years. Jaana Juyonen, a professor
of psychology at UCLA, asserts that "more than 70 percent of heavy Internet users ages 12 through
17 – mostly girls – said they had experienced at least one incident of online intimidation via e–mail,
cell phones, chat rooms and other electronic media in the previous years." This high amount of
energy teens spend on social media is making them susceptible to cyber–bullying. Alex Orozco, a 19
year old college student who also went to my same high school, recalled, "Just last week I was
going through my Twitter's news feed and I bumped into this horrible fight between two girls at my
school. Worst part of it was,
... Get more on HelpWriting.net ...
6.
7. Cyber Security And Cloud Computing Essay
Cyber Security and Cloud Computing
ISCG – 8047
Cyber Security and Web Applications
ASSIGNMENT 1
Submitted To: Submitted By:
Prof. Bahman Sarrafpour Sojan Chandy Therakom: 1468736 Contents
Introduction 2
Why is it important 2
Cyber war 3
Major Threats 3
Viruses: 3
Worms: 3
Spyware/Adware: 3
Trojans: 3
Rootkit 3
Botnet 4
Hoaxes and Urban Legends: 4
Denial–of–service (DoS): 4
Various Security Standards 4
Spoofing identity: 4
Tampering with data. 4
Repudiation. 5
Information disclosure. 5
Denial of service. 5
Elevation of privilege. 5
(ISO/IEC 27001) 5
CPE: 5
CWE 5
CVE 5
CAPEC: 5
CCE: 5
8. Security Tools 6
Honeypots 6
Classification of honeypots 7
Honeypot Implementation 7
Honeyed 7
Service–specific honey pots 8
Web Application Firewall 8
ModSecurity for Web Applications 8
ModSecurity for IIS 9
Conclusion 11
Cyber Security and Web Applications
Introduction
Almost all kind of large and small organizations might face increasing number of attacks into their
network or intellectual property. This may lead to data disclosure, data destruction, and damage of
organization's reputation. There are numerous threats in the cyber space which might be capable of
stealing, destroying or making use of out sensitive data for financial and non–financial gains. As the
amount of computer, mobile and internet users increases, so does the number of exploiters.
Cybersecurity is the form of technologies, procedures and
... Get more on HelpWriting.net ...
9.
10. Cyber-Bullying: A Brief Research Proposal Essay
Introduction Internet usage in children and adolescents has been increasing in a steadily fashion in
the past number of years and with the increase in internet usage, a new form of bullying has
developed – Cyber bullying. Cyber bullying can be defined as "the electronic posting of mean–
spirited messages about a person," (Merriam–Webster, 2012). This form of bullying can come
through various mediums including but not limited to text messages, emails, videos, and social
networking sites. There is an overwhelming amount of information that defines cyber bullying,
identifies the demographics of bullies and victims of cyber bullying, and identifies the outcomes of
cyber bullying on victims. More focus needs to be placed on who the perpetrators ... Show more
content on Helpwriting.net ...
Additionally, a large amount of cyber bullying tends to take place within social groups. Perpetrators
of need not be the traditional strong, powerful bully but could be the individual who is too shy to
intimidate others in the traditional sense so they turn to the cyber world where they may remain
somewhat anonymous (Juvonen & Gross, 2008; Mishna, Cook, Gadalla, Daciuk, & Solomon, 2010;
Mishna, Saini, & Solomon, 2009). One study showed that over half of the perpetrators of cyber
bullying are friends of the victim, and a further amount of perpetrations know the victim (Kowalski
& Fedina, 2011). It has been demonstrated in a number of studies that the more time an individual
spends on the computer and internet, the more likely they are to be cyber bully victims, perpetrators
or both the victim and bully (Mishna, Khourg–Kassabri, Gadalla, & Daciuk, 2012; Sengupta &
Chaudhuri, 2011). The most common mediums of cyber bullying are through email, instant
messages, or internet social networking sites; however, the medium with the greatest impact on its
victims is picture or video bullying (Beran & Li, 2005; Kowalski & Fedina, 2011; Slonje & Smoth,
2008). It has been suggested in the past that children who have access to social networking sites are
more likely to be perpetrators or victims of cyber bullying, however, results from one study
indicates this is not the case. Alternatively, it was suggested
... Get more on HelpWriting.net ...
11.
12. Persuasive Essay On Cyber Bullying
A couple days adrive she cathe opponent crying to school. She replicated over and over again on
how ugly she was, and how he made her feel pretty. She threw up her sleeve that those were the
bruises he left her
"I met him online." The online world wasn't meant to be dangerous. It was intended to be a useful
source and to receive skills. It will also increase the ranking of competition in a variety of stuff . It
wasn't made for people to drive online and sexually harassed, and violate privacy. Never did the
creators of the online world think they had made a dangerous place for people. Adults should
concentrate on teenagers' tithe opponent online. Cyberbullying is different from schoolyard
bullying. Teachers can't intervene to the internet. Teens spend the preponderance of their day online
just scrolls down seeing stuff that may be harming other students, however, students refusal show
their relevance to this important title of cyber bullying. While the internet is an essential mechanism,
numerous people compose it a dilemma. The internet is a like a reward, once you recognize it you
are excited, however having the internet for a while, you tend to comprehend and bring tired of
doing the sathe opponent material so you start looking up different stuff to do on the internet. In the
article "Crossing the Line Online," teens did a survey on teenagers who have been called a nathe
opponent or even asked about their sexuality.12 percent of the boys answered that "they have
... Get more on HelpWriting.net ...
13.
14. Hello
Bullying
Student's Name Here
XXXX University
Introduction
There are so many incidents on television where teenagers are being bullied via Facebook and other
online sources. Almost every adolescent has access to the internet nowadays and most of them have
a mobile phone. Therefor it is not surprising, that cyberbullying or bullying through these new
communication technologies is increasing. In order to put cyberbullies to a stop it is necessary to
know, who these teenagers are, what they do, and why they bully. This research will introduce
briefly the suicde of Megan Meier and the foundation what is set into effect today to prevent
children and teenagers from being victims like her. Another young victim of cyberbullying was a
local ... Show more content on Helpwriting.net ...
But the rewards could also be less tangible. Bullies often enjoy status and prestige because others
fear them. They also command a lot of attention for their behavior. Some children who bully others
don't want to lose their popularity status so they assume that by increasing their motive of bullying
they stay popular. To avoid losing social status, they deliberately selected victims who were
unpopular (Sognonvi, 2010). 3. Bullies lack empathy, and may even get pleasure out of other
people's pain
Bullies score low on tests of empathic reactivity, and have also found that bullies can be more likely
to develop anti–social personality disorder. This is a condition that causes people to ignore the rights
and feelings of those around them. One study scanned the brains of young people who had exhibited
bullying behaviors in the past, while they were watching videos that showed people experiencing
pain. The researchers noticed a great deal of activity in the areas of the brain devoted to reward and
pleasure. This suggests that it's not just a lack of empathy that's the problem. Some bullies may
actually derive pleasure out of seeing other people's pain (Sognonvi, 2010). 4. Bullies lack the
ability to self–regulate emotions
The same researchers who conducted the brain scan study made another surprising discovery: the
parts of the bullies' brains that allow them to self–regulate their emotions were inactive. This
suggests that bullies simply don't have a way to
... Get more on HelpWriting.net ...
15.
16. Cyberbullying : The New Era Of Bullying And Violence
Cyberbullying: The New Era of bullying And Violence In School
Bullying has been a big problem in our school system for many years, but it has escalated over the
past decade due to the new era of modern technology. Unanimously, we can agree that our daily
lives greatly depend on technologies; the internet, cellphones, computers, tablets, IPad etc. Although
the uses of technology positively impacted our lives, there is also the downside when it uses have
negative connotations. For instance, modern technology made it very easy to engaged in
cyberbullying, perpetrators used cell phones or computers to conduct this hideous behavior, hiding
behind their keyboards to express negative feelings and or thoughts toward others. Using social
media ... Show more content on Helpwriting.net ...
If a teacher, parent, lawmaker, and even the child them self– put more effort into educating yourself
about cyber bullying it will not be in this situation.
Statistics have shown that everyone can be victims of cyberbullying but most incident occur
between the age of 11 to 15 years old, however, some report showed that children's as young as 10
years old also been a victim of cyberbullying. Cyberbullying can have long lasting effects on its '
victims that can lead to mental health issues like depression, anxiety, stress, and even suicide.
Increasing number of young kids and teenagers committing suicide because of cyber bullying and
sexting have coming to the public 's attention. As reported by the Centers for Disease Control and
Prevention (CDC), suicide is the third leading cause of death among young people with
approximately 4,400 deaths every year. The CDC estimates that there are at least 100 suicide
attempts for every suicide among young people. More than 14 percent of high school students have
considered suicide and nearly 7 percent have attempted it, that is why, sadly, there are increasing
coverages about cyberbullying cases in the media now more than ever. (NOBullying, n.d.)
Despite the physical contact or audible insults, cyberbullying can be even more traumatizing and
damage have life time effect on mental health than traditional forms of bullying. Through social
media and
... Get more on HelpWriting.net ...
17.
18. Hiding One 's Identity Is Nothing New
Hiding one's identity is nothing new. Alexander Hamilton, James Madison, and John Jay authored
The Federalist Papers in 1787 under the pseudonym Publius. The ability to communicate
anonymously is viewed as part of our basic right to free speech . With the advent of computers and
ease of access to the internet, becoming anonymous as never been easier, and is far more reaching
than the colonial newspapers of 1787. For some this ease at which we can communicate
anonymously is cause for concern. Although we are no longer hiding our identities to promote the
ratification of the Constitution, being anonymous still plays a significant role in our society. Online
anonymity grants anyone with an internet connection an unbiased voice, regardless of gender, race,
or wealth. Without this freedom to online anonymity, many people would not feel free to express
themselves or share sensitive information about themselves. In the case of whistleblowing,
anonymity also promotes the release of information to help fight government corruption and
oppression. Anonymity can also be used as a security measure and prevent unauthorized mining of
personal information by not giving access to our real identities. While the ethics behind anonymity
can be foggy, multiple ethical frameworks, including duty–based and just–consequentialism, can be
used to add clarity to the topic. A duty–based framework stresses the role of duty and respect for
persons, including one's self. While a just–consequentialism
... Get more on HelpWriting.net ...
19.
20. Bullying And The Cyber Bullying Essay
IDENTIFICATION PROBLEM STATEMENT
BACKGROUND
Cyber bullying refers to something when one uses their cell phone, computers or an electronic
device to access internet and technology for the purpose of harassment and providing harms to
others. Sending inappropriate messages, uploading disturbing images, threatening and posting
something without someone's' approval are the forms of cyber bullying. The main aim of this
research study is to look after the cyber bullying and the possible reasons of occurrence in teenagers.
With the reasons we will be also identifying the solutions to the problems. This study will be limited
to teenagers with the age group of 13–19. The importance of this research is that it will help to find
out the risk–related findings, so that one can know how and why teenagers are involved and
participated in the cyber bullying (Elisabeth Staksrud, 2007). With the reasons and occurrence
behind the cyber bullying, this will be also focusing on the preventive measures as well as
influencing factors which might be their parents, friends or the educators in the education academy.
Some of the results of the cyber bullying leads the victim to the anxiety, depression and even
suicide.
CONTEXT
The main context that is focused in the research study is the involvement of the teenagers in the
cyber bullying. These involvements occur while teenagers are living their normal life. We can say
that they are involve in these activities when they are in school with their
... Get more on HelpWriting.net ...
21.
22. Persuasive Essay On Cybercrime
Imagine, one day you wake up and you're running late. On your way into work you stop at your
favorite coffee shop. You order your coffee and your muffin, and you go to swipe your card only to
find out it declines. What do you do? You call your bank and they tell you several accounts have
been hacked and yours was one of them. Now you have no money, no access to your savings.
Everything you've ever worked for is gone and it only took one click. This is a very real possibility,
and it doesn't stop at bank accounts. Cybercrime is at an all–time high, and no one is safe. Cyber
threats have vastly grown over the past decade, we need to better prepare ourselves and become
more aware in the event of future attacks. Cybercrime is not limited to bank fraud or identity theft, it
is any crime that is committed by use of an electronic device, such as a computer or cellphone. For
example, in August 2001 Rafael Nunez also known as RaFa successfully hacked into a NASA
employee's computer and obtained classified shuttle designs for future space crafts. While this attack
did not cause any real harm, he did leak the designs to a local reporter to prove his theory that
NASA isn't as secure as everyone may have thought. Another form of cybercrime would be internet
stalking, one out of twelve women experience some type of cyber stalking in their lifetime, and most
predators are men. This could lead to cyberbullying, which is something you see occur every day.
October 17th, 2006,
... Get more on HelpWriting.net ...
23.
24. Cyberbullying : An Act Of Aggressive Act
Bullying can be define as an act of aggressive act that is intentional, Taking force upon someone
who cannot defend themselves from an individual or group. Cyberbullying is nearly the same thing
as bullying but is done online, using electronic devices such as phones, emails, and social networks.
Cyberbullying can happen in many different ways , through phone calls, text messages, blogs,
pictures and more. The availability of internet makes it easier for bullying to take place in the long
run this can cause numerous problems. The effects of bullying can cause suicides, depression and
isolation.
Daily around the world kids are getting bullied . Frightened and unable to say what is going on to
anyone. There has been novels , movies and ... Show more content on Helpwriting.net ...
Cyberbullying happen 24/7 on phones , laptops , tablets and many other technology things that
young people use today. Cyberbullying takes away your privacy, sharing it with others. Four in ten
teens have experienced online bullying; girls are twice as likely to be victims and criminals of
cyberbullying (Phillips). Girls are more likely to engage in social sabotage of other people (Phillips).
Girls have the mindset of trying to be better than others and are willing to do anything to advance
them. Boys are more likely to bully girls and other males who are not as confident (Phillips). Boys
whether bullying these type of people so things would not happen to them. Cyberbullying is mostly
done by 15 and 16 year olds (Phillips). This is age group when teens uses technology heavily. The
more people post on social sites and the more they share their information the easier it may be to get
attacked by a cyberbully. Cyberbullying is real and often more frightening than face to face bullying
(Phillips). Similar to stalking victims can often feel helpless and isolate and ashamed, and not
willing to share with friends or parents about what is going on (Shpantzer). The groups feared that
they will be restricted from electronic devices if they told parents or that they might overreact
(Phillips). This should not keep anybody from telling someone how someone is treating them.
Studies have indicated that the number of youth
... Get more on HelpWriting.net ...
25.
26. Bullying Vs Cyber Bullying Essay
Bullying is a major problem that impacts many teens over generations, causing an endless cycle of
bullying. With the new age of technology, this leads to new issues that are affecting teens' lives. One
of these issues is that cyberbullying is quickly becoming more common than the traditional
playground bullying, as more social media are appealing to teens. Cyberbullying is a type of
bullying that happens using electronic devices such as phones, laptops, and tablets. This form of
bullying includes spreading rumours, sending mean and hurtful messages and sharing embarrassing
videos or photos. Cyberbullying over social media has become extremely easy for bullies to
victimize other teenagers affecting the victim's mental health. Therefore, ... Show more content on
Helpwriting.net ...
The day after, Meghan had come home from school where she was handing out invitations to her
fourteenth birthday party that was in a few weeks, but when she logs on to her MySpace account,
she sees all the negative and harsh words that others are posting on her page. Her mother and father
try to tell her to get offline and that everything is going to be okay, but later that night Meghan hangs
herself in her closet. The last comment is from Josh tells her that everybody hates her and that the
world would be a better place without her in it. Weeks later, Meghan's parents find out that Josh is
not actually Josh, that he is not even an actual person. Josh's page is a group of moms that live in the
same community. This mother was trying to see if Meghan was talking about her daughters behind
their backs and thought it was a joke (TEDx). MySpace gives Meghan's bullies the anonymity to
protect them from their true identities, letting these neighbours mess with Meghan in a way that is
non–imaginable. Without this protection Meghan and her parents would have known who the real
Josh Evans is and could have been able to stop the bullying faster, possibly saving Meghan from
taking her life. Facebook says that "8.7 percent of its 955 million monthly active users worldwide
are actually duplicate or false accounts" (Kelly). The fake accounts hide the bullies' true identity,
giving the bully or bullies protection to
... Get more on HelpWriting.net ...
27.
28. Creating A New Cyber Force
1. Today, there is a new battlefield domain where a keyboard and mouse are the new weapons of
conflict. With land, sea, air and space in the background, warfare has entered a fifth domain: cyber.
In this position paper, using a pro and con format, the debate on whether or not the Department of
Defense (DoD) should create a new, independent branch for cyber will be discussed. To do this, the
following will examine both sides of debate by highlighting two main points: the elimination of
duplication of effort and the intensive resources required to make the transition. Finally, a look into
a larger talent pool will be explored to highlight the largest benefit of creating a new Cyber Force. It
is this paper's stance that the DoD should create a separate structure in order to meet the new
domain's unique demands.
2. To better understand this topic, a brief background on cyber warrants a closer look. President
Obama concluded as early as 2009 that the nation's digital infrastructure of networks and computers
that we depend on should be treated as a strategic national asset.1 With the former head of security
at Microsoft acting as the cybersecurity tsar for the White House and General Keith Alexander,
Director of the National Security Agency (NSA), leading Cyber Command (CYBERCOM), the
protection of the nation's infrastructure is finally being treated like a national security priority.2 This
shift brings with it a debate on how to structure the US assets to realize its
... Get more on HelpWriting.net ...
29.
30. Disadvantages Of Cyber Space
Many of years, humans have admired cyber space as a magical world & talked about its contribution
to world from past Vs what we are today. I wouldn't be surprised to see the world still keep on
getting amused about its power and potential by further innovation. We started building intelligent
chips which can be embedded into "Car" system to navigate around the world OR transport system
which helps in monitoring the location of trains OR wireless devices which keeps on sending data to
earth from space etc. All of these which are more commonly used as term "Internet of thing" works
well in convergence of Cyber world or Internet. However, while we were growing towards next
generation using cyber space, there was a small community started incubating which sensed the
negative advantage of cyber space which can be taken for their own profit. This profit can be in
form of money, defamation of competitors, revealing secrets etc. this community were commonly
known as "Hackers". These hackers are constantly challenging & questioning the security of Cyber
Space. ... Show more content on Helpwriting.net ...
There could be various forms of exploitation. Viruses, Malwares, Botnets, spywares are few of the
forms with the help of which a vulnerability can be exploited to get financial gain. In the early age
of cyber space, finding a vulnerability and exploiting it was just a fun however, as cyber space
grown and humans and technology started becoming inseparable, the birth of good or bad hackers
evolved. The evolution even got accelerated when these "Hackers" were used as a "Cyber Weapon"
by big brands against their competitors. Now there is a "Black Market" where the information can
be sold & the highest price would be paid for vulnerability which can cause "Zero Day"
... Get more on HelpWriting.net ...
31.
32. Social Media Addiction
For those who want to relax take a week long vacation, or how about putting down your distracted
devices. No matter if it's for business or personal use we can't go a day checking our social feed.
Social media was created for enjoyment, but humanity has destroyed the purpose. Social Media has
caused so much chaos over the last decade, and it is only getting worse. Lies, death, deceit, and
misery have all happened over the internet. Many people have lost their self– respect, and more
violence has occurred for the entire world to see. Our generation we are "social addicted", and that is
not always a good thing. Social Media is the root of all evil, I am convinced.
The use of social media is consuming most of lives on a daily. Every second we are constantly
consumed into our phones. Let's face it the world needs technology, and it makes it more convenient
to do things. A lot of negative things happen over the internet, and social media causes people harm.
Cyberbullying has increased over the last decade. People feel like they can say anything because
they are behind the screen. Cyberbullying can make people feel bad, and insecure about who they
are. Children especially are really sensitive to hurtful comments, and that can lead to dangerous
outcomes.
Children and adults of all ages have committed suicide because of being cyberbullied over the
internet. People social bully others by harassing them over the internet. Children and teenagers are
the main victims that attract
... Get more on HelpWriting.net ...
33.
34. Analysis Of The Book ' Reena Patel ' Essay
The author of the book, Reena Patel is a feminist scholar and the theme of her book is specifically
on the mobility and inequality faced by women in the society due to their timings of employment at
the Call Center Industry. The study is the first in–depth research on the transnational call center
industry which has been written from the women worker's point of view. Reena Patel conducted an
Ethnographic study in the cities of Mumbai, Bangalore and Ahmedabad. The new challenges faced
by them with regard to the night shift employment alongside the opportunities to work in an upscale
globalised work environment, and the attraction towards a relatively high wage is a source of fast
access to money.
The Call center Industry with its globalised work environment and high wages has attracted many
women in liberating their lives. The main theme of the book around which the rich narratives are
woven for women is the Spatial–temporal conversion regarding their flexibility in the urban setup in
India. The repercussions experienced by women of exploring the night as a time and space of the
night time, belonging to men according to the traditional Indian society idea. There are patriarchal
notions attached to the idea of women getting out of the households at night to work in a public
space and is vulnerable to the rising violence in our country against women. The nocturnal space is
considered to be a man's domain and if invaded by a female figure becomes problematic for the
woman
... Get more on HelpWriting.net ...
35.
36. Social Networking : The Causes And Dangers Of Social Media
Social media has become to be such a big platform over the years. You use it to interact with family
members that live far away, friends, or even complete strangers that you want to get to know. Social
media is known to create conflicts interacting and showing complete strangers what is going on in
your life on a daily basis and you not knowing their intentions. Social media even gives out false
information can be news or just blogs just posting about what they have heard around or seen. Social
media can take over a life with a touch of the button various ways, it is up to the person behind the
screen to control it. What I find to be a big problem with social media today is identify, people who
Portray being someone else behind screen. Social media has became such a big issue because it is
dangerous being on social media, say if you were interacting and chatting with others online that
you've never met in person you don't really know who is behind the screen. That person can be a
criminal, rapist, kidnapper, etc. Using social networks to maintain a relationship can be quite easy.
Online relationships, it can be tempting to hide the truth and easy to present a different side of
yourself that isn't really you just to get what you want online. For the most part everyone does this
to a certain extent, especially for those who feel uncomfortable with themselves. If anyone has any
distrust towards a friend or in a relationship, this tendency can be taken to the level of
... Get more on HelpWriting.net ...
37.
38. Cyber-Bullying and Teen Suicide
Since Teen Suicide is the second leading cause of teenage death in the United States, there is a need
for legislation that promotes awareness and education about Cyber–Bullying.
by
R. Hassan
February 8, 2011
Fourth Period
Mr. Cicala
Robinson Secondary School
Since Teen suicide is the second leading cause of teenage death in the United States, there is a need
for legislation that promotes awareness and education about Cyber–Bullying. Due to the growth of
technology in the American society, the younger generations of adolescents are adapting to the
excessive use of computers, cell phones, and social–networking sites. According to a study done by
Amanda Lenhart, 87% of adolescents who are ... Show more content on Helpwriting.net ...
The most common is "Mean Girls" cyber bullying which has been seen in the case of Tina Meir who
committed suicide at age 13 (Billitteri 385). "Mean Girls" refers to the type of cyber bullying in
which is usually performed by a group of young girls looking to have fun in the act. The group girls
most often want others to know who they are and what they are doing in order to feel powerful.
Research has shown that females are almost twice as likely to be involved in cyber bullying either
being a victim or perpetrator. The second category would be "Inadvertent" cyber bullying which
consists of role–playing. The perpetrator may not realize they are cyber bullying, yet they interpret
their offensive and cruel remarks through a joking manner. The next category is somewhat similar in
the sense that the bully may not realize that they are virtually cyber bullying. "Vengeful Angel"
refers to an individual who is defending themselves or others from an attack, which ultimately leads
them to becoming a cyber bullying as well. The last category can be similar to the "school–yard"
bully, which is the "Power–Hungry" bully. This category refers to those who may be victims of
bullying themselves. A "Power–Hungry" bully wants to feel powerful and control others through
their cyber bullying. Overall experts say that it is most common for the perpetrators to be classified
as "popular" student with self–esteem who are trying to bring others down by placing
... Get more on HelpWriting.net ...
39.
40. The Security Challenges Of The Cyber Space
UK CYBER ESSESTIALS SCHEME (UKCES):
To differentiate the security challenges of the cyber space, a security scheme was proposed by the
government of UK which majorly focuses on the policy followed by it. It concentrates on the
criticalness of a sheltered framework through a sensible approach and sets up structures that are
obliged to combine together for current effort to push towards a venture to see the key objective of
making a secured cyber space. (Cleveland, 2008). It accents on the requirements of the
administrations, proficient and the worldwide assistants to collaborate nearby individual in common
with the objective of enhancing so as to decrease the threat and abusing data in order to build up the
UK in worldwide web.
Cyber protection controls: Boundary firewalls and internet gateways. Safe configuration. Threat
protection. Management of patch. Access control. By utilizing the solid firewalls and Internet
gateways the information and the applications of the association must be secured from the
unapproved access. The framework must be legitimately configured to decrease the vulnerabilities
level that are acquired and correct capacity must be performed. Idiosyncratic access advantages
must be accommodated the approved clients. The framework can be constantly monitored so that it
can be prevented from any malwares and usage of the antimalware programs should be carried out.
(Curphey, 2006). Each framework has a product working on it and that product has to
... Get more on HelpWriting.net ...
41.
42. Cyberbullying and Its Harmful Effects on Teens
Cyberbullying and Its Harmful Effects on Teens Teens have nowhere to hide. Cyberbullying is
increasing alongside of advances in technology. Most teens now have access to electronic
communications and the Internet, making them easy targets for cyberbullying. Cyberbullies are
using e–mail, cell phones and the Internet to cause emotional harm, harass, threaten, ridicule, and
exert control over their victims. Additionally, cyberbullied teens are committing suicide at an
alarming rate. Cyberbullying must be stopped; it poses psychological trauma and health risks,
affects social interpersonal skills, and can ultimately cause suicide. A Cyberbully is able to breach
every part of its victim's life, and keeping teens safe in cyberspace will be a ... Show more content
on Helpwriting.net ...
Dr. Karnik, a child and adolescent psychiatrist at the University of Chicago clinic, began noticing a
rise of complaints about online harassment from his patients, and stated: "We do see more of this
happening, [partly because] it's so simple to do, . . . It doesn't require you to stand in front of a
person to bully them" (Moyer). To identify potential victims and perpetrators of cyberbullying,
physicians need to ask all their patients who use the Internet what they do online, and to specifically
inquire whether they use social networking sites and ever felt as if they were harassed. Physicians
who encounter cyberbullying first should assure victims that they are not at fault, then should
determine their level of danger for self–harm and for acts inflicted by others and take appropriate
steps to alleviate the dangers. On the other hand, if patients admit to cyberbullying, physicians
should help them identify their actions as a problem, and then involve the parents or guardians in the
situation. If physicians can intervene early enough, teens can be protected from a great deal of harm
(Moyer). Cyberbully has devastating effects on teens' health as well as psychologically. Victims of
cyberbullying will skip school or hide in the bathroom all day, they do not know who they can trust
and so they trust no one, they lose their self–esteem, become anxious and are stressed, and feel
hopeless. Cyberbully must be monitored and controlled by
... Get more on HelpWriting.net ...
43.
44. Making Cyberbullying a Criminal Offense
"Even in death, Phoebe Prince was bullied" (Kennedy). That was the headline when a FaceBook
page dedicated to Prince was hacked and filled with hurtful and derogatory comments about her.
Phoebe was a regular teen that was cyber bullied to the extent that she couldn't take it anymore. Her
body was found in a stairwell, and at 15 years old, Phoebe hanged herself. Although cyberbullying
is a vague concept to many, it should be made a criminal offense because it is causing suicides for
youth, government intervention is the only solution, and the bully should be punished instead of the
victim. Being a recent issue, cyberbullying has seriously been taken for granted by society. Not only
is it real and hurtful, but it is also leading to suicide as a result, especially for youth. From a survey
taken by the Cyberbullying Research Center, 20% of around 2000 respondents reported seriously
thinking about attempting suicide, and 19% did (Hinduja/Patchin). This means that one out of every
five kids has been cyber bullied to such an extreme that life is no longer considered livable, or even
bearable. One of these kids was Ryan Patrick Halligan, a regular teen living in Essex Junction,
Vermont (Halligan). Unfortunately, he was repeatedly sent instant messages from his classmates
accusing him of being gay, and was threatened, taunted, and insulted relentlessly. On October 7,
2003, at the age of 13, Ryan hanged himself while his family was asleep. The internet can humiliate
and tip a person
... Get more on HelpWriting.net ...
45.
46. Mass Media Consumption Being Targeted For Sensitive...
Abstract
Are there laws in engraved stone that help tackle online abuse in this era of information? Are
governing bodies doing enough to highlight and make aware infrastructures that are widely
available for victims of abuse? This paper echo 's the voices for and against. This research found
naïve consumers of mass media consumption being targeted for sensitive information that in–turn
was used to abuse, cyber bully complaints of a sensitive age. Teenagers ignoring privacy policies
were to blame for side stepping their own well being, sharing personal information that could map
them to precise locations and endanger their wellbeing. On the contrary legislations have been in
print for decades that help filter out any abusive manner offline and online. This research paper
concludes that users are to blame for their laziness of sharing/leaking their live database of primary
information that may be used to cyber bully/target individuals. Consumers should not be blamed
entirely for their lack of knowledge as laws implemented in each country vary and entail some form
of study that may not be easily interpreted. Governing bodies should invest in more ways in which
user–friendly/simplified versions of legislations that may be easy to read and advertised on all new
forms of mediums online. That can increasingly help warn new consumer of the World Wide Web.
Introduction
With 60% of the United Kingdom population actively using social media and 92.6% having access
to the internet.
... Get more on HelpWriting.net ...
47.
48. Argumentative Essay On Social Media
More often than not children are unaware of what is really going on, they just do what is told or
pressured to them in order to fit in or be considered "cool". There are many advantages and
disadvantages to social media when it comes down to peer pressure. With that being said, it all
depends on how the social media site is being used on a day–to–day basis. Unfortunately, it is not
difficult for young people to get their hands on some type of technology. "Ninety–four percent of
young people have access to the Internet in their homes, while 23% of young people have their own
cell phones, often equipped with text messaging capabilities and digital cameras" (Lawnow).
Majority of the kids that have made friends and met people online have had a good experience with
it, whereas just a few have not. The sites should only be used by finding new friends, setting a good
example online, and connecting with others, and most importantly avoiding the content you know is
bad for you. Today's world has changed so much, with the click of a mouse the younger generation
has access to the world. A positive to social media is that the rates are continuing to increase,
creating friendships and even relationships. Over the years, people have been recording the amount
of cyberbullying that has been happening to individuals. They have recorded that just in one year,
about forty–two percent of people with social media accounts are cyberbullied. Adults are starting to
realize that the teenagers are
... Get more on HelpWriting.net ...
49.
50. Cyber Bullying Essay
Cyber bullying is a form of bullying that uses electronic technology as a 'weapon' to inflict
emotional distress to its victims. Electronic technology refers to equipment such as computers,
tablets and phones. Interactive communication networks such as Facebook and Twitter, texting,
websites and chat rooms are all included in this technological pool of cyber bullying tools.
Examples of cyber bullying can range from insulting texts from smart phones to derogatory postings
on social networking sites. According to the website stopcyberbullying.org (1) the methods used are
'limited only by the child's imagination and access to technology.' It is important to note that cyber
bullying by definition can only be instigated by a minor against another minor. Once adults become
involved, it is defined as cyber–harassment or cyber stalking (Huffingtonpost.com) (2). There are
two types of cyber bullying: direct attacks (messages sent to victims directly) or cyber bullying by
proxy (without the victim's knowledge).
Cyber bullying is considered different to traditional bullying. It can occur 24 hours a day and the
bully is often an anonymous person whose identity is hidden behind the security of a screen. The
other concern is that the bully can share their information with a potential audience of millions in a
matter of seconds and the victim can find it almost impossible to stop the information or delete it
from reaching such a vast audience. According to the anti–bullying site
... Get more on HelpWriting.net ...
51.
52. Cyber Bullying Persuasive Essay
Inspirational speaker, writer, and community leader Anna Maria Chávez once said "Cyber Bullies
can hide behind a mask of anonymity online, and do not need direct physical access to their victims
to do unimaginable harm." Cyberbullying is negatively taking over technology and adults aren't
aware of the potential dangers it has on their children. To start, children and teens do not talk to their
parents about the acts of cyberbullying that occur on their technology. Over half of young teens do
not tell their parents when cyberbullying occurs. (Webstar, 2017) This is a big problem. This means
that children are hurting, the result of cyberbullying, and they are afraid to talk to their parents, or
any adult for that matter. They are keeping their emotions bottled up inside them, and parents have
no idea this is happening. In fact, only 1 in 10 teens tell an adult if they have been a cyberbully
victim. (Webstar, 2017) These numbers should not be the effect of cyberbullying. Children have to
seek help from adults and stop the cyber bullies hiding behind their screen. Might I add, it should
not be all on the children's shoulders. They are the victim, and they should stand up for themselves,
but why should it be all on them? Parents have to be on the lookout for cyber bullying these days.
Only 32% of parents actually monitor their children's social networking activities, while 28%
admitted they only occasionally, rarely or never monitor activity. (Anderson, 2016) This 28% of
... Get more on HelpWriting.net ...
53.
54. Negative Effects Of Technology On Youth
Technology varies widely from one decade to the next. The invention of the television increased the
usage technology during the 80s. While the invention of computers rose the use of technology in the
90s. Once seen as an improvement to the society, technology has now become a problem. Numerous
versions of technology now exist to create technological distractions. Computers, cell phones, and
video games stand the leading distractions in today's society. Technology began small but, with great
advancements technology has gone too far. Youth remain greatly affected by technology. Since
technology has become a normal routine for youth, they fail to realize the problem occurring. Older
individuals who grew up without as much technology, can point out the issue easily. Technology
affects today's youth negatively because it distracts, promotes violence, and lowers independence.
Technology affects youth negatively because it creates distractions. Cell phones have become the
leading distraction involving injuries (Turkle 430). As stated by Sherry Turkle, Massachusetts
Institute of Technology professor, claims that "These young people live in a state of waiting for
connection. And they are willing to take risks, to put themselves on the line" (430). Texting and
driving have become a major problem causing many to crash and die. Technology also causes
distraction in classrooms. Michael Berry, a professor at the University of Colorado, states that
technology affects classrooms
... Get more on HelpWriting.net ...
55.
56. Hiding One 's Identity Is Nothing New
Hiding one's identity Is nothing new. Alexander Hamilton, James Madison, and John Jay authored
The Federalist Papers in 1787 under pseudonym Publius. The ability to communicate anonymously
is viewed as part of our basic right to free speech . With the advent of computers and ease of access
to the internet, becoming anonymous as never been easier, and is far more reaching than the colonial
newspapers of 1787. For some this ease at which we can communicate anonymous is cause for
concern. Although we are no longer hiding our identities to promote the ratification of the
Constitution, being anonymous still plays a large role in our society. Online anonymity grants
anyone with an internet connection an unbiased voice, regardless of gender, race, or wealth. Without
this freedom to online anonymity many people would not feel free to express themselves or release
sensitive information about themselves or about corruption, in the case of whistleblowing.
Anonymity can also be used as a security measure and prevent unauthorized mining of personal
information. Although multiple ethical framework will be used and compared, using a consequence
based framework will be the main examining point throughout. The use of the term "anonymous"
can be confusing from an online perspective. When speaking of anonymity in such a sense it is not
related to the degree of traceability, but to the lack of aspects such as image, voice, and situation in
the online social environment . Those against online
... Get more on HelpWriting.net ...
57.
58. Persuasive Essay On Cyberbullying
There is a growing crisis in the United States that is going unpunished. It affects "roughly a third of
teens who use the internet" (Dosomething.org). This crisis is known as cyberbullying. Today,
lawmakers are trying to establish a law that would make this form of hate–crime that terrorizes
teenagers illegal. Opponents speculate that there is no reason to make this crime punishable by law
because they think this act is just a form of joking or just being rude. "There's a big conflict in
knowing where to draw the line between things that are rude and things that are illegal," says Parry
Aftab, an executive director of an internet safety group. However, making this crime illegal is a
necessity for a plethora of reasons. Cyberbullying is larger problem than many may realize, it causes
suffering and even suicide, and it is a premeditated intent to harm.
With the growing numbers of children plugging into technology and surfing the World Wide Web on
the waves of cyberspace comes the emergent problem of cyberbullying. No longer are children
confined to the playground and hallways to spread their dissent. A study conducted by
Dosomething.org showed that forty–three percent of children confided that they had been bullied
online. With over eighty percent of teens using a cell phone with internet access and ninety percent
signing into social media accounts, the opportunity to bully behind the screen is without a doubt a
problem of epic proportions (Dosomething.org). These
... Get more on HelpWriting.net ...
59.
60. Cyber Bully And What Do Cyber Bullies Look For A Target?
What factors are associated with an increased tendency to cyber bully and what do cyber bullies
look for in a target?
Aschah Williams
David Johnston
Emily Crawford
Jaime Skipper
Kiera Smith
BHCLR What factors are associated with an increased tendency to cyber bully and what do cyber
bullies look for in a target? Cyber Bullying is a relatively new method of harassing and intimidating
peers. It's difficult to target because as few as 1/10 parents realize that their children are participating
in the behavior. Children lack sufficient supervision online, on phones, and on other electronic
devices to deter them from such actions. They are safe from consequences and punishment in their
own "world". Examining individual factors and ... Show more content on Helpwriting.net ...
Symptoms include headaches, nausea, sleeping problems and isolation. Nurses must gain the
adolescent's trust in order to help the patients reveal all the issues that are occurring, and to do a full
psychological assessment of the child in order to be able to make an effective plan of care for the
individual.
Pediatric Population at Risk
In their study, Carter and Wilson (2015) state that out of 367 adolescent students, 337 of them have
computers, that 79.1% of the student body in question have their own personal cell phone and that
81% have a Facebook. Cyber–bullying is an easily utilized method of harassment, and used
throughout all age groups. Adolescents however, are the most likely to both participate and be a
victim of cyber bullying.
Studies show that adolescents are the most prevalent group of people affected by cyber–bullying,
they have also shown mixed findings about the correlation between age and cyberbullying. (Carter,
Wilson, 2015.) Wang, Lannotti, and Nansel (2009) "found no differences in the cyberbullying
among 9th and 8th graders, and fewer self–reports of cyberbullying among 9th and 10th graders."
Williams and Guerra (2007) found that "engagement in internet bullying increased from 5th to 8th
grade, and then declined slightly among high school
... Get more on HelpWriting.net ...
61.
62. Cyber Bullying And Its Effects On Society Essay
Cyber–bullying
"The saying, if sticks and stones will break my bones, but words will never hurt me was ever true, it
sure isn 't true today" (Alexander, 2011). The survey of 9 years olds in 35 countries found that New
Zealand is the one most second highest rate of school bullying. (nzherald, 2012). Especially in this
case parents really need to take a stand against bullying to help prevent it and to stop it. We as
parents need to be a part of the solution, not the problem. Cyberbullying is harmful to society
because it encourages poor behaviour many harshly affect the victim and makes the internet an
unsafe environment for children.
"Children should be able to live a life free from bullying and harassment and it is time that we all
took a stand against this" (Katherine,2015). Of course cyber bullying has showed itself in popular
networking sites such as twitter, Facebook and Tumblr. Those websites are meant to be socializing
between friends and family. Cyber bullying is a big concern in New Zealand society. How are
children and young people affected?
Firstly cyberbullying in social media it has shown in the article "sudden loss of girl saddens
community" by Alicia bailey. Stephanie Garrett, age 15 committed suicide after being cyberbullied
on a website called ask. FM.(bailey,2013) Cyberbullying can happen to any age group even if you
are male or female. In this article, statistics shows that suicide has been a significant rise to is to 19
years, age group. (Bailey,
... Get more on HelpWriting.net ...
63.
64. Essay Cyber Security Departments
As the use of technology has increased drastically over the last two decades, so has our need for
technology. Technology has become a part about our everyday life and we can find technology being
used nearly everywhere. Most systems in today's countries and societies rely on technological
infrastructure; these systems include transport systems, factory systems, power plant systems and
water sanitation systems. This brings on the question of to what extent have governments developed
their cyber security departments, what evidence is there of governmental involvement in malware
attacks and why should governments be concerned about cyber security. Since these systems rely
heavily on technology, governments have to consider them as high–risk ... Show more content on
Helpwriting.net ...
The slammer virus managed to disable the emergency call system, the air traffic control system at
some airports in the USA and the bank of America's ATM network among other things.
Cyber treats of the 21st century
Computer Viruses are increasingly becoming more common, currently 148,000 computers are
infected every day and the World Economic Forum predicts that there is a 10% chance for critical
infrastructure being damaged in the next 5 years . As mentioned earlier most of the critical
infrastructure like power plants and water treatment facilities rely on computer systems, but more
specifically PLC's (Programmable Logic Controllers) 2 and SCADA (Supervisory Control and Data
Acquisitions System) . These control systems have a major drawback, which is that they are
susceptible to attacks by hackers if they are not configured in the correct way. There have been
several examples of systems being compromised. The ICS–CERT (Industrial Control Systems
Cyber Emergency Response Team) responded to 198 cyber incidents reported by power plants,
water treatment plants and other critical infrastructure during 2012 . An experiment was conducted
at the Department of Energy's Lab in Ohio in 2007. The aim of the experiment was to prove that it is
possible to hack into the US power grid and shut down diesel generators. The experiment was called
Aurora, the group of computer experts managed to hack into the diesel generator and
... Get more on HelpWriting.net ...
65.
66. What Are The Advantages And Disadvantages Of Cyber-Space?
Cyber–space can be a persuasive tool in restricted countries and areas
This section will analyze the advantages and disadvantages of the cyber mission, the theological
understanding of the cyber mission, and the need for a cyber–mission today in inaccessible countries
and areas. A positive aspect of cyber space is that the missionary working area becomes wider and
we are today living in the era of cyber space. With cyber space the borders of nations that restrict
oppress the Christian religion can be crossed. The cyber space becomes a new missionary work field
and it has many unique features to reach into un–reached nations and people groups living in
restricted areas.
Advantages of cyber mission in inaccessible countries
To reach the un–reached ... Show more content on Helpwriting.net ...
When asked how 10,000 people came together to protest in front of Zhongnanhai (the Chinese
leadership compound in Beijing) on 25 April 1999, he replied, "They learned it from the Internet."
(www.falundafa.org 2001)
There are many other variables that explain the tenacity and growth of Falun Gong practice, both
within the PRC and around the world. Nonetheless, a look around the Internet reveals that Falun
Gong has established a significant online presence.
It is cyber space that plays a significant role in maintaining and expanding it. Discussions of Falun
Gong are common on China–themed chat rooms and bulletin boards. Email news lists deliver daily
updates to interested subscribers around the world.11 Falun Gong's shortwave radio station,
launched in the summer of 2000, also broadcasts on the Internet in streaming audio. The most
important is Falun Gong's presence on the World Wide Web. Practitioners maintain hundreds of sites
around the world; most contain content in both Chinese and English, while others feature such
languages as German, French, Russian, and Portuguese. This case study can help us see how internet
is a vital persuasive tool in spreading the gospel in inaccessible
... Get more on HelpWriting.net ...
67.
68. Cyber Terrorism
In 1999, Chinese hackers targeted United States government sites, after an accidental bombing of a
Chinese embassy in Belgrade. During this attack, government sites were hijacked and some sites
suffered a denial of service attack. Most recently, it was suspected that Bank of America was the
victim of a cyber terrorism attack; although no definitive evidence is available to substantiate that
claim. Cyber terror attacks pose a threat against the national security of the United States. In order to
fully comprehend the threat that cyber terrorism poses, it is essential to understand the background,
the effects, the reality of the threat and the future of cyber terrorism. This assessment examines the
reality of the cyber terrorism threat, and ... Show more content on Helpwriting.net ...
Likewise, terrorists will strive to improve their cyber terror attack capabilities by keeping pace with
the emerging technologies and overcoming countermeasures.
Many computer security experts question the possibility that the Internet could be used to inflict
death on a large scale. Some precautions have been made. Systems have been established in the last
five years, which aim at preventing a possible cyber terrorism attack. "Air gapping" has been
established on all nuclear weapons, meaning the weapons are not connected to the Internet or any
open computer network and cannot be accessed by intruders or terrorists. Still, other areas of
concern include subways, gas lines, power grids and communication systems; which are owned
primarily by the private sector and are managed by Internet enabled computer systems.
Reality of a Cyber Terror Attack
Malicious cyber activity is occurring more frequently and with unexpected complexity. In mid–
December of 2009, Google experienced a highly sophisticated and targeted attack which originated
in China on its search engine infrastructure and e–mail, as well as on at least 20 other companies.
Attacks are occurring within the United States, as well. Attacks on government networks are
omnipresent. In 2008, NASA and other departments of Defense, Homeland Security and Commerce
suffered major intrusions by "unknown foreign entities" which
... Get more on HelpWriting.net ...
69.
70. Teenagers And Social Media
Now more than ever living in the age of technology, social media has impacted our lives greatly.
With a click of a button we have the ability to communicate with friends, family, and ev en those we
may never have the opportunity to meet face to face. Some Believe that the use of social media
allows us to practice freedom of speech and provide an outlet for free expression. Unfortunately in
some instances social media, also gives us the opportunity to engage in behavior that normally we
wouldn't do in a face to face setting. Teenagers often don't understand that they have no privacy in
internet usage, and that social media allows users to access people information and use to insult or
bully them. Once you have posted something online it is other in the internet world forever. Any
potential employer can access your information and use that information in deciding whether or not
to give you a job. Often whatever you post can haunt you in the future. While many social media
websites have maintained privacy restrictions there is still a lot of information that can be accessed
with a click of a button. Many people including teenagers, don't realize that whatever you may post
on line cannot be erased. Often users will post their issues and problems seeking and outlet whether
for attention or to have someone to talk to. Once something is posted it allows others to post their
comments and opinions which can be negative. Social media sites such as Facebook,
... Get more on HelpWriting.net ...
71.
72. The Prosecution Of Child Pornography In Australia
"Prosecution of child pornography"
The law is already enforced against child pornography and it is implemented and enforced over the
internet.
5. Social behaviour
Further social study proves that "cyber porn" distributed psychological difficulties. This domain is
causing problem in our society. At present there are more teenage single mums then ever before. The
psychological effects of the increased needs of sexual drive cause STD (Sexually Transmitted
disease). Over all, the easy access to "cyber porn" leading to potential negative psychological
consequences.
Case Against
1. Censorship for child, who is the responsible?
After taking close look at the circumstances in relation to "cyber porn" and access to internet for a
child, it is ... Show more content on Helpwriting.net ...
One perspective is that the "Arab Spring" may refer as "Twitter Revolution" or "Facebook
revolution". Social media played a vital role to reshape the politics of "Middle East". The impact of
this change was very crucial for the governments. The lash back of this change was different in
different countries. In "Tunisia" and "Egypt" government regimes did not have any social media
base and they could not estimate the impact of social media in the society. In "Tunisia" and in
"Egypt" nine out ten people responded to a poll conducted by the "facebook" to organise the protest.
Finally its ended up with a regime change democracy won through social media
... Get more on HelpWriting.net ...
73.
74. Social Media Should Be Used Responsibly
As technology advances, the amount of people online is also growing. Among these people, a great
amount of them are teens. These teens are accessing the Internet through various digital devices and
communicating with one another through methods such as texting and emailing. Today, teens and
young adults are the ones who make up one of the largest groups on social media outlets. According
to the Pew Report, "Teens, Social Media, and Privacy," 95% of teens are on the Internet and 81% of
them use social media sites. In the opinion piece "Social Media Should Be Used Responsibly" by
Katie Atkinson, social media outlets "were created for harmless networking and fun, but have
instead turned into some of the greatest tools to harm others with" and thus, cyber bullying came
into existence. Cyber bullying is "a modern form of bullying performed using electronic forms of
contact" (Fabio Sticca & Sonja Perren). It is where kids send hate messages, post embarrassing
pictures of others, and hide behind fake identities to harass others. With all the new interactive
features on these social media sites, posting a hateful comment or sending a cruel message has
become easier than ever. According to cyber bullying statistics provided by the i–SAFE foundation:
"Over half of adolescents and teens have been bullied online and about the same number have
engaged in cyber bullying." The worst part of it all is that more than half of these adolescent do not
tell their parents when cyber bullying
... Get more on HelpWriting.net ...
75.
76. Cyber Warfare And Security Threats
Abstract
The innovations in information technology and increased amount of interconnected electronic
devices today create new economic and social prospects as well as improve the overall quality of
our lives. While these leading edge technologies create opportunities, some have become prey to
attackers and has given birth to a new era of Cyber warfare. Consequently, the Internet, computers
and networks have become targets and vehicles of cyber attacks and generate challenges to our
security privacy. Cyber Warfare presents an ever–increasing amount of security threats, which
continue to escalate with increasing harshness, and is now a critical issue in our technology realm
and a growing threat to the world. Cyber wars are generally ... Show more content on
Helpwriting.net ...
Singer, P., & Friedman, A. (2014)
Cyberspace is now a military dimension; the word "cyber is a very significant and probably one of
the most common term used in today's international security dialogues. The Internet and e–
commerce are crucial to the economic competitiveness of many nations, businesses and
organizations, however cyber criminal have cost users millions of dollars and valuable assets.
Achieving security on the Internet is a very daunting task; as criminals and hackers have become
plagues to critical IT infrastructures, online communication and e–commerce.
Cyber warfare is a very costly and complex reality; it compromises the privacy of web users and has
shaped great battles between domains. Governments and organizations are faced with significant
threats and challenges daily as advanced software programs are developed and used to exploit and
disrupt their computer networks. These increasing series of cyber conflicts between nations, corrupt
gangs and virtual terrorist groups; all raises critical economic and national security issues in
countries across the globe. In a recent article Clayton (2011) stated that "Tomorrow 's wars will be
fought not just with guns, but with the click of a mouse half a world away that will unleash
weaponized software that could take out everything from the power grid to a chemical plant."
(Clayton 2011). It is very appalling to think that the insertion
... Get more on HelpWriting.net ...
77.
78. Bullying Has Been A Big Problem In Our School System For
Bullying has been a big problem in our school system for many years, but it has escalated over the
past decade due to the new era of modern technology. Unanimously, we can agree that our daily
lives greatly depend on technologies; the internet, cellphones, computers, tablets, IPad etc. Although
the uses of technology positively impacted our lives, there is also the downside when it uses have
negative connotations. For instance, modern technology made it very easy to engage in
cyberbullying, perpetrators used cell phones or computers to conduct this hideous behavior, hiding
behind their keyboards to express negative feelings and or thoughts toward others. Using social
media for senseless and unwarranted insults to intentionally cause harm ... Show more content on
Helpwriting.net ...
Statistics have shown that everyone can be victims of cyber bullying, but most incidents occur
between the age of 11 to 15 years old, however, some report showed that children's as young as 10
years old also been a victim of cyberbullying. Cyberbullying can have long lasting effects on its '
victims that can lead to mental health issues like depression, anxiety, stress, and even suicide.
Increasing number of young kids and teenagers committing suicide because of cyber bullying and
sexting have been coming to the public 's attention. As reported by the Centers for Disease Control
and Prevention (CDC), suicide is the third leading cause of death among young people with
approximately 4,400 deaths every year. The CDC estimates that there are at least 100 suicide
attempts for every suicide among young people. More than 14 percent of high school students has
considered suicide and nearly 7 percent have attempted it, that is why, sadly, there are increasing
coverages about cyberbullying case in the media now more than ever. (NOBullying, n.d.) Despite
the physical contact or audible insults, cyberbullying can be even more traumatizing and damage
have a life time effect on mental health than traditional forms of bullying. Through social media and
mobile communications, bullying can now potentially be viewed by all, a victim 's friends, family,
and
... Get more on HelpWriting.net ...