Free Essay

Child Predators: Does Technology Increase Exposure and Risk?

In:

Submitted By JustWantToPass
Words 2804
Pages 12
Child Predators: Does Technology Increase Exposure and Risk?

Child Predators: Does Technology Increase Exposure and Risk?
Introduction
Child predators, or a person who preys upon minors for self-gratification often in a sexual manner, has been a known social issue before computers were invented. With the increased availability of computer based technology, including social networking, people have begun to demand more laws and regulations in regards to sex offenders ability access online technology and communication tools (Wynton, 2011). The availability of computer based communication has allowed for the world to interact with others in a way that is not like that of telegraph or telephone. Does the increase of technology create more predators or does it just give a medium for predators to expand and reach their potential victims? As with many things that are linked to technology, the exposure and the knowledge that is needed to prevent the increase of child predators online is reliant on multiple factors. These factors include access to online environments, increased preventative technology, knowledge of children and their risks online, and the need for social responsibility for web developers, parents, and children. The expansion of technology does not guarantee more predators will emerge but it does give new mediums and victims that may not have been available previously, creating a need for changes in both the virtual and real worlds that people reside in.

Background Child predators can be prosecuted for attempts to “knowingly persuade, induce, entice or coerce any minor to engage in any sexual activity” according to Christenson (2011) of Duke Law School. With this in mind, prior to computer based communication the predator would have to have a way to be close enough to the potential victim in order to commit or attempt a sex crime. With the expansion of computer based communication the ability to contact, and in turn persuade or entice, a minor has expanded to include the virtual world as well as the physical world. Lawmakers have recognized the issue of online predators and begun to take an initiative against their presence as well as their actions online. Many state laws have been passed to ensure that sex offenders are not allowed on specific internet social networking sites such as MySpace, Facebook, etc. (Wynton, 2011). In accordance with their sentences if the convicted predators are found to be using these sites it is considered a direct violation of their release and they will be sent back to prison similar to any other criminal that violates the terms of their release. The complete shutdown of someone’s use and exposure to the internet is not agreed upon as a preventative measure by all people. Preventing the use of these sites as well as the use of other publically available resources has raised the question on whether or not the First Amendment rights of a sex offender are violated during their restriction of use. Ekblaw (2011) explains that many activist of the First Amendment believe that the goal of protecting children can be reached through other means that are not as speech restrictive and thus do not restrict the First Amendment. With this argument in place not all laws and restrictions have been adopted by every state and therefor still creates a space in which child predators are able to prey upon their potential victims without the same consequences.
With the increase in the availability of internet and cellular telephones, with access to both text messaging and internet to children, increasing the exposure to potential predators and threats has also increased. In 2007, approximately 74% of children 13-18 years old owned cellular telephones and 26% of 6-12 year olds owned cellular telephones (Knapstein, 2007).The ability to access information about an individual has increased as has internet and online usage amongst children and adults (Mitchell, Lebow, Uribe, Grathouse, & Shoger, 2011). With this increased risk there must be lessons taught to children to help prevent and curb the chances of a predator coming in contact with a child of any age.

Increased Risk and Exposure Technology has opened new gateways in both positive and negative experiences. The fact that children are able to access the internet from points that are not fixed, such as a home computer, where parents can easily monitor their activity has increased the need to teach children about the risk of potential predators. Children have also grown up using computers and may be able to access sites and tools that their parents are not aware of or have the knowledge to prevent access to from their children. According to a study done by Kite, Gable, and Filippelli in 2010, middle school students were asked about computer related interactions and knowledge. 62% of the students agreed that they were better with computer software than their parents, 71% did not know or believe that a predator would contact them based off from information on their website, and 63% did not know or believe that a predator could contact them based off from posted information. The same study showed that only 59% of the students surveyed possessed the necessary information to avoid predators or prevent contact with people they did not know. The fact that the majority of students believed they were better at using computers than their parents could potentially increase the ability to hide their actual usage or not allow for parents to know what their children are doing online. 74% students agree that the majority of their friends had some sort of social networking website (Kite et al., 2010). With this high of a percentage of participation in social networking the involvement and knowledge of the parents must be present so that parents can assist in preventative measures.

Preventative Measures Laws and software have been created to help prevent the access that predators have to children online as well as how knowledgeable a parent may be to a potential threat within their area of residence. One of the original laws passed to protect children online was the Children’s Internet Protection Act (CIPA) which has been reformed to include the Delete Online Predators Act (DOPA) (Essex, 2009). In these acts public libraries and other structures which would allow children to access the internet would have to provide a filtering, or blocking program that prevents access to certain sites in which children may be exposed to inappropriate material or predators, program on all of their computers. In the passing of these laws Congress cited a recent study that showed 67% of students do not share their internet activity with their parents, 30% actually made an effort to hide their activity, 31% of the children have the ability to bypass the software that would be used in accordance with DOPA, and that 12% has actually had face to face interaction with someone they met online (Essex, 2009). The use of filtering software associated with DOPA must also be used in accordance with the teachings of parents and schools to help prevent access to the children by the predators. Essex (2009) also showed that 61% of parents wanted to be more involved in the content and internet activity of their children but 47% felt that their abilities to limit and monitor their children’s activity was limited due to schedules or knowledge. The parents cannot rely on monitoring by a computer based program as many of the students were able to circumvent these programs. The involvement of the parents in the activity of their children online becomes even more important to preventing contact between a predator and a child. The typical adult involved in online sexual activity (OSA) is a married, professional, male, in their early thirties (Atkinson & Newton, 2010). This profile is likely going to be similar to many of the role models in a child’s life and not necessarily considered a threat or a predator in the child’s eyes. Parent’s must inform and ensure their child knows that familiarity is a key to preventing outside predators from creating a threat towards the child. Online predators are more likely to gain the attention of someone who is not directly involved in their social interaction and create a new base of victims than that of family friends, family members, or other close children in their lives (Atkinson & Newton, 2010). Parents must instill into their children that it essential to their safety and well-being that they avoid strangers. Technology has also been able to work in the favor of preventing or educating parents of potential threats in their area to ensure they know about people with past offenses that are located in their physical area. The United States Department of Justice has been able to create National Sex Offender Public Website (NSOPW) (2012). With the use of this site as well as others that are locally based parents are able to find information about registered sex offenders. With the local laws of disclosure that a sex offender must follow as well as the posted information online about them, parents are able to remain informed about who may be located near their residence or schools. Tools and websites such as these can also help to determine if the offender is a threat or if their arrest was based on something that was not related to a minor. Sex offender laws are not designed to separate the crimes into different categories at first glance by an outside source. Sites such as NSOPW and local sites allow for parents to retrieve information about an offender who may be considered a sex offender for an offense such as urination in public as opposed to sex with a minor under the age of 13 (USDOJ, 2012). Parents are then able to have the information about the people who may reside in their community and are able to inform their children through the use of pictures that are posted in the registration sites. However, online anonymity is something that gives the predator an advantage when meeting the victims online. Predators that use the internet as their main tool of attracting potential victims are able to use identities that are not theirs and can pose as someone who the child either is attracted to, not afraid of, or is willing to share information with. If a child does understand that these predators are online or they are not made aware of the potential that someone may not be telling them the truth online it can easily leave them more vulnerable to attacks by predators. The assumption that laws such as DOPA and programs that filter certain sites will be able to prevent a child from being attacked is something that parents and guardians must understand as preventative measures they must understand that knowledge is the only way to potentially avoid these predators or at least slow their movements towards the children.

Moving Into the Future Parents and guardians that believe that the only way to protect children from predators is to completely avoid the internet and potential threats may look at preventative measures that do not inhibit the growth that a child technologically. Emily Bazelon (2011) examines the reaction throughout time to technology and the ability for parents to completely protect their children from technology as it grows and creates issues that may not have been present in the years prior to its invention. Bazelon looks at the violent video games and the preventative measures that were taken to prevent children from committing violence based on the video games they play and how there was no substantiated proof that the playing of violent video games caused violence. The same can be said with the introduction of social networking and the opening of an online environment to predators looking for children. It has not been proven that because someone uses social networking or the internet as a child that they are any more prone to the threat of a sexual predator. In actuality, according to the Crimes Against Children Research Center at the University of New Hampshire (Bazelon, 2011), the number of child sex crimes and teenagers having sex is down from a similar study conducted in the early 1990’s. The evolution of technology over this period has increased the amount of available internet sites that predators could potentially prey upon as well as the technology usage of children. The evolution of technology has increased the need for awareness that in turn creates the amount of information that people are subject to concerning internet child predators. Sex offender crimes have also changed to include other less serious crimes that are still considered a sex crime. A need to reclassify certain crimes such as sexting, or the use of a cellular service to text sexual messages, has raised an awareness that general assumptions cannot be made about sex offenders and their threat to children (Bazelon, 2011) and that the laws based off from these assumptions may not always be the correct measures to prevent future issues and crimes. The laws and regulations regarding sex crimes, sex offenders, the classification of these people and their actions has to be able to change as scenarios, threats, and tools change. It is not always easy for laws and regulations to keep pace with technology and this fact can create issues that nobody may have thought about until after something happens and raises questions or concerns.
Conclusion
Child predators have been able to use online communication tools such as chat rooms, social networking sites, and online forums to expand their potential victim base. Children have had an increased exposure to technology including but not limited to smartphones, home computers, tablets, and other communication devices that are able to connect to the internet on the go and at any time. The increased need for parents to educate their children about inherent risks of online predators, and the use of these tools to reach out to them has become even more important to the prevention and safety of the children. Laws regarding online predators are beginning to take form and initiate a movement towards creating safer online environments for children and other users. However, as laws take form and technology grows the ability for the laws to keep up with the evolution of technology become even more difficult for parents, lawmakers, and other members of society. With the term “sex offender” representing multiple different crimes including violent and non-violent, minor and adult, non-threatening and threatening the ability to institute laws that represent all of the offenders is difficult and often challenging. While the expansion of online technology and communication tools does not necessarily increase the number of predators or offenders it does provide a new point of access to victims that must be monitored and regulated. Parents and guardians who are involved with their children and are able to pass on knowledge regarding safety and the potential threat of predators are able to help prevent issues. While not everything is guaranteed to provide the service or prevention that it is supposed to there are steps that parents can take to ensure that their child is aware of issues and problems that may occur.

References
Atkinson, C., & Newton, D. (2010). Online behaviours of adolescents: Victims, perpetrators and Web 2.0. Journal Of Sexual Aggression, 16(1), 107-120.
Bazelon, E. (2011). The ninny state. The New York Times. June 24, 2011. Retrieved from, http://www.nytimes.com/2011/06/26/magazine/the-wrong-response-to-online-predators.html?_r=1&pagewanted=all
Christensen, K. J. (2011). Reforming attempt liability under 18 u.s.c. § 2422(b): an insubstantial step back from United States V. Rothenberg. Duke Law Journal, 61(3), 693-730.
Ekblaw, J. (2011). Not in my library: an examination of state and local bans of sex offenders from public libraries. Indiana Law Review, 44(3), 919-956.
Essex, D. (2009). From deleting online predators to educating internet users. Young Adult Library Services, 7(3), 36-45.
Kite, S. L., Gable, R., & Filippelli, L. (2010). Assessing middle school students’ knowledge of conduct and consequences and their behaviors regarding the use of social networking sites. Clearing House, 83(5), 158-163.
Knapstein, K. (2007). Cell-phone-savvy kids. Scholastic Parent & Child, 14(6), 62.
Mitchell, M. E., Lebow, J. R., Uribe, R. R., Grathouse, H. H., & Shoger, W. W. (2011). Internet use, happiness, social support and introversion: A more fine grained analysis of person variables and internet activity. Computers In Human Behavior, 27(5), 1857-1861. doi:10.1016/j.chb.2011.04.008
US Department of Justice. (2012). National sex offenders public website. Retrieved from, http://www.nsopw.gov/Core/Portal.aspx?AspxAutoDetectCookieSupport=1
Wynton, J. S. (2011). Myspace, yourspace, but not theirspace: the constitutionality of banning sex offenders from social networking sites. Duke Law Journal, 60(8), 1859-1903.

Similar Documents

Premium Essay

Technology and Society

...and shaped the society we live in today. With all the good the Internet has brought to our lives, there is always a trade off or a negative outcome. Many adults are claiming that the Internet has a very bad influence on today’s youth since it is exposing them to sexual solicitation, harassment/bullying and exposure to inappropriate content. However, the main issue of this article is stating that the claims of the adults are not new to society and that these problems have been around for quite a long time and the Internet is just making these problems more visible. The article is stating that the Internet is making the claims of the adults visible to them and the reason why adults are blaming the Internet for these issues is because they are scared and do not know how to protect their children. They are focusing too much on technology and losing focus on the bigger picture. Society does not have the resources to help the youth that are in need and therefore we tend to look for something to blame, and choose to blame the internet. The article goes on to explain four main issues that come up in conversation when discussing online safety: sexual solicitation, harassment, exposure to inappropriate content and youth-generated problematic content, and is trying to prove that these issues are not exclusive to the internet. They also happen offline and the Internet is exposing these issues to our faces and we are not doing much to handle them. These four main issues will be discussed in...

Words: 3428 - Pages: 14

Premium Essay

Social Media and Children

...that makes it possible to connect to social networks at any time. Technology is everything to them because they communicate, live and socialize through and with it. It can provide a great opening for children to develop cognitive, social and language skills, but because they are so captivated by the vast products and many programs offered they are missing this opportunity. Social media has also become a very lucrative playing ground for predators, either sexual or bullies to prey on vulnerable and please seeking boys and girls. The power of technology has created a new monster called cyberbully who has the ability to reach out and manifest harm and danger to their targets very easily. Parents can commit to enforcing technology education and monitoring to help their children make a successful tool to access for their advancement and also take the correct defensive measures to protect them from the many dangers. Social Media and Our Children Social media has vastly evolved over the last decade. It has become a vital ingredient of our personal as well as our professional lives. Social media is a key component of practically every population in the world. Most adults and children have easy access to multiple technology resources that will keep them entertained, informed and engaged with various social media outlets. Over the years there has been an alarming rise of social media that has manifested increase of malicious attacks in society, especially among our children and...

Words: 3655 - Pages: 15

Premium Essay

How Facebook Affects One Academic Performance

...How Facebook affects one’s academic performance I. INTRODUCTION Facebook are currently being used regularly by millions of people. The use of these networking sites has been widespread that they have not only caught the attention of academic researchers worldwide but also us, in particular. Social networking sites are now being investigated by numerous social science researchers and an increasing number of academic commentators are becoming more and more interested in studying Facebook and other social networking services, because of their probable impact in our society. Most sites help strangers connect with others based on personal interests, political and economic views or simply recreational activities. Some accept distinct viewers, while others attract people based on similarities such as common languages or shared racial, sexual, and religious or nationality based identities. In short, social networking like Facebook only have common goal. It is to encourage new ways to communicate and share information. Many students have been blaming various social networking sites for their failing grades in school. These problems awaken me to look into social networking sites and why they affect fellow student’s academic performances. A. OBJECTIVES The students intend to: • Discuss the nature of social networking sites and low academic performance •Provide data supporting the claim that social networking sites affect one’s academic Performance adversely • Assess the...

Words: 3910 - Pages: 16

Premium Essay

Cellular Effects

...Cellular Technology and Society Today , Political & Economic ., Health, Psychological & Sociological , Cellular Technology & History , Moral & Sociological DeVry University LAS432 Society, Ethics, and Technology   Abstract The following paper will discuss the psychological and sociological impact of cellular technology. Cellular technology has seen rapid growth in technology and in personal use. Texting has now become the dominant means of communication and actual conversation skills are diminishing. Exposure to electromagnetic radiation emitted from cellular devices has become a concern and is being studied from many various angles to determine actual health risks from cell phone use. Whether it is for personal or business use, the cell phone has become a permanent fixture in our lives, could have potential health risks, and can become an addiction if necessary steps are not taken to control use and dependency.   Cellular Technology and Society Today At any store they are visible. They have their hand plastered to their ear or they are seemingly talking to no one. These are the cellphone users. Hayley Tsukayama, a writer for the Washington post asserts that according to the Pew Internet and Life Project only seventeen percent of Americans still have a land line and ninety percent own a cellphone. (Tsukayama, 2014) The largest contributor to this trend is convenience. Most cellular devices are small and easily portable, allowing the user to move around freely...

Words: 19048 - Pages: 77

Premium Essay

Our Stolen Future

...Name: C.T.B. Assignment: “Our Stolen Future” Date: 12/03/2012 The Book “Our Stolen Future” is considered to be a sequel of “Silent Spring“, a Rachel’s Carson classic work, a clarion call to protect the American public from manmade synthetic pesticides that cause genetic mutations and cancer. Carson not only described how persistent chemicals were contaminating the natural world, she documented how those chemicals where accumulated into our bodies. Since then, studies of human breast milk and body fat have confirmed the extent of our exposure. Human beings in such remote locations as Canada’s far northern Baffin Island now carry traces of persistent chemicals in their bodies, including notorious compounds as PCBs, DDT and dioxin. Even worse, in the womb and through breast milk, mothers pass this chemical legacy on to the next generation. “Our Stolen Future”, the scientific discovery of Theo Colborn, Dianne Dumanoski and John Peterson Myers, takes up where Carson left off and reviews a large and growing body of scientific evidence, linking synthetic chemicals to aberrant sexual development and behavioral and reproductive problems, such as low sperm counts, infertility, genital deformities, hormonally triggered human cancers, like those of breast and prostate gland, neurological disorders in children such as hyperactivity and deficits in attention. The quality of men's sperm declined steadily in the early years of the 21st century until hardly anyone could reproduce in...

Words: 8090 - Pages: 33

Premium Essay

Social Media

...com/docview/1493278555/6428ED186E8C42A8PQ/20?accountid=14693 International Journal of e-Education, e-Business, e-Management and e-Learning, Vol. 4, No. 3, June 2014 Legal Risks in Social Media Marketing Jawahitha Sarabdeen Abstract Social media is an important communication channel for marketers. The research conducted earlier shows that more than 81% of the businesses are using social media or planning to use social media for marketing purposes. The social media is used for engagement marketing, buzz marketing, building customer relationships and to revitalise brand image. As social media marketing facilitates two way communications between the marketers and the users, the content generated in social media is considered trustworthy and reliable by the customers. The marketers while using the social media should be aware of the legal risks involved in social media marketing. This research paper by using content analysis looks at social media marketing and legal risks involved in social media marketing. Index Terms—Social media, marketing, legal risks, regulations. I. INTRODUCTION Social media marketing is a phenomenon where businesses are seeking new ways to create value. The introduction of social media considerably changes the marketing activities and consumers‘ behaviours. With the introduction of various technologies associated with social media the businesses and consumers participate in marketing activities easily without cost. Though social media is relatively a new media...

Words: 6386 - Pages: 26

Premium Essay

Bullying in the Schools and Teacher Perceptives

...CHAPTER TWO Review of Literature Introduction Current educational research on bullying imbedded in bullying programs instruct Educators on how to handle different aspects of bullying episodes and, on how to instill an understanding of student’s perceptions of bullying incidents, however, not all teachers have the same perception of bullying interactions. Everyone comes to the table with their own set of definitions and perspectives based upon their background and upbringing. There is a need to examine these varied perceptions and understandings and how people in schools define and respond to bullying. There are critical gaps in the existing research on this subject and by identifying and understanding teacher perceptions of bullying in this time frame of 2013, response to incidents involving student bullying will provide useful insights while also providing future researchers points of comparison. The purpose of Chapter Two is to support examination of my body of research and to determine similarities and differences in teacher perceptions of bullying in their schools. Background information will be provided to the reader on the kinds of bullying and their definitions, and what affects accompany bullying episodes and current existing attitudes about bullying. Review of the Related Literature Bullying has been come to be defined as the repeated aggressive behavior that can be either physical, psychological to...

Words: 9613 - Pages: 39

Premium Essay

Why Sex Is Fun

..."Why is Sex Fun? is the best book on the subject I've read. This lively exploration of our sexual heritage offers fascinating reading for anyone curious about why lovers do what they do." -Diane Ackerman, author of A Natural History of the Senses "I am so jealous of Jared Diamond, for he writes with such an elegant simplicity! Here, he takes a loot at the endlessly fascinating topic of human sexuality His convincing arguments should persuade xm that there are very special reasons why we evolved to use sex for recreation as well as for procreatim whereas most other mammals are denied that pleasure.... It is a great little book, by one of the worlds foremost biological philosophers." -ROGER Shohl Professor of Physiology Monash University Australia "Once again Jared Diamond provides us with answers to questions we may never have stopped to ask, but wish we had. In this long essay Diamond explains that recreational sex, while not unique to humans, is a rare behavior in the animal world. Above all, we learn, sexual activity divorced fron procreation is not only part of what it is to be human, but the very crux of our evolutionary success." -Bettyaxn Kevles. author of Naked to the Bonn Medical Imaging in the Twentieth Centnty The Science Masters Series is a global publishing vonture consisting of original science books written by leading scientists and published by a worldwide team of twenty-six publishers assembled by John Brockman. The series was conceived by Anthony Cheetham of Orion...

Words: 44494 - Pages: 178

Premium Essay

Juvenile Delinquency

...or bad from his childhood but later when he becomes fully hardened criminal its not easy to reform him.We blame parents for a bad juvenile but they alone are not responsible for a bad juvenile delinquent.A juvenile becomes delinquent due to environment all factors are responsible family,society,peers factors,etc.Juvenile becomes delinquent when he does not get the appropriate love and affection he wishes to have.Slowly the juvenile follows the path of delinquency and then becomes delinquent.We all see the cases of juvenile delinquency but no one cares to look into the factors responsible for juvenile delinquency.It is said that prevention is better than cure.After juvenile becomes delinquent we try to reform him but if we from beginning take steps so that a juvenile doesn’t become delinquent then we won’t have to look into cases of increased crimes by juvenile delinquents.I have tried to throw light on those factors which play an important role in making a child delinquent and what are the methods by which we can stop a child from becoming delinquent and also the laws which have been made for juveniles.It is important to train a child properly to make a juvenile a responsible citizen of our country.I have also thrown light on salient features of juvenile justice act.Juveniles laws also seen in international perspective. JUVENILE DELINQUENCY AND JUSTICE Juvenile delinquency, also known as "juvenile offending"...

Words: 13560 - Pages: 55

Premium Essay

Term Paper on Understanding Aggression

...Republic of the Philippines Laguna State Polytechnic University San Pablo City Campus College of Arts and Sciences Bachelor of Science in Psychology Submitted to: Ms. Evangeline Dia Understanding Aggression Handed on February 5, 2014 By: Camille L. Quicho Student no. 11-00131 Psychology (BS), 2nd semester CONTENTS 1 Introduction………………………………………………………………………1 2 What is Aggression………………………………………………………………2 3 Disorders linked from Aggression……………………………………….. ~1~ 1- INTRODUCTION Psychologists classify aggression as instrumental and hostile. Instrumental aggression is aggressive behavior intended to achieve a goal. It is not necessarily intended to hurt another person. For example, a soccer player who knocks a teammate down as they both run to stop the ball from reaching the opposing team's goalpost is not trying to hurt the teammate. Hostile aggression, onthe other hand, is aggressive behavior whose only purpose is to hurt someone.Hostile aggression includes physical or verbal assault and other antisocialbehaviors. Most studies of aggression are geared toward hostile aggression. There are several forms of self-control training, which teaches people to control their own anger and aggression by making verbal statements in which the person tells him/herself to respond to anger and arousal by thinking first and then using less aggressive behavior. Self-control training includes rational restructuring, cognitive self-instruction, and stress inoculation. Self-control...

Words: 12285 - Pages: 50

Premium Essay

Social Networking

...What Is Social Networking? Social networking is the grouping of individuals into specific groups, like small rural communities or a neighborhood subdivision, if you will.  Although social networking is possible in person, especially in the workplace, universities, and high schools, it is most popular online. This is because unlike most high schools, colleges, or workplaces, the internet is filled with millions of individuals who are looking to meet other people, to gather and share first-hand information and experiences about cooking, golfing, gardening, developing friendships professional alliances, finding employment, business-to-business marketing and even groups sharing information about baking cookies to the Thrive Movement.  The topics and interests are as varied and rich as the story of our universe. When it comes to online social networking, websites are commonly used. These websites are known as social sites. Social networking websites function like an online community of internet users. Depending on the website in question, many of these online community members share common interests in hobbies, religion, politics and alternative lifestyles. Once you are granted access to a social networking website you can begin to socialize. This socialization may include reading the profile pages of other members and possibly even contacting them. The friends that you can make are just one of the many  benefits to social networking online. Another one of those benefits includes...

Words: 8371 - Pages: 34

Premium Essay

This Paper Provides an Overview of the Growing Cybercrime Problem and Reviews Two Criminological Theories That Have Been Applied to the Study of Cybercrime and Cybercrime Victimization. Legislation Which Defines

...An Examination of Cybercrime and Cybercrime Research: Self-control and Routine Activity Theory Katherine M. Grzybowski Arizona State University 1 March 2012 Cybercrime 1 TABLE OF CONTENTS 1. ABSTRACT .....................................................................................................3 2. INTRODUCTION...........................................................................................4 3. A REVIEW OF CYBERCRIME ...................................................................6 3.1 Cybercrime Legislation ............................................................................7 3.1.1 3.1.2 Federal Laws .................................................................................7 State Laws ......................................................................................9 3.2 Cybercrime Law Enforcement Agencies ................................................11 3.3 Classifying Cybercrime ............................................................................16 3.4 National Levels of Cybercrime ................................................................19 3.4.1 3.4.2 Business Cyber Victimization ......................................................20 Individual Cyber Victimization ...................................................22 4. A REVIEW OF THEORIES..........................................................................26 4.1 Self-control Theory ...................................................................

Words: 13816 - Pages: 56

Premium Essay

Cyber Crime

...An Examination of Cybercrime and Cybercrime Research: Self-control and Routine Activity Theory Katherine M. Grzybowski Arizona State University 1 March 2012 Cybercrime 1 TABLE OF CONTENTS 1. ABSTRACT .....................................................................................................3 2. INTRODUCTION...........................................................................................4 3. A REVIEW OF CYBERCRIME ...................................................................6 3.1 Cybercrime Legislation ............................................................................7 3.1.1 Federal Laws .................................................................................7 3.1.2 State Laws ......................................................................................9 3.2 Cybercrime Law Enforcement Agencies ................................................11 3.3 Classifying Cybercrime ............................................................................16 3.4 National Levels of Cybercrime ................................................................19 3.4.1 Business Cyber Victimization ......................................................20 3.4.2 Individual Cyber Victimization ...................................................22 4. A REVIEW OF THEORIES..........................................................................26 4.1 Self-control Theory ....................................

Words: 13816 - Pages: 56

Premium Essay

Computer

...computer crime is any illegal action where the data on a computer is accessed without permission. This access doesn't have to result in loss of data or even data modifications. Arguably the worst computer crime occurs when there are no indications that data was accessed. Computer crime is often attributed to rogue hackers and crackers, but increasingly organized crime groups have realized the relative ease of stealing data with relative low-level of risk. Government organizations are also rumored to be involved with hacking in to computer systems, but the legality of such actions is far too grey an area to be discussed here. Computer crime, or cybercrime, refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime.[1] Netcrime refers, more precisely, to criminal exploitation of the Internet.[2] Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. On the global level, both governments and non-state actors continue to grow in importance, with the ability to engage in such activities as espionage, financial theft, and other cross-border crimes sometimes referred to as cyber warfare. The international legal system is attempting to hold actors accountable for their actions...

Words: 7299 - Pages: 30

Premium Essay

Amazon.Com - Inc. 2004

...CONTENT Exercise 1. 2 Exercise 2. 5 Exercise 3. 8 Exercise 4. 11 Exercise 5. 15 Exercise 6. 18 Exercise 7. 21 Exercise 8. 25 Exercise 9. 28 Exercise 10. 31 Exercise 11. 34 Exercise 12. 37 Exercise 13. 40 Exercise 14. 43 Exercise 15. 46 Exercise 16. 49 Exercise 17. 53 Exercise 18. 57 Exercise 19. 61 Exercise 20. 65 Exercise 21. 68 Exercise 22. 72 Exercise 23. 76 Exercise 24. 80 说明: 题目来源: Exercise 1-24:所有题目都来自官方真题 其中: Exercise 1-14:我们将OG和PP2中的题目编排为前14个Exercise, 每个Exercise都是按照GRE考试中阅读部分的出题习惯编排,即每个Exercise 10个题目,形式为(1长+2短+1逻辑 or 4短+1逻辑)。 Exercise 15-24:我们将近年来考试中出现的文章和老GRE中极为接近现行出题风格的文章编排为后10个Exercise,每个Exercise 13个题目左右,形式为(1长+1短+2逻辑)。 练习方法: 建议大家第一遍做能够限时练习,按照考试的要求每个Exercise的大致难度和应该用的时间都标在了前面。没做完6个exercise可以做一个回顾总结,将文章反复做一遍,总结单词,长难句,文章的出题规律,句子之间的关系。 答案显示方法: 如果你打印出来练习:参考答案见P 页 如果你在电脑上练习:windows 系统:Ctrl+Shift+8;Mac系统:Command+8 Exercise 1. 20min While most scholarship on women’s employment in the United States recognizes that the Second World War (1939–1945) dramatically changed the role of women in the workforce, these studies also acknowledge that few women remained in manufacturing jobs once men returned from the war. But in agriculture, unlike other industries where women were viewed as temporary workers, women’s employment did not end with the war. Instead, the expansion of agriculture and a steady decrease in the number of male farmworkers combined to cause the industry to hire more women in the postwar years...

Words: 36604 - Pages: 147