Information Technology and Ethics/Cyber-Crimes II
Technology is an ever-growing part of children's lives. They spend more and more time either text messaging or on social networking sites. Because of this trend, bullies have moved from not only being in the classroom but also in the home. Technology such as social networking sites, Instant Messaging (IM), and text messaging since children tend use these devices extremely different from their parents. Cyber-bullying is the harassment of one minor to another via technology. Cyber bullies torments their victims by using social devices in the following ways.
- They may create fake profiles of their victims and post false, inappropriate information.
- Sending threatening or hurtful to their victims.
- Logging into their victims social networks and modifying them to include inappropriate content.
- Taking inappropriate pictures of their victims and then posting them on social websites and maybe the bully’s personal blog.
Cyber bullying has led to many cases to many cases of suicide the most notable cases are
What Should You Do?
The National Crime Prevention Council provides children and adults with a few simple steps to deal with cyber-bullying.
- Blocking communication with the cyberbully
- Deleting messages without reading them
- Talking to a friend about the bullying
- Reporting the problem to an Internet service provider or website moderator
Cyber-stalking is similar to cyber – bullying but there actions are more severe and involve adults. Stalkers gear unwanted threatening behavior towards the victim. Cyber stalkers may harm their victims in two ways, they will incite a group of people against the victim or they may harm the victim’s property and reputation. In order for a cyber-stalker to rally a group of unknown individuals against the victim, they must first portray themselves as victims. They claim the victim has done something to them or their families and must be punished .In order to harass their victims more, cyber stalkers may post the victim’s name, phone number and address on a social site. Their stories may inspire others to join in harassing the victim. Cyber stalkers may attack the victim’s computer using malicious software. They may also order embarrassing items in the name of the victim and have it delivered to their workplace.
What Should You Do?
- Contact the harasser Once (and only once),to let him/her know that their harassment is unwarranted and must cease immediately.
- Keep a record of all the cyberstalking evidence including emails and postings in either hard-copy or digital form.
- Report the incident(s) to your Internet Service Provider and consider changing ISPs to stop cyber-stalking.
- Close your current email account and open a new one without using your real name. Consider using email filters to block the known person from contacting them.
- Contact your local police to see what additional action can be taken.
- Contact your local FBI Computer Crimes Unit.
Recent technological advances have allowed people to create alter egos who may or may not represent who they are or who they want to become.In these games players may interact with each other, while completing other activities. For example in World of Warcraft players may play against other players or against the environment of the game.These games have become big money because players do not only pay to be apart of the game but they may also pay for special items that may be used in the game. What happens when a crime is committed in one of these virtual worlds? It sometimes depends on whether or not the crime could be traced.For example players who are caught trafficking stolen credit card numbers can be prosecuted in our world.There are crimes authorities are not sure what to do with such as the rape of an avatar in Second Life.