Search icone
Search and publish your papers
Our Guarantee
We guarantee quality.
Find out more!

Criminal justice trends evaluation

Or download with : a doc exchange

About the author

area coordinator
Level
General public
Study
administrat...
School/University
university...

About the document

Ashley h.
Published date
Language
documents in English
Format
Word
Type
case study
Pages
4 pages
Level
General public
Accessed
0 times
Validated by
Committee Oboolo.com
0 Comment
Rate this document
  1. Internet crimes
  2. Cyber bullying and the devastation it bares
  3. Forgotten safety
  4. How can we be protected?
  5. Can the law protect us?
  6. Closing arguments

E-scams, child pornography, identity theft, cyber stalking and bullying, spamming, Malware, fraud, and computer hacking are types of internet crimes. These crimes are certainly on the rise. The general public relies heavily on technology, resorting to pen and paper is just so primitive; all of our information is uploaded, downloaded, and saved on computer systems. Most work is done with the use of computers; when the computers go down is compromises the work itself because employees were simply not trained to handle a situation of such decaying fortitude.

In January of 2010, a story made national headlines as a 15 year old girl named Phoebe Prince hung herself as a direct result of cyber bullying she endured. Phoebe Prince was a very beautiful young high school Sophomore. What lit the match for the ?Mean girls of Hadley High School'? Phoebe Prince's crime against her fellow female schoolmates: ?briefly dating a popular senior football player in her first freshman weeks at the school? (Kennedy, 2010) Her punishment for being a traitor was constant hazing in the school hallways, on social networking sites such as: Facebook, Craigslist, Twitter, and Formspring, and one girl went as fair as throwing a unopened can of Red Bull at Prince. The worsening torment became too much for Prince and on January 24, 2010 she ended up taking her own life. The tormentors did not stop there, [h]er tormentors posted vicious comments on the dead girl's Facebook memorial page? (Kennedy, 2010).

[...] Lastly, as parents we must also remind our children to be open about cyber bullying. schoolyard bullies beat you up and then go home, [but] [t]he cyberbullies beat you up at home, at grandma's house, whereever [sic] you're connected to technology? (De Nies, Donaldson-James, and Netter, 2010) You as a parent know you child more than anyone does, look for changes in mood or behavior more than just the normal teenage blues. of the cyberbullies are ?mean girls' that target young teenagers through e-mail and social media sites. [...]


[...] Most secure websites ask if you would like to save your information, such as your log in or you password, if using a public computer opt out of saving your information. Do not open any suspicious emails, links, or downloads. These emails, links, and downloads can contain computer viruses and Malware which can be very harmful to your computer. Malware can also steal your personal information which aids in fraud. If you believe you have come across a suspicious link, email, or download, you can report this information to the IC3 website at the following web address: http://www.ic3.gov/default.aspx. [...]


[...] These crimes are certainly on the rise. The general public relies heavily on technology, resorting to pen and paper is just so primitive; all of our information is uploaded, downloaded, and saved on computer systems. Most work is done with the use of computers; when the computers go down is compromises the work itself because employees were simply not trained to handle a situation of such decaying fortitude. Cyber Bullying And The Devastation It Bares In January of 2010, a story made national headlines as a 15 year old girl named Phoebe Prince hung herself as a direct result of cyber bullying she endured. [...]


[...] Is this justice bittersweet for Prince? Or is it a plea for parents to further monitor their children's internet usage? The entire world logged in; we are checking our email, updating our statuses, and sending Tweets. We are purchasing products and goods over the internet, as it is a convent way to shop. It is true you can find exactly what you are looking for and then some on the internet; and that is exactly what criminals and internet predators are hoping for. [...]

Similar documents you may be interested in reading.

Grant Application Report

 Social studies   |  Educational studies   |  Case study   |  06/19/2014   |   .doc   |   3 pages

Top sold for administrative law

An unmanageable case-management quandary

 Law & contracts   |  Administrative   |  Presentation   |  09/04/2013   |   .doc   |   3 pages

Case study: Officer Robert Barton paper

 Law & contracts   |  Administrative   |  Case study   |  08/28/2013   |   .doc   |   2 pages