StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Predators 101: We are Watching you - Thesis Example

Cite this document
Summary
According to Colwin & Lorell (2010), the use of computers is spreading within the society at alarming rates since they are hugely beneficial; however, criminals utilize such gadgets to propagate terror. Initially, safeguarding the society from the actions of criminals was a…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.1% of users find it useful
Predators 101: We are Watching you
Read Text Preview

Extract of sample "Predators 101: We are Watching you"

Predators: “We are Watching You” Task: Monitoring Information Systems According to Colwin & Lorell , the use of computers is spreading within the society at alarming rates since they are hugely beneficial; however, criminals utilize such gadgets to propagate terror. Initially, safeguarding the society from the actions of criminals was a simple process; however, with the explosion of technology, the approach is proving to be extremely difficult (Colwin & Lorell, 2010). It is worth affirming that the unregulated nature of computers and the internet offers a haven for criminals due to the absence of binding internet regulations.

This condition has fueled internet crimes making the society vulnerable to the unconstructive impacts of the system. Consequently, the FBI acknowledges that the cyberspace is a potential avenue for criminal practices propagated by spies, hackers and other actors participating in malicious deals (Martin & Rice, 2011). It is clear that, with the risks posed by such persons, the subsequent establishment of a secure setting that is essential for the society poses challenges to stakeholders; thus, making the formulation of strategic policies that curb this trend mandatory (Jain, 2005).

Coincidently, Dunham (2002) indicates that negligence on safety issues, especially when they affect technology, is dangerous. The need for monitoring schemes is apparent when an individual considers the trouble arising from the crimes listed. However, a significant impact is apparent when the process enhances crimes like terrorism. Consequently, Greisiger (2003) notes that the internet allows terrorists to draft plans, accrue funds, distribute propaganda and communicate safely. Indeed, instances when technology has provided excellent routes for effecting malicious activities still exist.

As such, Martin & Rice (2011) observe that automation of crimes poses challenges in the fight against terrorism. A threat associated with virtual technology is apparent during information wars that lead to destruction of systems due to attacks from viruses and worms (Dunham, 2002).Many policy makers indicate that terrorism is a critical concern since it is unethical and intolerable. Victims of these crimes experience physical and psychological traumas. Furthermore, studies indicate that a single child molester will typically corrupt about seventy children during his lifetime (Greisiger, 2003).

These molesters can easily trap children; however, arresting them is difficult since they employ encryption approaches in concealing their illegitimate actions. Furthermore, child pornography is a practice that is rapidly penetrating the society as apparent when uncensored images are posted in the internet; hence, this may easily influence children. Effects of these materials on young minds are detrimental. According to Dunham (2002), child molesters comfortably utilize the internet in marketing their activities and organizing exploitative meetings with their customers (Dunham, 2002).

In the event that systems remain unmonitored, the evils will spread while the shareholders continue reaping benefits at the detriment of the society. Conclusively, adopting relevant policies and monitoring approaches in IT is fundamental in safeguarding the society. Failure to achieve such a target means that the community members will significantly suffer since societal processes will be affected. However, the topic is still unexplored since studies have not explained the possibilities and consequences of formulating an effective model that addresses the mentioned constraints.

Therefore, this study analyzes the usefulness of embracing effective monitoring models. ReferencesColwin, M. & Lorell, E. F. (2010). Sex, Lies, and Videotape - Cyber Liability Issues in a Digital World. FDCC Quarterly, 61(1), 26-37.Dunham, G. S. (2002). Carnivore, the FBIs e-mail surveillance system: Devouring criminals, not privacy. Federal Communications Law Journal, 54(3), 543-566. Retrieved from http://search.proquest.com/docview/213145201?accountid=45049Greisiger, M. (2003). Cyber safety: The latest tool in the risk management arsenal - cyber insurance.

Bank News, 103(10), 26-28. Retrieved from http://search.proquest.com/docview/205918932?accountid=45049Jain, A. (2005). Cyber crime: Issues threats and management. New Delhi: Isha Books.Martin, N. & Rice, J. (2011). Cybercrime: Understanding and addressing the concerns of stakeholders. Computers & Security, 30(8), 803-814. doi:10.1016/j.cose.2011.07.003

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Predators 101: We are Watching you Thesis Example | Topics and Well Written Essays - 500 words”, n.d.)
Predators 101: We are Watching you Thesis Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1595792-predators-101-we-are-watching-you
(Predators 101: We Are Watching You Thesis Example | Topics and Well Written Essays - 500 Words)
Predators 101: We Are Watching You Thesis Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1595792-predators-101-we-are-watching-you.
“Predators 101: We Are Watching You Thesis Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1595792-predators-101-we-are-watching-you.
  • Cited: 0 times

CHECK THESE SAMPLES OF Predators 101: We are Watching you

Aspects Regarding the Attitudes and Impact of Different Media

has been transforming into a guiding hand for the society; one that sets the trends and tells the latest fashion, that tells you how to behave with elders, peers, young ones and fellows, which dictate your overall behaviour (Slater).... The sophisticated video games of present day require players to pay constant attention to the game and actively live the characters/roles they are playing in the game, rather than passively watching a movie....
2 Pages (500 words) Essay

Business Performance of Metcash

Question 1: 1) Metcash Limited is a company that operates in various industries and is primarily an in-store retailer.... The following are main business activities of Metcash Ltd: IGA Distribution: Metcash Ltd is involved in the distribution of IGA branded and non branded products.... hellip; IGA Fresh: Metcash also provides fresh food to end consumers through its various retail outlets including meat, vegetables and fruits....
6 Pages (1500 words) Essay

John Brown: Terrorist or Prophetic Hero

Instructor John Brown: Terrorist or Prophetic Hero?... To some, he was insane, a monster, a killer, a fanatic, and a terrorist!... To others, he was a slave rescuer, a willing victim of human freedoms, defender and agitator of human rights, a humanitarian, and a hero.... hellip; Over two hundred years following his birth, people perceive John Brown according to different inclinations with his legacy marching on while his memory fascinates many, haunts others, and troubles many other people....
3 Pages (750 words) Essay

Discuss the barriers faced by firms wishing to enter an oligopolistic market structure

Though there are other potential barriers to market entry in the oligopoly, pricing, intellectual property and patent protections, and the correlation between product/service differentiation and consumer demand pose the most significant risks to entry.... hellip; An oligopoly is best defined as a market structure in which there are is small volume of sellers that dominate the industry (Hirschey 2009; Hirschey and Pappas 1995)....
6 Pages (1500 words) Essay

The Consumer Attitude Towards Reality TV Shows

I tried watching programs such as survivors and Temptation Island, but they just are not appealing to me, which I think has a lot to do with the fact that I see those shows as acting and nothing else”.... Table of Contents Introduction 2 Qualitative Analysis 2 Quantitative Analysis 6 Conclusion and Recommendation 22 References 23 Introduction The taste and preference of the global consumers are changing at a robust rate (Glynn, 2009; Zickmund, Ward, Lowe, Winzar and Babin, 2011)....
11 Pages (2750 words) Assignment

The Lord of the Rings

Of course different opinions exist about the successfulness of this adaptation, but, nevertheless, it's obvious that it is worthy of watching and referring to.... The concerns about adapting the Lord of the Rings into film were so numerous.... The books were written in the first half of the 20th century, but until recently nobody had the courage to screen this saga....
13 Pages (3250 words) Essay

Keystone Species in an Ecosystem

hellip; For instance, large cats act as keystone predators in Neotropical forests.... Keystone predators sometimes are more effective within certain parts of their range.... Less strong predation by sea stars, whelks, and possibly other predators occurs in a wave-protected cove....
12 Pages (3000 words) Essay

Select writter

The hospitality industry includes a very broad category of fields which are accommodation (hostels, hotels and resorts), restaurants and bars (cafes, pubs, clubs and bars), transport and… Some rival companies have even deeper edges since they have higher budgetary access.... This is the part where hospitality is at its This paper is narrowing the hospitality industry to discuss the hotel industry alone (hostels, hotels and resorts)....
4 Pages (1000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us