Sunday, June 2, 2019
Essay --
IntroductionAlong with the fast developments and various applications of the internet comes the improvement of peoples living standard. Undoubtedly the emergent new technology is playing such a significant role in fields like promoting interpersonal interactions, driving global collaborations and increasing the lands productivity, that our society may not stay as functional as it is now without the existence of the internet. Nevertheless, the internet, due to its complicated form of communications and the omit of either moral or legal control, has also brought about an unprecedented form of deviances and crimes including hacking, online fraud, terrorism, and so forth (Jaishankar, 2011). Among all types of controversial cyber activities, considering the distinct nature of criminals and different motivations, some of them may not have huge negative social impact while others can result in massive loss for both(prenominal) individuals and society. On all accounts, it is indeed of g reat importance to study internet abuse so as to construct a safer community with higher stableness for the existence and prosperity of human-beings.To examine online deviances and crimes objectively, both theoretical supports and a large amount of data are required. As for hacking part, the grounded theory is applied so as to systematically and comparatively analyze the similarities and differences between good hackers and bad hackers. When it comes to discussion on online fraud, the breeding ground of cyber fraud, Nigeria, is taken as a typical drill for depiction and explanation. In the specific region where the younger generation constructs a morally and legally deviant subculture, the prospect of the state is worth concerning. Organized in a progress... ...me. New York, NY Basic Books.Powell, B., Carsen, J., Crumley, B., Walt, V., Gibson, H., & Gerlin, A. (2005, September 26). Generation Jihad. Time, 166, 5659. Retrieved from http//www.time.com/time/magazine/article/0,9171,11 09334-1,00.htmlTaylor, P. A. (1999). Hackers Crime and the digital sublime. New York, NY Routledge.Weimann, G. (2004b). www.terror.net How modern terrorism uses the Internet. majuscule DC United States Institute of Peace. Tsfati, Y., & Weimann, G. (2002). www.terrorism.com Terror on the Internet. Studies in mesh & Terrorism, 25, 317332.Whine, M. (1999). CyberspaceA new medium for communication, command, and control by extremists. Studies in Conflict & Terrorism, 22, 231246.Zetter, K. (2008). Israeli hacker The Analyzer suspected of hacking again. Wired. Retrieved from http//www.wired.com/threatlevel/2008/09/the-analyzer-su
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.