StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Online Predators and Technological Advances - Essay Example

Cite this document
Summary
From the paper "Online Predators and Technological Advances " it is clear that the state of the world in terms of technology is changing. Technological advances are moving too fast for the slow pace of the law to fully catch up, or address the problem of online predators. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.2% of users find it useful
Online Predators and Technological Advances
Read Text Preview

Extract of sample "Online Predators and Technological Advances"

Online Predators Online Predators The growth and development of technology has enabled the connection of people throughout the world. In the field of engineering, information technology is a branch that has come up to ensure information is retrieved and maintained. It is also responsible for the transmission of information between many groups. The manipulation of data is also done through information technology. This is because, there are experts who are capable of ensuring data is altered to suit the various systems available. However, the advancement in technological systems has had its share of advantages, as well as disadvantages. The advantages outweigh the disadvantages; that is probably why individuals choose to overlook the problems associated with information technology (Henderson, 2005). This paper will examine one ethical issue that faces the information technology field, and if the problem can be rectified. All fields, in the world today, are faced with challenges that come with their territory. These problems arise as a result of negligence, or malpractice among members of the fields involved. Security among many computer-based information systems is questionable, but many individuals consider the field as the future of the modern world. The world cannot find a way to operate in modern time without these systems. If there is a failure in the controlling systems, the world might come to a standstill. However, the recent cases of insecurity that arise from information systems have had many folks question their role in the field of engineering (Henderson, 2005). People of certain ages, sex, race, or religion are being targeted, and it is causing unrest among individuals. The internet creates an avenue for various activities to take place. People responsible for monitoring the activities on the internet do not have control over what transpires over the internet. It is through this channel that many individuals take the time to find out about other individuals. Privacy contracts are being broken through professional hackers, and the information sold to the highest bidder. Online predators are among the most dangerous individuals of the technological era. They use this advancement in technology to ensure they find out about people they are targeting. The world has to face the fact that; everything is technological (Henderson, 2005). Everything is saved or computerised to save on time and manpower. The problem with this is the use of such information to satisfy the needs of predators. Predators come in many forms. Individuals are preying on other folks, and that is the order by which many live by, in today’s world. Individuals meant to serve and protect the interests of the information systems are taking advantage of the situation. They now prowl and look for ways on how to benefit through the IT field on innocent individuals. Online predators can choose to be whomever they want. The anonymity provided by the computer systems allows them to do this. They have mastered the art of manipulation that captures their prey unaware. They dwell on the unawareness of their victims to make a move on the technologically savvy environment that everyone lives in today (Sullivan, 2008). Many at times, individuals are driven to the internet because of personal issues in their lives. Online predators look for such vulnerabilities, and make a move on their victims by offering them a way out of their personal struggles. They offer well thought-of solutions to these problems creating a relationship with their victims. Friendship and trust is created among the individuals. This is without the victim’s knowledge of what the perpetrator is capable of doing after the development of such a relationship. The young generation is at a higher risk of online predators than the older generation. This is because, they are more interested in the way and manner of technology than their parents or guardians (Sullivan, 2008). This then makes them more susceptible to predators. Issues surrounding young people involve their parents and teachers most of the time. It is these issues that predators have a solution for, and offer misguided advice to the young people. By playing into the adolescent mind of a young individual, they are looking for an avenue to be a part of their victim’s life. The disregard for safety that many young folks have in modern day is alarming. It is this disregard that predators look for, in order to find out about their would-be victims. The internet is an international network far beyond the reach of any government’s jurisdiction (Sullivan, 2008). It is, therefore, next to impossible to curtail the use or abuse of the internet. Online predators thrive on the little information provided by their victims. The naivety about the internet and sex is what pushes many young people to do what they do in some of the online systems. The pressure of becoming more than what they are pushes them to do drastic things. The problem with rushing to grow up is that one might be left with scars that may not be easily erased. It is this fear and malice that predators thrive on and ensure they inflict much of it as possible. It is a menace that has had many lobby groups in arms over what is not being done to protect the young generation. The trend is continuing as predators are getting bolder, and their techniques changing (Freedman, 2011). Most of the individuals who do this are the people intended to serve and protect the public interests when it comes to information systems. They break the ethical codes of conduct they swore to uphold when taking the job as information experts or managers. They take this as an avenue to fulfil their desires through the systems they are meant to serve. The integrity of such individuals in their personal lives is questioned because of what they do in their working environment. They are not out to serve the people. They are out to cash in on an opportunity to prey on innocent people, and their vulnerable nature. Measures are being put in place to ensure that predators are kept at bay. One of the ways this is being done is through parental control, and education of young individuals (Freedman, 2011). Emphasis is being placed on the issue of divulging personal information to the internet for friends or anybody else. In conclusion, the state of the world in terms of technology is changing. Technological advances are moving too fast for the slow pace of the law to fully catch up, or address the problem of online predators. It is a problem that, as a technologically savvy society, needs to get everyone involved (Freedman, 2011). It is not right trying to look the other way hoping that the problem will go away on its own. It is up to individuals to take a stand and do something about information technology, its development, and its use. References Freedman, J. (2011). Online safety. Oxford: Oxford University Press. Henderson, H. (2005). Internet predators. London: Sage Publishers. Sullivan, M. (2008). Online predators. New York: Macmillan Publishers. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Ethics as it pertains to Information Technology Essay”, n.d.)
Ethics as it pertains to Information Technology Essay. Retrieved from https://studentshare.org/information-technology/1613278-ethics-as-it-pertains-to-information-technology
(Ethics As It Pertains to Information Technology Essay)
Ethics As It Pertains to Information Technology Essay. https://studentshare.org/information-technology/1613278-ethics-as-it-pertains-to-information-technology.
“Ethics As It Pertains to Information Technology Essay”, n.d. https://studentshare.org/information-technology/1613278-ethics-as-it-pertains-to-information-technology.
  • Cited: 0 times

CHECK THESE SAMPLES OF Online Predators and Technological Advances

Risk Management at Hitachi Construction Machinery Pty Ltd

With the technological revolution in the mining sector taking tremendous advances, the unit provides up-to-date equipment and customer support on the use of such.... Tailored communication among all the subsidiary outlets enables it to note changes and advances in the industry before matters get out of hand....
5 Pages (1250 words) Essay

Information Privacy in the Digital Age

Since the birth of the digital age, various technological advances have been developed, particularly the creation of the Internet.... This paper "Information Privacy in the Digital Age" investigates the measures to protect information privacy and intellectual property rights using the examples of famous companies....
9 Pages (2250 words) Term Paper

Florida Sex Offenders

Amendments along the course of American law history have been well researched, systematized, and have yielded better results in curbing this menace by manual as well as technological means.... The author of "Florida Sex Offenders: Regulations and Constitutional Challenges" paper examines the state regulations specific to the sex offender, procedural guidelines and implementation of the registration/publication program, penalties for noncompliance, constitutional challenges, and concerns....
7 Pages (1750 words) Coursework

Cyber Sex Crimes and the Law

Complicated, modern societies and the invention of mass-communication tools, such as the mobile device and Internet technologies, are allowing cyber predators to invade a broader realm of the social population.... A variety of different social and networking websites also provide ample opportunities for sexual predators to post and download video content in which children are being exploited.... Crimes of a sexual nature which occur in the online environment happen every day, taking the form of child pornography, youth exploitation, and the generic online predator looking for sexual victims of all ages and demographics....
14 Pages (3500 words) Research Paper

Food Sustainability the Environmental Impact of Modern Fishing Technology and Its Consequences

technological inventions in the fishing industry, in recent years, have brought about a significant change in commercial fishing in terms of rising in economic profits, reduction in overall costs, increase in efficiency of catching target species, as well as other value-added benefits....
8 Pages (2000 words) Case Study

The Educational Use of Technology

For example, the average child in the age group of 8 to 18 uses technological gadgets.... nother article on this topic, 'Kids and Electronics,' presents research on children who spend excessive time on video games and other such technological entertainment.... Thus, they use it to play online games, join social networking websites, and other unproductive activities.... Rosen at California State University have also conducted research on this matter and find that this multitasking habit of 16 to 18 year old can include up to seven activities, such as texting, using Facebook, and watching television, and chatting with friends online....
42 Pages (10500 words) Research Paper

Major Synergies and Other Sources of Value Associated with the Mergers

The merger will combine Time's Warner's wide range of excellent media, news brands and entertainment America online's technologically advanced broadband delivery services.... America online will provide the new company with a wide range of internet franchises, plus worldwide consumer brands, infrastructure and technology.... American online, on the other hand, is well developed technologically and through e-marketing, the company will be able to reach a wider number of customers throughout the world....
9 Pages (2250 words) Assignment

Ways of Protecting Children from Being Abused on the Internet

The World Wide Web is a gigantic technological breakthrough, and its presence extols magnanimous benefits to all of society.... This research "Ways of Protecting Children from Being Abused on the Internet" will explore the multiple areas of child susceptibility to potential predatory activity and identify those who are most vulnerable and offer effective alternatives in mitigating the effects of predators.... he reality of the internet's harmful effects has prompted parents, caretakers, social service agencies, and law enforcement, to become concerned and alerted to those hazards which an unsuspecting child might encounter while online....
16 Pages (4000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us