The Pros And Cons Of Cyber Exploitation

1000 Words2 Pages

Introduction
The internet and other telecommunications technologies are encouraging advances in virtually every feature of society and all over the world. For instance, promoting commerce, improving education and health care, fostering participating in democracy in the United States and abroad, and facilitating communications among family and friends, whether in the neighborhood or around the globe. Regrettably, may of the attributes of this technology, low cost, ease of use, and anonymous nature, among others, make it an appealing medium for fraudulent scams, child sexual exploitation, and increasingly, a new concern referred as cyberstalking.
Cyber Exploitation and Laws
Cyber exploitation is defined as the non-consensual distribution and publication of intimate photos or videos. The materials are usually stolen by ex-lovers, ex-spouses, associates, or complete strangers through hacking, theft of a cell phone or computer, mostly during a computer repair, a false personal ad, or other means (Fritsch et al, 2015). The stolen photos or videos are then posted on websites or sold for profit to humiliate, damage, harass, physically endanger, or extort the victim. Also, the perpetrators usually post other identifying information with the videos and images, including the victim’s name, links to social …show more content…

Stalking involves harassing or threatening behavior that an individual engages in repeatedly, such as following a person, appearing at a person’s home or place of business, making harassing phone calls, leaving written messages/vandalizing a person’s property (Fritsch et al, 2015). Mainly stalking laws require that the perpetrator make a credible threat of violence against the victim, others include threats against the victim’s immediate family, and require only that the alleged stalker’s course of behavior comprise an implied

More about The Pros And Cons Of Cyber Exploitation

Open Document