Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Background of the study about cyberbullying
Social media effects on the youth
Social media effects on the youth
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Background of the study about cyberbullying
Vulnerability to Internet Predator The publicity about online predators that prey on naive and inexperienced young children using trickery and violence is largely inaccurate. Internet sex crimes involving adults and juveniles more often fit a model of statutory rape which is adult offenders who meet, develop relationships with, and openly seduce underage teenagers than a model of forcible sexual assault or pedophilic child molesting (Wolak et. al., 2008). However, prepubescent children are even less vulnerable because their internet use is generally more supervised by the parents and guardian. In addition, they use the internet less for communication and are for developmental reasons, less interested in sex and relationships than adolescents. Internet users at the ages of 12 to 13 years generally understand the social complexities of the internet at the same levels as adults. As they get older and gain experience online, they engage in more complexes and interactive internet use puts them at greater risk than younger, less experienced youth who use the Internet in simpler, less interactive ways ((Livingstone & Sonia,2006). Among youth ages 12- to 17-years-old, it was those ages 15 to 17 that were most prone to take risks involving privacy and contact with unknown people. On the other hand, the target who are the most vulnerable to online victimization that have histories of sexual abuse, sexual orientation concerns, and patterns of risk taking off- and online have minor risk in involved again because of the experienced (Jones & Jemmot, 2009) . According to Jones and Jemmot (2009) most victims are girls of all ages with the risk of family problem and this can happen at any age. Most reports suggest that the vulnerability begins in... ... middle of paper ... ...x Offender Registry, STOP SEX OFFENDERS ebook, Free Child ID, Registry News & More! (n.d.). Retrieved from http://www.stopsexoffenders.com/ Wooden , K., Webb, R., & Mitchell, J. (2012). A Profile of the Child Molester. Retrieved from www.childluresprevention.com/pdf/Profile-of-Molester.pdf? Wolak, J., Finkelhor, D., Mitchell, K. J., & Ybarra, M. L. (2008). Online “Predators” and their Victims: Myths, Realities and Implications for Prevention and Treatment. American Psychologist, 63. Retrieved from http://www.unh.edu/ccrc/pdf/Am%20Psy%202-08.pdf How Internet Predators Select Their Victims - Safer Internet. (n.d.). Retrieved December 23, 2013, from http://www.safer-internet.net/how-internet-predators-select-their-victims.html How to Stop Internet Predators | eHow. (n.d.). Retrieved December 23, 2013, from http://www.ehow.com/how_6534818_stop-internet-predators.html
Social networking sites leave opportunities for vulnerability, however, I don’t believe many youths are an easy target. Using ethos, pathos and logos individuals can create their own reality to relate to the internet world who they think are and how they wish to be seen. In mediated publics such as Facebook and Instagram, the user has complete control of his or her profile and is the only one who can allow content about his/herself to be shared. It is my personal belief that as technology has evolved many people have taken to fabricating some truths here and there and omitting details to give an ideal representation of who they are without incriminating themselves or leaving themselves vulnerable for mistreatment. The fantasy of what is or could be is more desirable than reality. In the past few years, privacy settings have been adapted to cover the growing technological advances to keep users safe from online predators.
3. Report of the Interagency Council on Sex Offender Treatment to the Senate Interim Committee on Health and Human Services and the Senate Committee on Criminal Justice, 1993
Howitt, D., & Sheldon, K. (2007). Sex offenders and the internet. Retrieved from http://books.google.com/books?id=-XO_wPs6a-gC&printsec=frontcover&source=gbs_ge_summary_r&cad=0#v=onepage&q&f=false, 60-61.
"The Family and Child Abuse Prevention CenterWelcome to Family and Child Abuse Prevention Center." The Family and Child Abuse Prevention CenterWelcome to Family and Child Abuse Prevention Center. Web. 24 Mar. 2014.
The micro-theory that can be associated to explain the case study and why child exploitation occurs online is the social learning theory. The social learning theory is built off of differential association with the idea that criminal behavior is learned from others (Moore, 270). However, social learning theory determines that individuals not only engage in criminal behavior when around people associated with similar behavior, but that the behavior is also justified (Moore, 270). The Internet and technology have made social learning for pedophiles and child exploiters easier due to the access and opportunities it allows.
In recent findings 75% of Europeans use the internet (Livingstone and Haddon, 2009) and 65% of the teenagers’ have a Face book or My Space account (Lenhart et al, 2008). Children find that having these accounts is a place for them to meet new people and have a feeling that they belong, and to expand their friendships, but it is also a place for pedophiles to attack especially because it is so easy to manipulate who, how and whey they want, this is where a parent needs to gain control and talk with their children about what can happen on these sties and watch for any warning signs that may appear example maybe their child is acting differently or they ask to meet someone that the parent has never heard about before, looking on computer and viewing what sites the child has entered are ways to catch these instances’ early. Research suggested that 25% of victims are boys who are gay or that are unsure of their sexuality and most of the offenders are
"Sweetie" was entered into a total of 19 chat rooms, in which she was propositioned to perform sexual acts by 20,172 adult men from 71 different countries, who had been informed of her age. Terre des Hommes' (2013) informal "sting" operation identified 1,000 online predators in just 10 weeks, and estimated there to be 750,000 predators online, at any given time (Terre des Hommes, 2013). No computer hacking or illegal methods were used to identify the perpetrators, which raises the question: why is child webcam sex tourism growing so rapidly if c...
Wolak, J., David, F., Mitchell, K. J., & Ybarra, M. L. (2008). Online "Predators" and Their Victims: Myths, Realities, and Implications for Prevention Treatment. American Psychologist, 63(2), 111-128. doi:10.1037/0003-066X.63.2.111
Wolak J., et al. (2009). Online “Predators” and Their Victims: Myths, Realities, and Implications for Prevention and Treatment. American Psychologist, 2008;63, 116-118
There is an on going debate in regards to the definition of child sexual abuse. This phrase has been used in many studies and has been discussed in a variety of disciplines including medicine, education, social work and the legal system. Amidst its widespread recognition, its definition continues to differ within these settings, making it difficult to determine what behaviors constitute the label of sexual abuse (Haugaard...
Certain individuals have a difficult time making new friends, either because they are shy, or just because society has deemed them to be “different” or “weird”. The Internet helps individuals overcome those barriers while socializing on the Internet. Most use social networking sites such as: Twitter, Facebook, and Tumblr. According to the supporters of social networking, these websites allow teenagers to socialize and make friends with peers they normally would not approach (Social Network Websites, n.d.). It seems their shyness melts away behind a computer screen and they are able to have any identity they want, and even find others with the same interests. On the other hand, it is argued that the Internet is dangerous. Sexual predators and pedophiles can join social networking sites too easily, and use websites to entice minors into meeting them in person. It is also argued that spending too much time on the Internet can stunt social growth (Social Network Websites, n.d.). The amount ...
A 14-year-old girl was chatting with a child predator on social media for a month before deciding to meet in the woods near the girls’ home. The sex predator, Jarred Workman was hiding in the girl’s closet for five days, raping her at night repeatedly. He was found by the little girl’s mother, when she was putting something in the girl’s closet. When he ran he dropped his wallet and phone, making it easier for authorities to locate him (Murdock). The victim’s story is not unique. Many young people are on social media and are unaware of the danger.
Large sums of individuals do not understand what cyber-stalking entails. In the past, stalking would take place using different procedures including finding a person’s house and watching them or following a person without being welcome. As time has passed, technology has grown at a rapid rate. The birth of the internet has caused many drastic changes to the world. Some have a very negative effect on society including cyber-stalking. Without the need to follow a person around, a sta...
Wolak, Janis, et al. "Online “predators” and their victims." Psychology of violence 1 (2010): 13-35. Web. 10 Nov. 2014 .
“People are very reluctant to talk about their private lives but then you go to the Internet and they’re much more open (Internet Quotes).” Paulo Coelho mentioned this on the topic of meeting strangers online. In a society so dependent on electronic communication, children are only accepted by making online connections. This means they will go to great lengths to have large numbers of people watching them on social media; adults tend to do the same. Children learn by observing our behavior. Acting as if a day without an online connection will ruin our civilization would corrupt the child’s mind, thus making them think the Internet is the most vital object. Of course, there are dangers when one allows a child onto the web. Without proper education on the dangers in the online world, children may fall into a trap and become potential victims. In order to have a well-rounded youth, parents must express healthy role modeling by teaching them how to identify dangerous interactions and carefully monitoring the web history to protect children from online threats.