Tuesday, April 23, 2019

Lagal and Illegal Access to Personal Information Online Essay

Lagal and Illegal Access to Personal Information Online - Essay ExampleWhere the reckoner era has devised numerous ways to work more quickly, efficiently, professionally and resourcefully, it has brought with it what we call cyber-crime -- misusing other peoples information without their permission and knowledge. The topic to be discussed here is about the risks and hazards of information being misused oer the internet. The worst part about cyber-crime is that it is much easier to escape from it without revealing identity or improvising a off identity. The reason for it is, of course, the resourcefulness of the internet and the fact that it is away from any kind of physical presence. Moreover, it is very well-fixed to replicate data on the internet to get involved in different kinds of crimes. With the increasing technical trends and movement towards cyber space so rapidly, it is inevitable that soon the cyber world will be surveyt with a split set of rules and regulation, laws and globalization. It is not long before divisions within the cyber space will be dealt like a separate state just like physically existing country (Wall, 2007, p.10). What is needed here is that we deal with the dark side of moving towards technology in a way that we are safe from its harmful effects in the long run, that most people fail to realize at the moment. Thesis rehearsal An analysis of the reasons of internet crime along with its consequence leads to a technological challenge -- whether the harmful consequences outstrip the benefits of internet and what should be done to reduce crime involving unethical practices of hacking, identity thievery, crime in e-commerce and kind networking. Categories of Cyber Crime Cyber Crime is divided into many categories. These include spam, availability of obscene content, threats, misinformation, cyber terrorism and fraud. With such a huge variety of crime going on the internet, it be cuts very easy to exploit the users (Brenner, 2010 , p.8). The users also come into several categories, from amateurs to professionals and naive people who do not realize the harmful implications that the usage of internet cleverness cause. The greatest misuse of internet is taking place in the following domains E-commerce Social networking Identity theft Hacking From amongst the above given domains, E-Commerce and Social Networking will be discussed in greater depth. E-Commerce is defines as exchange of hots and run over the internet involving Business transactions, buying and selling as well as the World unspecific Web (Bushry, 2005, p.3). Social Networking refers to online networks that allow people to communicate over the internet and build social dealings and broad networks ( Stenzel & Nesdahl, 2012 p.19). Identity Theft is the stealing of soul elses identity and pretending to be someone else, impersonating to be another person or using their identity such as their name or credentials (Boyer, 2008, p.7). Hacking means to identify weaknesses in other networks and take over their networks and later on, misuse them (Brenner, 2010, p.11). E-Commerce electronic Commerce as defined above is a rapidly growing concept that allows exchange of good

No comments:

Post a Comment