Preview

Cyber Predators

Better Essays
Open Document
Open Document
1385 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Predators
Fighting Against the New Age of Stalkers Imagine being a mother or father who is at home and suddenly the phone rings. It’s the police, they believe your son or daughter has been chatting with an internet predator. He/She went to meet him/her and was kidnapped. The police are tracking the suspect, but have no idea if their children is still alive. In today’s sick and twisted world these occurrences are becoming more and more frequent. Some parents and children don’t realize that with the power of the internet in millions of households, comes great responsibility. These websites have become a playground for cyber stalkers. Cyber predators can find easy prey on today’s internet, but with kids gaining more internet knowledge, computer security devices, and crime task units progress can start being made in stopping this ongoing problem.  One of the best ways to keep children safe is by parents sitting down with their kids and informing them with some safety precautions to protect themselves and to not let their information get into the wrong hands. Each day there are nearly 750 million daily readers and authorities believe that anywhere between 500,000 to 750,000 are cyber stalkers (Zandt 1). Two of the most dangerous places where these cyber predators lurk are blog diaries and social networks(Zandt 1). In most cases the assailant tends to be male, but women are often their accomplice. These cyber predators are not easy to spot. They often are people with a steady incomes and even a college education. They own computer equipment and have knowledge on how the internet and these networks work(Obringer 1). Parents “…need to teach children that the Internet is like a very large city. There are lots of good things, some bad things, and a few very bad people.”(Miller 67). Cyber stalkers usually start by using techniques to help them find a single target. They will search through profiles or even create their own profile with the intent to lure


Cited: Abbott Greg, Texas Attorney General and Office of the Attorney General..”Internet Child Predators.” FDCH Congressive Testimony. Mas - Ultra School Edition. 14 February 2007. http://search.ebscohost.com. Newell High school Library Kornblum, Janet. “Online predators less prevalent.” USA Today. Mas Ultra - School Edition. 14 February 2007.http://search.ebscohost.com. Newell High school Library Obringer, Ann. “Cyber Safety > Cyber Predators” (2006) February 14, 2007. http://www.wright.edu/ ~obringer.5/predators/prdtrs.htm Newell High school Library Miller, Michael J. “Warning Children About Online Dangers.” PC Magazine (2006): 67-67. Mas Ultra - School Edition. 14 February 2007. http://search.ebscohost.com, Newell High school Library By: Garrett Bruner Zandt, Clint V. “Beware of cyber stalkers.” (2006) February 14, 2007 http://www.msnbc.msn.com Newell High school Library

You May Also Find These Documents Helpful

  • Good Essays

    Harlen Coben, in an essay in The New York Times, “The Undercover Parent” (March 16, 2008) asserts that parents should install spyware on their children’s computers in order to protect children from the dangers of the internet. Coben claims that because what a child does on the internet is public, as a parent you have the right to view it as well, so we should be monitoring them in this area as well. However, Coben does admit that this is indeed an invasion of privacy, but that in order to be a good parent we must do so to protect our children from pedophiles and bullies that lure on the internet. Coben attempts to educate parents about the dangers the internet poses to children, and how spyware can be an effective solution to our need to protect our kids.…

    • 511 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This article is about the interviewing of young victims of cyber abuse by law enforcement and legal personnel. I found the article to be somewhat brief, but it is valuable as it is dense with information on the psychological side of “how” and “why” children and adolescents fall victim to internet predators. I liked this particular article because it differed from many other articles in that it explained the importance of how an interview should be conducted, and in explaining that importance it helps the reader grasp a better understanding of the psychological impact of the victims. I believe the psychological awareness and facts…

    • 1379 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Technology has advanced greatly in the recent years. The internet has made it is easy for people to get any information they want, which in return presents danger to minors. This advance in technology has opened new issues that need to be addressed. Children depend on adults to protect them from any harm and as a result government passed acts to prevent child abuse on the internet. The two acts being discussed in this paper are the Children’s Internet Protection Act of 2000 and the Children’s Online Protection Act (COPPA) of 1998.…

    • 593 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    One of the main risks of using the internet is that children may be exposed to inappropriate things such as pornography or other illegal or age inappropriate information that encourages activities that are dangerous. There is also the risk of physical danger. This can arise when people use the internet to make contact with children and young people with the intention of developing a relationship which they can progress to sexual activity. This is known as ‘grooming’. Paedophiles will often do this by posing as a young person with similar interests as the intended victim.…

    • 329 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Although the internet can be a valuable tool both educationally and socially, there are some serious risks associated with using the internet and other technologies. As in the real world, children and young people are vulnerable and may knowingly or unknowingly expose themselves to danger when using the internet, mobile phones and other technologies.…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In this article Adams discusses how to recognize and stop cyber bulling. This article is all about taking a stand against cyber bullying and it contains detailed but not lengthy information to show you how to stop it. From recognizing the signs to getting parents involved the author argues on the importance and the information on how to go through it. This research is helpful to me because it shows that there is multiple ways to stop cyber bullying, it also helps by understanding the signs of cyber bullying and getting everyone involved in helping out. The…

    • 999 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    A large portion of Australian children have mobile phones with internet which makes it as simple as a tap, or click of a button to become a victim, or cyberbully another. Many of these children are at a young age, in years as low as year three. The accessibility of these sites are far too easy to access therefor more kids at younger ages that may not no important skills and information about cyber safety may fall into the trap of being a victim of…

    • 673 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Smith, M. S. (2001). Internet - Protecting Children from Unsuitable Material and Sexual Predators: Overview and Pending Legislation: RS20036. Congressional Research Service: Report, 1.…

    • 794 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    cyber predator

    • 329 Words
    • 1 Page

    As much as the internet has made a positive impact in most people’s lives, it has also made it easier for cyber predators to prey on children without parents knowing. Social media like Facebook is also struggling with ways to better protect children from such threats. So what is a cyber predator? A cyber predator uses the internet to cultivate relationship with victims and look for the right time to take advantage of them in anyway.…

    • 329 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Growing Up Online

    • 561 Words
    • 3 Pages

    Teenagers who have grown up online know how to avoid predators. They are mostly using the internet to socialize with people from their school and when a random screen name messages them, asking them where they live they know it is not right and will not respond. However the kids today are faced with much deeper problems such as growing up to fast and self esteem issues. Take Autumn Edows for example. This was a girl who did not fit in in real life and felt like an outcast. However at age 14 she posted provocative pictures of herself on the internet and created a mass cult fallowing which boosted herself esteem dramatically. She admits that she became addicted to the internet just as so many teens admit today, and when her parents made her delete her life online she was devastated.…

    • 561 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The Internet is the perfect stalking device due to our lack of privacy. Today, we have over 100 social networking sites, and 56% of the world’s population has admitted to using at least one amongst the many. In a seven-year Carnegie Mellon University study of Facebook shows that when changes implemented by Facebook, such as modifications to its user interface and default settings, led to a significant increase in the public sharing of various types of personal information. With the personal information of more than half of the world’s population readily available online, it is undeniable that stalkers view the Internet as their resource haven. Not only is one’s privacy breached online, but safety is also in the danger zone for some extreme cases. There are known examples of stalkers communicating with their victims in online social sites or chat rooms, luring them out and then kidnap or murder them. A Christopher Dannevig of Australia has pleaded guilty to murdering 18-year old TAFE student Nona Belomesoff after using Facebook to exploit the student’s love for animals and letting her believe he could give her work with animal rescue group WIRES. Such exploitation of personal information and easy access to individuals not only reveals our lack of privacy, but the element of danger is there as well.…

    • 892 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Pros and Cons of Internet

    • 2299 Words
    • 10 Pages

    Payne, January W. "What to Do if Your Child Is Bullied Online." U.S. News & World…

    • 2299 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    “Child pornography is illegal under federal laws and laws in all 50 states; however, researchers and law enforcement officials believe this crime is increasing and the increase is related to growing Internet use” (What is Child Pornography, 2008). The United States Department of Justice created a regional task force to provide assistance to state and local law enforcement officials in combating crimes against children. They have also provided a number of resources to decrease the amount of child pornography, such as funding for the National Center for Missing and Exploited Children’s CyberTipline, www.cybertipline.com. This website allows the public to contact law enforcement with any information on child pornography and exploitation (CyberTipline, 2008).…

    • 1379 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Dangers of cyber world

    • 762 Words
    • 4 Pages

    Hopkins, Chris. “Children on the Internet Are Prey for Cyber Predators.” At Issue: Cyber Predators. 2012. Web. 11 Nov. 2013.…

    • 762 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Also, the effect of online predators on network sites is affecting numerous amounts of people. Teens as well as adults are affected by this matter. A lot of people are revealing an excessive amount of personal information on these sites. This makes the predator’s mission even more simple to fulfill. These sites will even share a person’s current location. This information will make it easier for predators to seek out their victims. Many predators disguise their true identity in order to lure someone into meeting with them, which on numerous occasions has led to kidnapping, rape, or murder. To minimize the possibility of one of these situations taking place, individuals will need to be cautious of the personal information that they reveal on these sites and know who they are truly communicating with.…

    • 721 Words
    • 3 Pages
    Good Essays