Basically, what you post online can be seen by anyone. I think everyone should be educated on internet risks and dangers of internet predators. When creating a social media account, information that is input is viewed by the public unless privacy settings are adjusted. Some information like your phone number, marital status, or birthday doesn’t show if adjusted. There are also computer hackers out there in cyberspace. Spyware may be installed on some public computers.
According to the United States Department of Justice: US Attorney’s Office, one of the biggest risk online is sharing information with people that you don’t personally know. You should avoid sharing information like your address, phone number, family members names, school names, drivers license number, insurance policy, credit/debit card numbers and bank accounts. Beware of posting photos from smart phones. Photo’s taken with these phones embed the GPS Coordinates in the photo, which allow users to get your location. Beware of opening emails from unknown people or sources. Clicking on these links or downloading attachments can infect your computer with a virus or subject you to fraud, malware, or a scam. Beware of meeting people in person that you have met on the internet. Some people are not honest about who they are, their age, or gender. Apply parent controls on your computer and smart phones to limit the internet to safe websites. Web cams can be high jacked and turned on remotely, this allows others to illegally listen and view others without their knowledge.
Gosselin, D.K (2010). Stalking and Homicide. Pearson Education, Inc. Heavy Hands: An Introduction to the Crimes of Family Violence (4th Ed)(pg. 303-304) Upper Saddle River, New Jersey: Prentice Hall
http://www.justice.gov/usao/gan/programs/internetsafety/ http://www.understandmedia.com/pdf/SJMLE-Vol1.pdf B. From obsession to confrontation what can be done? Stalking behaviors are typically the obsession of an individual to be near a person when that person does not return the affection. Stalking is not a crime in all 50 states; however, victims' early pleas for help are largely unanswered. As a stalking victim once said to me, "I told the police about the letters, emails, the notes on my car. Then I showed them the last note saying 'do I have to smack you down to let you know I'm there'. Smack me with what? A fist or the bumper of a van? I'm scared but they tell me, 'this proves nothing'. If I'm killed by this freak, will you testify so that my voice will finally be heard?" How can a stalking victim protect him/herself? Are there any early signs that an acquaintance might turn into a stalker?
A stalking victim can protect theriselves in many ways. Doreen Orion, author of I Know You Really Love Me, suggests that stalking victims must acknowledge being a target of this crime and take extra safety precauions (Orion, 1998). Some of the commonsense approaches she suggest for persons who suspect that they may be targeted by a stalker are:
Getting a dog or getting an alarm system to reduce the feeling of vulnerability.
Never give your address or telephone number out.
Document everything. Keep all voicemails, letters, gifts, etc.
If you think you are being followed while in the car, drive to the police station- never drive home or to a friend.
Never be afraid to blow the horn to attract attention if in danger.
Park in lit areas and lock doors.
Equip car with alarm.
An acquaintance stalker is when the stalker knows the victim casually. They may be co-workers or neighbors, or they may have a friendship (Gosselin, 2010, pg.306)
From experience, I know that there are early warning signs that an acquaintance might turn into an stalker. I think early signs would include turning an person down that is obsess with a man/woman; signs of jealously; unwanted gifts; obscene phone calls; damaging one’s property; threats are being made; and being resentful.
According to Gosselin (2010,pg. 305), The Secret Service provided the following findings about the histories and personal characteristics of attackers and their near-lethal approaches (Fein & Vossekuil, 1998):
Almost half had attended college or graduate school.
They often had histories of mobility and transience.
About two- thirds were described as socially isolated.
Few had histories of arrests for violent crimes or for crimes that involved weapons.
Many had histories of harassing other people.
Most had histories of explosive, angry behavior, but only half had histories of physically violent behavior.
Many had histories of serious depression or despair.
Many were known to have attempted suicide or to have considered suicide at some point before their attack or near- lethal approach.
This information suggests that stalkers are generally intelligent, have violent or deviant pasts, and suffer from emotional and behavior disorders. Revenge and the need for vindication may motivate them (Gosselin, 2010, pg. 306). Most stalking victims are targeted by someone they know. Males, rather than females, are more likely to be the targets of a stranger stalker.
Gosselin, D.K (2010). Stalking and Homicide. Pearson Education, Inc. Heavy Hands: An Introduction to the Crimes of Family Violence (4th Ed)(pg. 304-306) Upper Saddle River, New Jersey: Prentice Hall
http://homepage.psy.utexas.edu/homepage/Group/BussLAB/stalkinghelp/StalkingWhatCanI.htmlStrategies
C Myths vs. Realities: In media and conversations, we hear "myth vs. reality" statements about victims, perpetrators and witnesses. Develop a "myth vs. reality" statement about one of these groups. Offer any resource information used to formulate your statement...
Myth: Women are not batterers.
Reality: Women assault male partners at about the same rate as men.
Major studies on dating violence find that women are both victims and perpetrators of physical dating violence at the same or higher rate than men (Medeiros & Straus, 2006). This does not mean that couples engage in mutual combat, but that either person in the relationship may instigate violence at one time or another as a response to situations, regardless of gender. Women self- reported physical assaults against their partner at a rate of 32 percent vs. 29 percent for males (Straus & Ramirez, 2007).
Advocates and practitioners claim that women who use force in their intimate partner relationships are victims of violence who respond through self defense and retaliatory use of force (Larance, 2006). Researchers also claim that there is a tendency to dismiss male victimization by women because there is less of it (Dutton & Nicholls, 2005).
http://www.huffingtonpost.com/2012/12/01/women-raping-men-a-surviv_n_2224204.html
Gosselin, D.K (2010). The Police Response to Intimate Partner Violence. Pearson Education, Inc. Heavy Hands: An Introduction to the Crimes of Family Violence (4th Ed)(pg. 294-295, pg.262).Upper Saddle River, New Jersey: Prentice Hall
You May Also Find These Documents Helpful
-
● danger from adult seeking to exploit children. Some people use the internet to make contact with children and young people with the intention of developing a relationship which they can progress to sexual activity.…
- 1128 Words
- 5 Pages
Powerful Essays -
Anybody can make an account and can make fake stuff up about them and drag people in and then hurt them. Sexual predators is one that can really mess with social media, and posting profanity pictures, with sexual intentions can draw in the wrong person, and that is something people don’t understand. Their is age restrictions and privacy policies on social media and social sites for a reason.…
- 328 Words
- 2 Pages
Satisfactory Essays -
The risks that may occur on the internet is that if a child or young people own an account on social networking site like Facebook, twitter they can be stalked or they can be forced into sending inappropriate messages to others. To own a Facebook account the person has to be older 13 years old but some children make an account by giving false details.…
- 326 Words
- 2 Pages
Satisfactory Essays -
Social media is a way people can share their lives with each other by just the click of a button. Recently, the checking and posting on social media has become a daily routine of almost everyone’s life. This allows people to access an unlimited amount of information in seconds. People that have social media accounts are able to post everything from family vacation photos to what their political views are at any time. While on most social media accounts there are privacy settings where a person cannot see the content of somebody’s account unless the owner of that account has accepted them, once something is online, it no longer is private. By sharing information that everyone can see, people’s private…
- 1546 Words
- 7 Pages
Better Essays -
Which tends to lead into bullies and online predators. If a minor doesn’t watch he/she post, it could open the door. To anyone who will take advantage of the person. If they don’t put their social media accounts on private, which help keep them safe. If it's not on private anyone could look at your account and if that person if not safe it make it that much easier…
- 510 Words
- 3 Pages
Good Essays -
The world of online dating have had their share of negatives. These cons include cyber bullying, being “Catfished,”and also the occurrences of pedophiles/sex offenders. According to M.T.V, fifty-seven episodes of “Catfished” has aired since 2012, their host, Nev Schulman, states “hundreds of cases go unnoticed every day.” Social networks have an influence on people that include being involved in identity thief, cyber bullying, as well online predators.…
- 1076 Words
- 5 Pages
Good Essays -
“Online Social Networking Dangers and Benefits.” University of the Pacific, California, 2013. Web. 22 June 2013.…
- 1327 Words
- 6 Pages
Good Essays -
Explain the risks and possible consequences for children and young people of being online and using a mobile phone (7.1)…
- 329 Words
- 2 Pages
Satisfactory Essays -
The article "The Internet: A Clear and Present Danger?" written by Cathleen Cleaver is a clear claim of the necessity of government regulation to control what is being shown on the Internet. To support her claim, Cleaver gives the pornographic web sites as an example. She argues that the regulations used to control the selling of pornography applied to porn stores, magazines, and television should also be applied to the Internet. The reason for such necessity is that it is impossible to control who is actually accessing such web sites. Following this reason, Cleaver's main claim in the article is that children can access pornographic web sites on the Internet. This claim is clearly stated by Cleaver in the fourth paragraph of her essay: "When considering what is in the public interest, we must consider the whole public, including children, as individual participants in this new medium" (460). After that her following paragraphs give examples and explanations that support the necessity of a government regulation on Internet. Such examples and explanations were very effective in order to support her claim. They made a fundamental relationship between the author's claim and the real facts that support it, helping people realize such danger by thinking about their own experience.…
- 905 Words
- 4 Pages
Good Essays -
|Being online |Theft of personal data |Computer criminals can use the data to spy on or blackmail users, hijack their online accounts (including bank |…
- 568 Words
- 3 Pages
Good Essays -
One of the main risks of using the internet is that children may be exposed to inappropriate material. This could be pornographic, hateful or violent in nature; that encourages activities that are dangerous or illegal, age inappropriate or biased.…
- 320 Words
- 2 Pages
Satisfactory Essays -
Social-networks can cause harm to others especially when not knowing how to use them the correct way. Internet sites such as Facebook and MySpace make it easier for predators to stalk or catch their next victim. Marcia Clemmitt argues, “But as Internet socializing grows, so do fears that the practice exposes the vulnerable – especially young people – to sexual predators” (627). Marcia explicates that teenager’s lives are put in danger as the social web sites increase. A website like MySpace is dangerous to the youth because some do not know how to keep their life private. Some teenagers enjoy posting personal information online without knowing that they are at risk of being molested. Young people should be careful with what they post or share…
- 133 Words
- 1 Page
Good Essays -
There is also the risk of physical danger. Some people use the internet to make contact with children and young people with the intention of developing a relationship which they can progress to sexual activity. This is known as ‘grooming’. Paedophiles will…
- 1127 Words
- 5 Pages
Good Essays -
Fox, K. A., Nobles, M. R., & Akers, R. L. (2011). Is stalking a learned phenomenon? An…
- 3362 Words
- 10 Pages
Powerful Essays -
In public life communication technology serve more advantages than disadvantages. We can find friends through social media or online game sites, we can even find suitable partner through dating sites. The disadvantages are that people can provide false information and exploit the advantages of social media on people public life and cause misunderstanding, loss of properties or sometimes even lives. In private life, the disadvantages are more than the advantages. The advantages are that we can communicate and stay connected with our family or friends online, but it is also easy for hackers to access our personal profile online. Many cases have been reported that…
- 1087 Words
- 5 Pages
Good Essays