Preview

Internet Dangers

Good Essays
Open Document
Open Document
460 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Internet Dangers
In this time and era, internet is the most important device in our lives. It provides us with helpful information, keeps us up to date with the latest news, and answers every question we could possibly think of. This usually gives us an unrealistic perception that everything on the internet is true, even though anyone from any country or city or state can say whatever they please, and still make that information sound as if it is straight from a professor. People can do anything imaginable on the internet, which gives the wrong people the power to manipulate innocent victims. Now, this kind of power and anonymity has huge potential in destroying your reputation, giving you viruses, and attaining identity theft. Every day, thousands of people shop online, either to ease the complexity of spending hours at the mall, or to obtain necessary things that aren’t yet in stores. This however, is a huge problem in identity theft. By inputting your personal information in a website that looks real, but may or may not be, you are giving the owner of that website permission to access your hard earned money. Unbeknownst to most, all an identity theft needs is your credit card number and name to hack into everything you’ve ever worked for, and take it in a matter of minutes. These websites also have the ability to contain viruses, which, in order to free yourself from, you must erase everything that has been saved to your hard drive. These viruses can track your every keystroke, record you passwords to everything, and obtain your friends information to trap them into receiving the same virus. These potential risks are impossible to prevent, but are easy to take precautions to. Facebook, Twitter, MySpace; basically any chat room available online contains users that can, and will, destroy another person’s reputation. Cyber bullying is a tragedy takes place every single day. All it takes is for one popular or well respected person to talk down to someone that is seen as

You May Also Find These Documents Helpful

  • Good Essays

    • Cyber Bullying: The form of bullying that is on the greatest increase is cyber-bullying. As the use of social networking sites increases, so too does the possibility of internet abuse. Cyber bullying can occur when internet sites are used to show pictures that embarrass others or used to entice others into groups to bully online. This form of bullying can be very damaging because, by use of instant messaging services, the ‘bully’ can seem to enter our home and abuse us. Silent or abusive phone calls and ‘Happy Slapping’ also come under the banner of cyber-bullying.…

    • 1587 Words
    • 7 Pages
    Good Essays
  • Good Essays

    CAESAREAN

    • 1626 Words
    • 5 Pages

    Bullying obviously didn't start's on the internet. However, it has become a huge problems with every new technological innovation. User names and a computer screen may makes some users feel invincible and its hard to relay emotion through internet conversation cyberbullies are known for sending harmful and hurtful messages along with extreme cases of lies. Most of…

    • 1626 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The article "The Internet: A Clear and Present Danger?" written by Cathleen Cleaver is a clear claim of the necessity of government regulation to control what is being shown on the Internet. To support her claim, Cleaver gives the pornographic web sites as an example. She argues that the regulations used to control the selling of pornography applied to porn stores, magazines, and television should also be applied to the Internet. The reason for such necessity is that it is impossible to control who is actually accessing such web sites. Following this reason, Cleaver's main claim in the article is that children can access pornographic web sites on the Internet. This claim is clearly stated by Cleaver in the fourth paragraph of her essay: "When considering what is in the public interest, we must consider the whole public, including children, as individual participants in this new medium" (460). After that her following paragraphs give examples and explanations that support the necessity of a government regulation on Internet. Such examples and explanations were very effective in order to support her claim. They made a fundamental relationship between the author's claim and the real facts that support it, helping people realize such danger by thinking about their own experience.…

    • 905 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Although the internet can be a valuable tool both educationally and socially, there are some serious risks associated with using the internet and other technologies. As in the real world, children and young people are vulnerable and may knowingly or unknowingly expose themselves to danger when using the internet, mobile phones and other technologies.…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cyber Bullying – whether by internet, mobile phone or any other method – is another aspect of the use of new technologies that provide an anonymous method by which bullies can torment their victims. While a young person may or may not be in physical danger, they may receive email, chat or text messages that make them feel embarrassed, upset, depressed or afraid. This can damage their self-esteem and pose a threat to their psychological wellbeing.…

    • 1127 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    People often trust the internet too much when it comes to buying things or sending out their personal information. One does not take into account that there are hackers waiting to scam you for all your money and information. IN an article titled, “Information Security Breaches and the Threat to Consumers” written by Fred H. Cate, he states, “Consumers often end up unwittingly providing thieves with access to sensitive data by failing to secure their own data, by responding to fraud schemes, such as phishing and pharming, and by careless use of their personal information” (Cate 4). In other words, people tend to trust that what they put on the internet, however there are people who are trying to scam you for your money. People should be more aware and less careless about what they are sending through the internet and to who they are sending it to. While we continue to be careless with our information, we continue to see many crimes involving identity theft. Cate writes, “The vulnerability of unsecured personal data and the threat of identity-based frauds nevertheless continue to grow and evolve as perpetrators become more sophisticated in how they seek to obtain and exploit personal information” (Cate 2). It makes it easy for hackers to catch and use one’s personal information when the individual continues to be careless with their information…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Misuse of this technology and the information accessible to online users can cause potential harm varying in severity. From spam, to cyber-stalking, the legal implications of various internet-related offences can result in fines and jail sentences. The purpose of the internet is to provide, and share information and data between computers. International boundaries are no longer a concern, which proves to be as useful as it is dangerous. Internet users all over the globe are able to act and figuratively hide behind their screens, with the use of anonymity. Anonymity poses a risk on the world wide web, users are able to create their own persona, develop and transfer data without an identity, and even pose as another. The internet may be misused by an individual through the use of anonymity. Untrackable viruses and bots can be created and spread through the wide synapses of the net, transferred from computer to computer through e-mail, downloading malicious files, and unauthorized access of ones personal computer, known as hacking. Another misuse of the internet is the act of copying someone 's work and claiming it as your own, also known as plagiarism. With thousands of documents, files and information readily available across the web on various websites, stealing another 's work is as simple as a copy and paste. Plagiarism and copyright infringement are similar, but not the same. Copyright infringement is a violation of the rights of a copyright holder, when material restricted by copyright is used without consent. On…

    • 1321 Words
    • 6 Pages
    Good Essays
  • Best Essays

    security breaches

    • 2967 Words
    • 12 Pages

    The world has been undergoing persistent transformation which some have been attributed to the changing developments in science and technology. In particular, information and communication technology is one of the most celebrated developments. Indeed, information technology has changed the lives of people across the globe. Information technology has reduced the world to a global village through fostering advanced communicationforms. However, with the advancements in information technology, especially the internet, insecurity issues have emerged. Insecurity issues have, in turn, sparked far reaching implications to the users. The most rampant security breaches that have been evidenced within the last six months include cyber bullying, network intrusion, cyber fraud, virus launching and data breaches.…

    • 2967 Words
    • 12 Pages
    Best Essays
  • Satisfactory Essays

    INTERNET SAFETY

    • 389 Words
    • 2 Pages

    Did you know the internet holds all types of danger? Viruses, predators and illegal activities. Viruses can from apps, websites, and pictures, boot sector, in an executable program and in a macro. Place you didn’t even know about. You can get the clean out but some can be free, then again some you have to pay for. That led me to my next topic. Illegal activities such as jail breaking phones, copy writer, downloading files and using without permission and sharing subscription password. Most people don’t know or really don’t care for the internet rules until they get caught. For example predators, they get online and act like a child to meet other children, until they get caught. Bye abducting the child, which led to a case and etc.…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Not only can a person’s identity be stolen from the web, identity theft also occurs when thieves go through the trash, steal mail, and use con scams to trick a person into revealing sensitive details about their identity. In safeguarding information that may be stored on a computer, make sure to use antivirus software, encryption of files on the computer, this uses keys to lock and unlock data while the information is being transmitted over the internet and the use of firewall, can be used to limit an application’s access to the computer, avoiding hackers from trying to take over the computer to gain access to information that is stored on…

    • 1705 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Life in color

    • 2102 Words
    • 9 Pages

    Identity theft is a major problem in the United States and is growing ever year. In 2003, identity theft cost business and consumers close to $53 billion and identities stolen from around 10 million Americans (Dinev 77). Identity theft is where someone can pretend to be someone else, and to make financial charges under the victim’s name, leaving all the troubles of fixing the victim’s financial troubles to the victim while the theft continues to steal until they either are caught or move on to another victim (Vacca 4). In 1998, identity theft became illegal even though this issue has been around for ages (Hoffman and McGinley 1). The traditional way of identity theft is “pinched wallet or pilfered mail” also is known as “dumpster diving” (Yount 71).Also, the Internet plays a big role in identity theft. In the Internet, a thief can hide from detection while stealing peoples’ identities from their homes, being able to steal peoples’ information one by one “then disappearing into another identity,” (Vacca 60). Internet users must know about the risk of online identity theft, so that they can protect themselves from this threat.…

    • 2102 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Email Security

    • 752 Words
    • 4 Pages

    The advent of the internet has changed the way in which technology was being used to support businesses as well as personal needs of users worldwide. Little did people realize that the internet would establish itself as a powerful facilitator of the needs of the common man in such a short period of time. However the same facilities that the Internet offers can also be a potential source for dissemination of our private information without us even knowing about it.…

    • 752 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Privacy is a much required freedom needed to be adopted and practiced in our modern society. From the tycoons in Wall Street to our own Electronic Mail, disclosure of personal information should be stopped and eluded for one's own benefit. While surfing through one self's mail, it is very common that he or she might encounter numerous Spam mails about "Easy Diets" or the famed "Free Ipad" which has perhaps become a cliché by now. One might even occasionally sight the name or the address of the user himself. This rouses a sense of insecurity and anxiety about the other specifics the "sender" has held which can be used against one. The details might vary from Monetary hacking through Credit Card Numbers to Piracy. Such problems need the immediate attention of the cyber police to maintain a more sound and assured environment for the users of the Internet.…

    • 435 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Using internet anonymously gives some advantages to some internet users. First, it can protect users’ privacy in an effective way. In this era of technology advancement, social network platform like facebook or twitter, it required users to upload their personal information and keep an eternal record. It is a dark side of the use of social network platform that those records may be used in a commercial way without users’ authorization. This action is stealing our information and invading our privacy in a grey zone. Using internet anonymously can help protecting user’s information. According to Andrea (2013, P.32) , privacy is similar to human right, which need to be protected preferentially. Therefore, anonymously using internet is a way to protect users’ information not to be leaked. Also avoid that users’ information will not be used in a profitable way or an illegal way.…

    • 896 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Internet Security and Safety

    • 3144 Words
    • 13 Pages

    As the internet continues to grow, we may never be able to completely protect our privacy on line especially when it comes to utilizing social networking site, shopping online or by simply surfing the web. There are also so many potential invasions of privacy while spending time on line. Some invasions are clandestine and simple and may never consider them a concern. While online shopping and social networking sites seem to have the most potential with breaches of privacy, even surfing the web opens the door for certain types of invasions. Shopping online poses several threats with the most prominent are credit card number theft or even identity theft. There have been many breeches in corporate…

    • 3144 Words
    • 13 Pages
    Better Essays