Preview

Reflection on Social Media

Good Essays
Open Document
Open Document
595 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Reflection on Social Media
Reflection on social media

If I post a poem on my Facebook site and someone cuts and pastes it on their site is that a case for stealing my intellectual property?

The correct answer for this question is yes, this is stealing intellectual property. Does it seem to apply to Face book, no it does not. There is actually a joke that says that you can post any kind of saying, quote, or poem on Face book and just put a random name after it and 90 percent people will believe that person actually wrote it. Face book does not have any standards of what you can or can not steal. When MySpace was huge you could actually put an encrypted code on your page where it did not allow people to copy and paste anything off of it. It just comes down to the honor system. You should never copy and paste something of someone else’s without there permission.
Cyber bullying is a serious issue in today’s schools and business. If everyone adopted and educated people on netiquette guidelines would this issue be solved? Explain.
Do I personally believe that this will be a solution to cyber bullying; no I do not think that this is a solution. I do believe if you hit the younger generation on what netiquette is then maybe the numbers of cyber bullying will go down. The issue of bullying is such a huge subject and has a huge range of what can and can not be considered bullying. No matter what you try there will always be some kind of bullying on the net. If we teach a course of netiquette in schools and business then maybe people will be more self conscience of what they are putting instead of just being so blunt. As adults we need to be role models for the younger generation until this issue can be resolved.
Some might say the crime of the 21st century will be white collar. If that is true, what will be the major types of cybercrime? How can we safeguard against it?
Some of the major cybercrimes are indentify theft, online sexual exploitation, and computer intrusions. These are

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Bsbwor501 Final Project

    • 438 Words
    • 2 Pages

    After consultation with us, we will accommodate all your special requirements wherever feasible. Please convey all of your needs, so that we can make appropriate arrangements for you.…

    • 438 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The movie Reign Over Me is about a man named Charlie Fineman. Charlie used to be a practicing dentist. His whole life was turned upside down when he lost his wife and three daughters in the terrorist attacks on 9/11. One day while Charlie is on the street his old roommate from college, Allen Johnson, sees him and tries yelling for him, but Charlie does not stop. Allen then seems like he knows that something is wrong with Charlie and wants to help.…

    • 893 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cybercrime is any crime that is committed online or through the use of an electronic device such as a computer or smartphone. Cybercrime is very broad and can be anything from stealing money online to downloading illegal files. The creation and distribution of viruses on to others computers is a very popular cybercrime. The most prominent cybercrime is identity theft through pharming and phishing techniques used by criminals to steal personal information. Cybercrime is increasing as technology increases because criminals are finding it easier to get personal information from almost anywhere. Not only individual electronic devices are being attacked, businesses are also becoming attacked where many people are falling victim.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Cybercrime is defined as a crime in which a computer is the object of a crime or is used as a tool to carry out a crime. Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Offenders who perform these unlawful actions are often referred to as hackers (Janssen, 2010). There are several different types of cybercrimes, however four of the most common cybercrimes are: cyber fraud, cyber theft, stalking, and hacking.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Altough bullying is terrible, there are some things we can do about it. In “The Dark Side of Using Technology” by Del Siegle, Siegle explains how we can prevent cyber bullying. Siegle states, “The following tips should be shared with young people to prepare them if they encounter a bullying situation: The best response to a cyberbully is not to respond. It removes the bully’s power. Those who are bullied sometimes become bullies.…

    • 556 Words
    • 3 Pages
    Good Essays
  • Better Essays

    In the article When Bullying Turns Deadly: Can it Be Stopped, by Time Magazine, author John Cloud writes how bullying has gone from kids calling each other names on the play ground or on the way home from school, to using cell phones and computers to harass, intimidate and humiliate each other to the point of suicide.Today this is known as cyberbullying and it is very big problem for not only teens ,but adults also. The trouble is,the technology of bullying has progressed much faster than anyone could have thought of. People…

    • 1423 Words
    • 6 Pages
    Better Essays
  • Better Essays

    A major issue within this industry is the fact that citizens, law enforcement officials, prosecutors, and the government don’t put cyber crime at the top of their list of dangerous crimes is because the actual act of computer…

    • 1102 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Then again only forty-three percent of kids have been bullied online . Some may think that forty-three percent is not a lot , especially because of how many people there is in this world but , I disagree . I think that even one percent is one too many . Yes , cyberbullying from multiple perspectives , might be an over exaggerated problem , but people still need to pay close attention to it . Exaggerated or not cyberbullying is still a concern for many…

    • 698 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Carter, David. (1995). Computer crime categories: how techno-criminals operate. The FBI Magazine, Retrieved from http://www2.fiu.edu/~cohne/Theory%20S09/Ch%2014%20-%20Types%20of%20computer%20crime.pdf…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    I feel that limiting online speech that happens outside of school is an unnecessary punishment that school districts are forcing upon students. Looking at the survey of British school teachers it is said that 84.9% reported not being cyberbullied. The survey also tells if it affected the person and 38.6% of people had no effect. With this type of major percentage it is showing that cyberbullying is not a widespread problem schools are making out to be. I feel that over exaggerating cyberbullying will cause over exaggerating solutions.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cybersecurity Trends

    • 530 Words
    • 3 Pages

    Every year, millions of viruses are released through the Internet. The FBI reports that there are a variety of cyber-threats, such as identify theft, Internet fraud and cyber-crimes related crimes like terrorism.…

    • 530 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer crimes are criminal activities that involve using a computer and a network to gain unauthorized access with the intent of deleting, altering, or damaging computer data. Due to them being extremely versatile, establishing criminal and noncriminal behavior when in use can be very difficult at times. “According to the U.S. Uniform Crime Reporting Statistics, by 2000 more than 300 million users around the globe accessed the World Wide Web. Of those, at least 1 million were engaged in illegal Internet activities (computer crime or "cyber-crime"). Cyber-crimes include Internet-related forgery, embezzlement, fraud, vandalism, and the disposal of stolen goods. The potential threat to the overall development of e-commerce was serious—so much that online security expenditures were expected to double to $30 billion in 2004” (Computer Crime – Definitions). The four most common categories of computer crimes are infrastructure attacks, technological facilitation, information attacks, and promotion.…

    • 733 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cyber Crime

    • 395 Words
    • 2 Pages

    Cybercrime, also called computer crime because the use of a computer is used as tool to help people meet their illegal ends. Some cybercrime examples are committing fraud, trafficking in child pornography and intellectual property, stealing other peoples identity, or violating privacy of others.…

    • 395 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    (Siegel, Introduction to Criminal Justice, 2011) I had no idea that pornography and prostitution was mentioned along with copyright infringement. The second cybercrime mentioned is cyber vandalism. Cyber vandalism is a malicious attacks, disrupting-defacing, and destroying technology. This crime is motivated by malice not greed. (Siegel, Introduction to Criminal Justice, 2011) Some examples of cyber vandalism are:…

    • 741 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cyber Citizens Partnership’s website identified the following as their 3 categories: using the computer to help an individual commit a crime, focusing on the computer as the victim, and using a computer to harm or steal. However, the Cross Domain Solutions stated people, property and government as their 3 categories of Cybercrimes. Some cybercrimes police must be prepared to deal with in the future are theft/identity theft, hacking, fraud/financial crimes, harassment/stalking, trafficking (human & drugs), child soliciting/abuse, and cyberterrorism. Below show how the different types are divided up into the 3…

    • 712 Words
    • 3 Pages
    Good Essays