"Effect of cyber crime to the teenagers" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 28 of 50 - About 500 Essays
  • Good Essays

    Cyber bullying is the use of the Internet and related technologies such as mobile phones‚ to harm other people‚ in a deliberate‚ repeated‚ and hostile manner. 
Cyber bullying is a growing problem as it is out of the jurisdiction of most schools and generally done behind closed doors. Many teenagers who are faced with a cyber bully do not report the bullying‚ but instead dwell on the subject‚ causing them to become depressed‚ anxious and more times than one suicidal. In recent years‚ cyber bullying

    Premium Bullying Abuse Internet

    • 683 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cyber-Bullying

    • 1354 Words
    • 4 Pages

    and technology has ruined human relationships with one another and made it difficult to define a person ’s true personality. People should not support using social media because it has brought greater danger to people who are bullied‚ also known as cyber-bullying. Anything said‚ written‚ or displayed on the internet is permanently there once it is posted. It is possible to delete any posts off of an account but it does not mean it has been completely taken off the internet. The same goes for text

    Premium Bullying Communication Text messaging

    • 1354 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cyber Bullying

    • 392 Words
    • 2 Pages

    heads in the toilet with no wounds/bruises or bloody noses as evidence of abuse‚ cyber-bullying often doesn’t attract the attention of elderly until it’s too late. Cyber-bullying is the usage of internet and mobile gadgets such as web pages and discussion groups as well as instant messaging or SMS text messaging with the intention of harming another person. Websites like Twitter and “Facebook” are the common ways of cyber-bullying. It is being cruel to others by sending or posting harmful material

    Premium Instant messaging Text messaging Bullying

    • 392 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Cyber Espionage

    • 943 Words
    • 4 Pages

    Introduction 3. What is Cyber Espionage? 4. How it Occur? 5. What can be done? 6. Cases 7. International Co-operation 8. Conclusion 9. Biblography [pic]National Law Institute University‚ Bhopal[pic] and Rajiv Gandhi Proudyogiki Vishwavidyalay‚ Bhopal Collaborative Programme Jointly Offers Master of Science In Cyber Law and Information Security PROJECT REPORT (PAPER-1) On “Cyber Espionage” SUBMITTED

    Premium Secrecy

    • 943 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    cyber law in bangladesh

    • 8509 Words
    • 35 Pages

    http://www.assignmentpoint.com/science/computer/term-paper-on-cyber-jurisprudence.html Term Paper on Cyber Jurisprudence Chapter-1 Introduction Cyber Jurisprudence The emergence of cyber jurisprudence around the world has promoted the growth of newer dimensions in Law.  Students and professionals willing to understand this unique and nascent field of study have opened doors to opportunities worldwide.  Similar problems will arise in the future In several other transactions on the virtual

    Premium Law Computer Computer crime

    • 8509 Words
    • 35 Pages
    Powerful Essays
  • Good Essays

    Cyber Attacks

    • 644 Words
    • 3 Pages

    unprecedented levels of security at Indian airports‚ railway stations‚ hotels‚ ports etc. But the government does not seem to see the bigger threat‚ which will not come from AK-47s‚ bombs and rifles. The next big attack will be come from terrorists in the cyber world. We live in a technologically interconnected world. Most of us cannot imagine even a single day without our cell phones‚ internet and ATMs. There is hardly any distinction between where our bodies end and technology begins. Would it be surprising

    Premium Security Police Computer security

    • 644 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cyber-Loafing

    • 774 Words
    • 4 Pages

    Cyber-loafing Slang term used to describe employees who surf the net‚ write e-mail or other Internet-related activities at work that are not related to their job. These activities are performed during periods of time when they are being paid by their employer. The individual is called a cyberloaf(er)‚ while the act is cyberloafing. Same as cyberslacking("What is cyberloafing‚" 2011). This article simply shows that now Americans are more inclined to “slack off” from their jobs. Statistics

    Premium Internet Employment Social network service

    • 774 Words
    • 4 Pages
    Good Essays
  • Good Essays

    cyber fraud

    • 341 Words
    • 2 Pages

    Introduction : We have seen a spate of cyber frauds in the recent past. The frequency and scale of the incidents has created a lot of concerns for the banks‚ regulators and customers. What do banks in India have to learn from these? Are they doing enough to ensure that we don’t end up as sitting ducks? What preventive measures to take to face this new menace? Before we consider these and other related questions‚ we need to understand the anatomy of cyber frauds. Cyber Fraud is a generic term used to represent

    Premium Fraud Bank Malware

    • 341 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Cyber Defense

    • 459 Words
    • 2 Pages

    Cyber Defense Patrick Komar English 091 Baker College Essay #1 10524235 Cyber Defense I love working with computers. All my friends and family knows I like to spend a lot of time working with computers‚ which allows for a good challenge. The problem is it’s hard with work and kids to find time to play around on the computers. First of all getting time to spend time on the computer is a real challenge. I work 40-50 hours a week at the Fenton Post Office. It is a 30 min drive one way and

    Premium Home Family Homemaker

    • 459 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cyber Security

    • 368 Words
    • 2 Pages

    Checkpoint: Cyber Security Checkpoint: Cyber Security I have a multitude of passwords to memorize in an effort to maintain my privacy and security. It is unfortunate that cyber world users must constantly deploy measures to keep their personal information private. Before this class I was certainly aware of the potential dangers that could occur in cyberspace‚ prevention always has been my goal. I have security protection in place against attacks such as viruses‚ spam‚ malware‚ spyware‚

    Premium Password Computer security Authentication

    • 368 Words
    • 2 Pages
    Satisfactory Essays
Page 1 25 26 27 28 29 30 31 32 50