Sunday, February 17, 2019
Essay --
IntroductionAlong with the fast developments and various applications of the internet comes the expediency of peoples living standard. Undoubtedly the emerging new engineering science is playing such a significant role in field like promoting interpersonal interactions, driving global collaborations and increasing the worlds productivity, that our society may not stay as functional as it is now without the existence of the internet. Nevertheless, the internet, due to its complicated form of communications and the neglect of either moral or legal control, has also brought about an incomparable form of deviances and crimes including hacking, online fraud, terrorism, and so forth (Jaishankar, 2011). Among all types of controversial cyber activities, considering the distinct character of criminals and different motivations, some of them may not have huge forbid social impact while others can result in monolithic loss for both individuals and society. On all accounts, it is indeed of great splendor to study internet abuse so as to construct a safer community with higher stability for the existence and prosperity of human-beings.To examine online deviances and crimes objectively, both theoretical supports and a large amount of data are required. As for hacking part, the run agrounded theory is applied so as to systematically and comparatively collapse the similarities and differences between good hackers and bad hackers. When it comes to discussion on online fraud, the breeding ground of cyber fraud, Nigeria, is taken as a typical example for depiction and explanation. In the specific region where the younger generation constructs a morally and licitly deviant subculture, the prospect of the state is worth concerning. Organized in a progress... ...me. New York, NY Basic Books.Powell, B., Carsen, J., Crumley, B., Walt, V., Gibson, H., & Gerlin, A. (2005, September 26). Generation Jihad. Time, 166, 5659. Retrieved from http//www.time.com/time/ pickup/article/0 ,9171,1109334-1,00.htmlTaylor, P. A. (1999). Hackers Crime and the digital sublime. New York, NY Routledge.Weimann, G. (2004b). www.terror.net How modern terrorism uses the Internet. working capital DC United States Institute of Peace. Tsfati, Y., & Weimann, G. (2002). www.terrorism.com Terror on the Internet. Studies in affair & Terrorism, 25, 317332.Whine, M. (1999). CyberspaceA new medium for communication, command, and control by extremists. Studies in Conflict & Terrorism, 22, 231246.Zetter, K. (2008). Israeli hacker The Analyzer suspected of hacking again. Wired. Retrieved from http//www.wired.com/threatlevel/2008/09/the-analyzer-su
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment