Wednesday, March 27, 2019

Essay --

IntroductionAlong with the fast developments and various applications of the profit comes the improvement of peoples living standard. Undoubtedly the emerging bleak technology is playing such a significant role in fields like promoting interpersonal interactions, driving global collaborations and increasing the pieces productivity, that our society may not stay as operative as it is now without the existence of the internet. Nevertheless, the internet, due to its complicated form of communication theory and the lack of either moral or legal control, has also brought more or less an unprecedented form of deviances and crimes including hacking, online fraud, terrorism, and so forth (Jaishankar, 2011). Among all types of controversial cyber activities, considering the unadorned nature of criminals and different motivations, some of them may not have bulky negative social impact while others can result in massive loss for both individuals and society. On all accounts, it is indeed of expectant importance to study internet abuse so as to realise a safer community with higher stability for the existence and prosperity of human-beings.To take apart online deviances and crimes objectively, both theoretical supports and a large amount of data be required. As for hacking part, the grounded theory is applied so as to systematically and comparatively analyze the similarities and differences between good hackers and bad hackers. When it comes to discussion on online fraud, the breeding ground of cyber fraud, Nigeria, is taken as a typical example for motion picture and explanation. In the specific region where the younger generation constructs a virtuously and legally deviant subculture, the prospect of the state is worth concerning. Organized in a progress... ...me. New York, NY Basic Books.Powell, B., Carsen, J., Crumley, B., Walt, V., Gibson, H., & Gerlin, A. (2005, September 26). Generation Jihad. Time, 166, 5659. Retrieved from http//www. measure.com/time/ magazine/article/0,9171,1109334-1,00.htmlTaylor, P. A. (1999). Hackers Crime and the digital sublime. New York, NY Routledge.Weimann, G. (2004b). www.terror.net How modern terrorism uses the Internet. Washington DC United States Institute of Peace. Tsfati, Y., & Weimann, G. (2002). www.terrorism.com Terror on the Internet. Studies in Conflict & Terrorism, 25, 317332.Whine, M. (1999). CyberspaceA new medium for communication, command, and control by extremists. Studies in Conflict & Terrorism, 22, 231246.Zetter, K. (2008). Israeli hacker The Analyzer suspected of hacking again. Wired. Retrieved from http//www.wired.com/threatlevel/2008/09/the-analyzer-su

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.