Effects Of Social Media On Cybercrime Technology Essay (Essay Sample)
task: To research the effects of social media on cybercrime
about: How social media promotes cyber crime
EFFECTS OF SOCIAL MEDIA ON CYBERCRIME
BY [ Name]
Location of Institution
Effects of social media on the cybercrime
The Internet is a worldwide electronic computer network that connects people and information ( Fettwis & Alamouti 2014, P140-145 ). However, every technology has its advantages and disadvantages. The Internet has several advantages, but it is considered to have some drawbacks. Social Media is the latest form of media available to the audience of varied groups, ages, and classe (Kasaeian et al. 2017, P778-791). However, on the other side, it is an encroachment to someone’s privacy which can lead to a different type of illegal activities by using information such as name, location, and email addresses. The anonymity over the internet and the jurisdictional issues has given rise to cyber crimes where crime is committed with the aid assistance of a computer. This paper attempts to focus on the development of the technology, forms of social networks, different cybercrimes committed, and categories of cybercrimes.
Today email and websites are a means of communication for everyone (Stojonoic & Beaujean 2016, P59-386) It facilitates almost instant exchange and dissemination of data, image, and variety of material. It is inclusive of both educational and helpful material but undesirable information also. Cybercrime generally refers to criminal activity where a computer or network is the source, tool, and Target poor place of a crime. Cybercrime is a criminal activity involving an information technology infrastructure, including illegal access, illegal interception, data interference, system interference, misuse of devices, and electronic fraud ( Herley 2014, P64-71) Cybercrime causes a breach of rules of law and counterbalanced by the sanction of the state.
- Topology and Message Flow Control of Hierarchical BotnetDescription: Different methods are used to attack computers using this topology and include Random Administration Tools (RATs), Distributed Denial of Service (DDOS) and Content Delivery Network (CDN)...12 pages/≈3300 words| 27 Sources | Harvard | Technology | Essay |
- Should the Government or Industry Drive Digitization Description: Answer to the question posed by Garyham Roper in his article “whether governments should be the spearheading digitization of the construction industry”...2 pages/≈550 words| 4 Sources | Harvard | Technology | Essay |
- Content Analysis: Facebook, Twitter, MySpace and LinkedIn Description: This paper is aimed at studying the reasons why individuals, particularly youths, join social media such as Facebook, Twitter, MySpace and LinkedIn ...5 pages/≈1375 words| 8 Sources | Harvard | Technology | Essay |