Evolution of Cybercrimes Essay

Table of Content

Computer Security

Cybercrime occurs when an individual uses a network technology or a computer device to commit an act, which deviates from the state laws. Cybercrimes include a wide range of actions, which can be seen to be against the general good.

Cyber-bullying

According to Kids Health (2018), cyber-bullying is one of the most prevalent cybercrimes in the contemporary society. Social networking has generally taken bullying to the next level. Before the emergence of sophisticated technology, bullying was mainly done physically in schools. The situation is seemingly deferent today, as bullies have turned to the use of social technologies. These bullies are known as cyber bullies.

This essay could be plagiarized. Get your custom essay
“Dirty Pretty Things” Acts of Desperation: The State of Being Desperate
128 writers

ready to help you now

Get original paper

Without paying upfront

There is no legitimate logic behind cyber bullying. Kizza (2017) holds that many bullies want to get a reaction. It is common for the perpetrator to bully the other to gratify their ego since it makes them feel in control. While some may think that it is fun to intimidate others through the Internet, the reality is that it has significant adverse impacts on the victims. Cyber bullying has detrimental consequences on the person being bullied. Victims of cyber bullying are likely to develop psychological problems. They are likely to suffer from anxiety, frustration and even have low self- esteem. Victims of cyber bullying are also likely to suffer from depression.

Compared to physical bullying, which occurs in schools, cyber bullying causes more emotional suffering of the victim. Unlike school bullying which children can escape when they are home or during holidays, cyber bullying cannot be escaped. The victim suffers wherever they go.

Evolution of Cybercrime

The traditional bullying made its way to the Internet in the early 1990s following the emergence of cheap personal computers. Children and teenager began experiencing different kinds of bullying on the various platforms including chat rooms and private messaging platforms by their classmates and strangers (Nordstrom & Lisa, 2014). The anonymity of the web provided safe cover for the perpetrators to harass and intimidate potential victims without fear that they could be identified.

Cyber bullying reached its peak in the 2000s when smartphones emerged, and everybody wanted to have them. Teenagers had the liberty and port unity to send text messages and photos to anyone they wanted to. In the mid-2000s, the emergence of several social media platforms and applications created podiums where bullies could efficiently conduct their activities. Cyber bullying was brought to the mainstream following several cases of teenage suicides (Nordstrom & Lisa, 2014). One of the initial suicide cases happened in 2007 when Tina Meir- 13-year-old committed suicide when her neighbor developed a forged MySpace profile under the name Josh Evans and used it to harass her. The perpetrators were found guilty of unauthorized use of computers but were acquitted. Her case did not only drive the state of Missouri to enact laws of cyber bullying but brought the crime to international attention.

Advances in Technology

Technological advances have significantly contributed to the evolution of cyber bullying in various ways. Technological advances have resulted in the development of social sites such as Facebook and Twitter. These sites, in turn, have developed channels where bullies create fake accounts and use them to intimidate victims without being apprehended. On the other hand, modern cyber bullying has changed from sending threatening messages to posting emotionally disturbing information and pictures of their target to the public (Yar, 2013). Technological advances have created the channels where the perpetrators can take advantage of the large population of the audience to spread bad messages concerning their victims. For example, Tyler Clement jumped off the George Washington Bridge after his roommate streamed a video of him kissing another man on Twitter. Finally, technological advances have significantly made the Internet more affordable increasing the vulnerability of the victims and making it easier for perpetrators.

Legislations Related to Cyber Bullying

According to Stansky (2009), up to mid-2000s, there were no laws that specifically addressed cyberbullying. However, in the recent times, laws have emerged in several states that leave enforcements in the hands of schools. Prosecutors, however, have always relied on existing laws to prosecute individuals who are suspected of cyber bullying cases. Criminal harassment statues, for instance, have often provided a basis for bringing charges in serious cases where cyber bullying has resulted in tragic incidences such as suicide and death (Levi, 2008).

Federally, cyber bullying can be handled under civil or criminal laws depending on the situation (Rees, 2006). Civil law is the division of the law, which deals with property rights, personal dignity and freedom from injury. Under civil laws, cyber buying can be approached in three ways

One, cyber bullying may result in defamation. This is where the perpetrator causes damage to the reputation of the victim through spreading false information. Defamations which are likely to be temporary such as unrecorded speech or live broadcasts are known as slander while those that are likely to be permanent such as a book or website publication are known as libel (Rees, 2006).

Cite this page

Evolution of Cybercrimes Essay. (2022, Jul 11). Retrieved from

https://graduateway.com/evolution-of-cybercrimes-essay/

Remember! This essay was written by a student

You can get a custom paper by one of our expert writers

Order custom paper Without paying upfront