This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Life

 recent proliferation

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

 recent proliferation

Introduction

The recent proliferation as a result of modern technology has drastically changed how individuals perceive and play around with the internet. The modern era has made significant revolutions on how these people spread and communicate via the internet. The internet has also become a channel of conveying information, which sometimes may be distorted. Currently, people get extensive access to information via the internet and social media than through the news channels. Thus, many people have now started believing in the internet news. However, the validity and credibility of most of this information is distorted because of doxing. This is whereby social media bloggers publish information about a specific individual or idea on the internet without facts. It is also the publishing of someone’s secrets that were otherwise difficult to obtain.

  1. Identify 2 stages of the situation (5 points per case)

According to the two links provided, link https://www.digitalethics.org/essays/ethics-doxing-nazis  and https://www.cnbc.com/2017/12/08/doxxing-someone-even-if-hes-a-nazi-sympathizer-poses-a-serious-ethical-dilemma.html, there is a case in each link with two cases in each link.

Don't use plagiarised sources.Get your custom essay just from $11/page

B( i) What the issue was at that stage. (2.5 points per case per stage)

 

The first case on the link about doxxing is on whether it is ethical or not. Most people on the internet have engaged in doxxing whereby they are more likely to spread false information about others. This is usually unethical and may have far-reaching consequences on the perpetrators of these acts. Another case is whether the person involved in doxxing engaged in it willingly or not. Some people engage in doxxing with no intention of concealing other people’s identities. On the other hand, the lnk https://www.digitalethics.org/essays/ethics-doxing-nazis presents a situation of the potential dangers that one may indulge in after being involved in doxxing. Sometimes it may ruin someone’s reputation. According to this link, hatred that results from doxxing may cause misunderstanding and, therefore, create differences among these individuals.

How the internet related to that stage. (2.5 points per case per stage)

 

Concerning the internet, the case clearly explains that the internet can cause a lot of hatred among doxxers especially when they spread unjustified information against an individual.  On the other stage, the internet is involved in that the internet is used as a platform where ethics are not followed at all. People ought to treat each other with respect, something that rarely happens.

Who the victim was and explain why.  (2.5 points per case per stage)

 

The victim, in this case, was Kyle Quinn, who was being doxxed. People may be doxxed for various reasons. Among them can be their social position in society.

Any ethical issues at that stage? What are they? (2.5 points per case per stage)

There were some ethical issues since some people feel that doxxing should not be done to any individuals. Further, most of those who engage in the act rarely have any facts about the person being doxxed. The major ethical issues are failure to publicize true and reliable information.

 

  1. Name 2 risks associated with downloading files. (5 Points)

 

Downloading files can lead to computer viruses. Downloading can also lead to exposure to unwanted adverts such as pornographic materials.

Name 2 types of ways to keep your identity safe while using the internet. (5 Points)

Online security is very crucial, and thus, one should avoid sharing of passwords with strangers. They should also secure their software.

  1. In lecture, we talked about a few types of internet scams. Locate another type of scam that involves the internet. This scam must be from the last 2 years. Include the link to the information about the scam and explain what you can do to not fall victim to that scam. (10 Points)

Some internet scams are the online dating fraud where one enters a relationship with somebody. They later either party ends up conning the other one of their money Investment frauds is another scam whereby someone may deceive a company of a nice deal and pretend to act like a credit provider. To avoid being a victim of these scams, one should ensure that they do not share much of their sensitive information to strangers, especially the online community. Additionally, one can ensure that they are well familiar with other people before giving them any personal information. This can be realized through knowing people and meeting them physically, unlike the case where most people become friends through meeting online.

Identify 2 types of cyber crime that the statistics are not accurate and an explanation for each one that you think is the reason those statistics are not accurate. (10 Points)

Some common forms of cybercrime are hacking and piracy. Statistics usually depict some forms of cybercrime as the major ones while leaving others that could have adverse effects if they are not well controlled. Hacking is a significant cybercrime and involves tampering with systems of an organization accessing the information of that company or engages in fraudulent activity. Statistics are not correct about these cybercrimes because they are classified under the minor forms of cybercrime and, therefore, not highly considered.

The link to the reference? (2.5 Points)

https://www.google.com/search?q=Grossmann%2C+I.%2C+Gerlach%2C+T.+M.%2C+%26+Denissen%2C+J.+J.+(2016).+Wise+reasoning+in+the+face+of+everyday+life+challenges.+Social+Psychological+and+Personality+Science%2C+7(7)%2C+611-622.&rlz=1C1CHBF_enKE770KE770&oq=Grossmann%2C+I.%2C+Gerlach%2C+T.+M.%2C+%26+Denissen%2C+J.+J.+(2016).+Wise+reasoning+in+the+face+of+everyday+life+challenges.+Social+Psychological+and+Personality+Science%2C+7(7)%2C+611-622.&aqs=chrome..69i57.1522j0j7&sourceid=chrome&ie=UTF-8

What is the benefit they state? (5 Points)

Through the use of a face scan, the government can identify and track terrorists. Easier identification is another important factor that has enhanced automatic identification. Unlike in the past, security has been enhanced, and it is easier to tract people with ill intentions.

    1. Are there any privacy risks stated? (2.5 Points)

There are few private risks created such as displaying on one’s critical information on the hands of strangers who may use the same information to robe people.

    1. In your opinion, does the accessibility benefit out way the privacy risk? Explain that opinion. (5 Points)

From my point of view, accessibility benefit out way the privacy risk because it makes it easier and more reliable to know things early in advance and may help in curbing crimes. Thus, it is significant to enhance cyber security measures by all means to remain safe.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask