Thursday, September 19, 2019

Essay --

ï  ¬ Introduction Along with the fast developments and various applications of the internet comes the improvement of people’s living standard. Undoubtedly the emerging new technology is playing such a significant role in fields like promoting interpersonal interactions, driving global collaborations and increasing the world’s productivity, that our society may not stay as functional as it is now without the existence of the internet. Nevertheless, the internet, due to its complicated form of communications and the lack of either moral or legal control, has also brought about an unprecedented form of deviances and crimes including hacking, online fraud, terrorism, and so forth (Jaishankar, 2011). Among all types of controversial cyber activities, considering the distinct nature of criminals and different motivations, some of them may not have huge negative social impact while others can result in massive loss for both individuals and society. On all accounts, it is indeed of great importa nce to study internet abuse so as to construct a safer community with higher stability for the existence and prosperity of human-beings. To examine online deviances and crimes objectively, both theoretical supports and a large amount of data are required. As for hacking part, the grounded theory is applied so as to systematically and comparatively analyze the similarities and differences between â€Å"good† hackers and â€Å"bad† hackers. When it comes to discussion on online fraud, the breeding ground of cyber fraud, Nigeria, is taken as a typical example for depiction and explanation. In the specific region where the younger generation constructs a morally and legally deviant subculture, the prospect of the state is worth concerning. Organized in a progress... ...me. New York, NY: Basic Books. Powell, B., Carsen, J., Crumley, B., Walt, V., Gibson, H., & Gerlin, A. (2005, September 26). Generation Jihad. Time, 166, 56–59. Retrieved from http://www.time.com/ time/magazine/article/0,9171,1109334-1,00.html Taylor, P. A. (1999). Hackers: Crime and the digital sublime. New York, NY: Routledge. Weimann, G. (2004b). www.terror.net How modern terrorism uses the Internet. Washington DC: United States Institute of Peace. Tsfati, Y., & Weimann, G. (2002). www.terrorism.com: Terror on the Internet. Studies in Conflict & Terrorism, 25, 317–332. Whine, M. (1999). Cyberspace—A new medium for communication, command, and control by extremists. Studies in Conflict & Terrorism, 22, 231–246. Zetter, K. (2008). Israeli hacker â€Å"The Analyzer† suspected of hacking again. Wired. Retrieved from http://www.wired.com/threatlevel/2008/09/the-analyzer-su

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.