{"id":402,"date":"2024-04-18T17:11:39","date_gmt":"2024-04-18T17:11:39","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/abcyber\/?p=402"},"modified":"2024-04-18T17:11:39","modified_gmt":"2024-04-18T17:11:39","slug":"journal-14","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/abcyber\/2024\/04\/18\/journal-14\/","title":{"rendered":"Journal 14"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Prompt: <a href=\"https:\/\/clario.co\/blog\/illegal-things-you-do-online\/\">Andriy Slynchuk<\/a> has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p>In my opinion, the worst of the potential cybercrimes that Slynchuk describes is faking an identity online. The primary uses I can think of for someone using a false identity would result in serious harm to others. For example, a criminal may use another person\u2019s identity to empty their victim\u2019s bank account, deceive their victim into sending money, or prey on underage children. These cases would cause detrimental damage and distress to the targeted individuals. Similarly, I find cyberbullying particularly contemptible because it can cause considerable distress and disruption to someone\u2019s life. Not only could being the victim of cyberbullying lead to shame, embarrassment, and depression, but it could also be deadly, driving the victim to suicide. Next is sharing others\u2019 addresses, passwords, and photos online without their consent. Sharing someone\u2019s address and photos could put them in physical danger if they are being stalked or have a substantial online following. While how sharing someone\u2019s address can put them in harm\u2019s way is self-explanatory, uploading pictures could also reveal a person\u2019s location and potentially their daily routines. This could enable an online stalker to find the victim\u2019s location and confront them in person. Additionally, I am including nonconsensually recording VoIP calls because it is a blatant and egregious violation of privacy. It could reveal sensitive personal information, business strategies, and trade secrets. Finally is torrenting because it is a type of copyright infringement that does not offer an apparent way for the copyright holder to recuperate lost revenue. Perhaps with unofficial streaming services, a copyright holder may be able to be reimbursed by suing the person or entity hosting the illegal streaming site because they may be collecting subscription fees or ad revenue. However, because torrenting uses peer-to-peer protocols and is generally decentralized, there is likely no money exchange for providing or watching stolen content. As a result, victims of copyright infringement likely would not be able to seek restitution effectively.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Prompt: Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. In my opinion, the worst of the potential cybercrimes that Slynchuk describes is faking an identity online. The&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/abcyber\/2024\/04\/18\/journal-14\/\">Read More<\/a><\/div>\n","protected":false},"author":26635,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/posts\/402"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/users\/26635"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/comments?post=402"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/posts\/402\/revisions"}],"predecessor-version":[{"id":403,"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/posts\/402\/revisions\/403"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/media?parent=402"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/categories?post=402"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/tags?post=402"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}