{"id":350,"date":"2021-04-28T22:13:31","date_gmt":"2021-04-28T22:13:31","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/byeab001\/?p=350"},"modified":"2021-04-28T22:13:32","modified_gmt":"2021-04-28T22:13:32","slug":"eportfolio-entry-12","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/byeab001\/2021\/04\/28\/eportfolio-entry-12\/","title":{"rendered":"ePortfolio entry #12"},"content":{"rendered":"\n<p>1.<strong>How does cyber technology impact interactions between offenders and victims?<\/strong><\/p>\n\n\n\n<p>Cyber technology is a computer technology that involves the internet or cyberspace.&nbsp;Although there are many befits that cyber technology offers users, it can also be used to harm people.&nbsp;Throughout the years there has been an increase in cybercrimes, and these crimes threaten a person, a&nbsp;company, or a nation&#8217;s security&nbsp;and financial health. This intern creates the dynamics of offenders and victims. Cyber technology impacts the&nbsp;interaction&nbsp;between victims and offenders&nbsp;in many aspects. For example, the internet is one of the most powerful tools used in our society.&nbsp;As important and useful as the&nbsp;internet&nbsp;is,&nbsp;it&nbsp;opens&nbsp;a lot of doors&nbsp;to hurt and victimize people in a large proportion.&nbsp;This allows offenders to target&nbsp;victims&nbsp;and take&nbsp;personal information of people they are trying to hurt or harass in real life.&nbsp;Almost any form of social media can be used as an example, were&nbsp;people&nbsp;post and share&nbsp;about their&nbsp;life&#8217;s&nbsp;which in some cases is considered person information,&nbsp;and also&nbsp;sharing there whereabout. This kind of information especially sharing your whereabouts can aid an&nbsp;offender to stalk or even&nbsp;harm a person. There was a&nbsp;news&nbsp;headline in Japan&nbsp;where a man killed nine people through Twitter. They called him the \u2018Twitter killer\u2019.&nbsp;These kinds of news show how cyber technology has impacted interactions.&nbsp;A lot of predators thrive on the internet, trying to bait their prey into doing what they want, shows like how to catch a predator Is a good example, it brings to light the possibility of&nbsp;criminal&nbsp;behavior&nbsp;that occurs in cyber technology.&nbsp;The interaction between offenders and victims has changed a lot because of technologies, however,&nbsp;these same technologies&nbsp;are also helping&nbsp;victims&nbsp;to get justice&nbsp;for the bad things that have happened to them.&nbsp;Moreover, cyber technology developments will eventually decrease the crimes that are taking place.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1.How does cyber technology impact interactions between offenders and victims? Cyber technology is a computer technology that involves the internet or cyberspace.&nbsp;Although there are many befits that cyber technology offers users, it can also be used to harm people.&nbsp;Throughout the years there has been an increase in cybercrimes, and these crimes threaten a person, a&nbsp;company,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/byeab001\/2021\/04\/28\/eportfolio-entry-12\/\">Read More<\/a><\/div>\n","protected":false},"author":16668,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/posts\/350"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/users\/16668"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/comments?post=350"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/posts\/350\/revisions"}],"predecessor-version":[{"id":351,"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/posts\/350\/revisions\/351"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/media?parent=350"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/categories?post=350"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/tags?post=350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}