{"id":264,"date":"2022-12-10T02:41:22","date_gmt":"2022-12-10T02:41:22","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/chelseaturner029\/?p=264"},"modified":"2022-12-10T02:41:31","modified_gmt":"2022-12-10T02:41:31","slug":"cyse-assignment-7-how-does-cyber-technology-impact-interactions-between-offenders-and-victims-how-should-we-approach-the-development-of-cyber-policy-and-infrastructure-given-the-short-arm-of-p","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/chelseaturner029\/2022\/12\/10\/cyse-assignment-7-how-does-cyber-technology-impact-interactions-between-offenders-and-victims-how-should-we-approach-the-development-of-cyber-policy-and-infrastructure-given-the-short-arm-of-p\/","title":{"rendered":"CYSE Assignment #7 &#8211; How does cyber technology impact interactions between offenders and victims? How should we approach the development of cyber-policy and infrastructure given the &#8220;short arm&#8221; of predictive knowledge?"},"content":{"rendered":"\n<p>CW: mentions of child pornography and exploitation<\/p>\n\n\n\n<p>The wonders of cybertechnology might have revolutionized the world for the better, but it also created niches for\u2026certain types of criminals. The kinds of people you never want to meet in real life. It\u2019s a harsh reality of working in these types of cybersecurity fields, because sexual exploitation of children and human trafficking is sadly a large part of cybercrimes committed. &nbsp;<\/p>\n\n\n\n<p>Chatrooms, social media pages, and forums are also used to groom young people. There are many infamous YouTube personalities who have been caught having inappropriate contact with minors. And who can forget the absolute abhorrence that was the Josh Duggar escapade, in which a prosecutor claimed that the images and videos he possessed were some of the worst he\u2019d ever seen.<\/p>\n\n\n\n<p>However, that isn\u2019t the extent of online offenders. If you have kids that play video games, beware of things called loot boxes. They are basically legalized gambling. You can pay for fake stuff with real money to get a loot box which gives you a random bit of in-game items or currency. I find microtransactions in video games deplorable in general. Online multi-player games are also mediums in which prospective pedophiles groom young children and teenagers, especially popular games like <em>Minecraft<\/em> and <em>Fortnite<\/em>. I strongly believe that there needs to be more protections concerning children being online, and not just a bunch of reactionary virtue-signaling from parents and politicians who blame video games for real-life violence.<\/p>\n\n\n\n<p>Sorry, I kind of climbed on a soapbox there. Though I think developing cyber-policies regarding minors and online video games is essential to stop this awful child-gambling culture and prevent child exploitation. Games should be fun, not money-farming casinos. Of course, we can never predict what\u2019s going to happen in the future in terms of cyber-techology. Unchecked capitalism isn\u2019t going to fade away in an instant and we have to adapt to avoid the fallout.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CW: mentions of child pornography and exploitation The wonders of cybertechnology might have revolutionized the world for the better, but it also created niches for\u2026certain types of criminals. The kinds of people you never want to meet in real life. It\u2019s a harsh reality of working in these types of cybersecurity fields, because sexual exploitation &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/chelseaturner029\/2022\/12\/10\/cyse-assignment-7-how-does-cyber-technology-impact-interactions-between-offenders-and-victims-how-should-we-approach-the-development-of-cyber-policy-and-infrastructure-given-the-short-arm-of-p\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">CYSE Assignment #7 &#8211; How does cyber technology impact interactions between offenders and victims? How should we approach the development of cyber-policy and infrastructure given the &#8220;short arm&#8221; of predictive knowledge?<\/span><\/a><\/p>\n","protected":false},"author":22819,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/chelseaturner029\/wp-json\/wp\/v2\/posts\/264"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/chelseaturner029\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/chelseaturner029\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chelseaturner029\/wp-json\/wp\/v2\/users\/22819"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chelseaturner029\/wp-json\/wp\/v2\/comments?post=264"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/chelseaturner029\/wp-json\/wp\/v2\/posts\/264\/revisions"}],"predecessor-version":[{"id":265,"href":"https:\/\/sites.wp.odu.edu\/chelseaturner029\/wp-json\/wp\/v2\/posts\/264\/revisions\/265"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/chelseaturner029\/wp-json\/wp\/v2\/media?parent=264"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chelseaturner029\/wp-json\/wp\/v2\/categories?post=264"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chelseaturner029\/wp-json\/wp\/v2\/tags?post=264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}