Journal Entry #11 (Module 12)

Date Created: 07/28/2024

Topic: Some of the Illegal Things Done by Internet Users According to Andriy Slynchuk

In his insightful examination of online behavior, Andriy Slynchuk elucidates eleven activities that many internet users engage in without realizing they may be violating the law. Slynchuk highlights various practices such as torrenting copyrighted material, sharing passwords for subscription services, and even using ad blockers.

Torrenting, which involves downloading and sharing copyrighted movies, music, or software without authorization, is a prevalent yet illegal activity that can lead to severe penalties. Similarly, sharing passwords for services like Netflix or Hulu, while often seen as a benign act among friends and family, breaches the terms of service and copyright regulations.

Ad blockers, designed to enhance user experience by removing intrusive advertisements, can undermine the revenue model of content creators and might breach terms of use agreements.

Expanding further, Slynchuk delves into the risks associated with hacking, phishing, and doxing. Hacking, which involves unauthorized access to computer systems, is a clear violation of cybersecurity laws globally.

Phishing, the act of deceptively acquiring sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity, constitutes serious fraud and identity theft.

Doxing, which entails publicly sharing private information about individuals without their consent, can lead to harassment and endangers the victim’s safety, raising significant legal and ethical concerns.

Moreover, Slynchuk points out other illegal online behaviors such as cyberbullying, spreading malware, and engaging in online piracy.

Cyberbullying, which can involve harassment, defamation, or threats over digital platforms, has serious psychological impacts on victims and can result in criminal charges. Spreading malware, viruses designed to disrupt, damage, or gain unauthorized access to computer systems, is another criminal activity that endangers cybersecurity on a broad scale.

Lastly, online piracy, involving the illegal distribution and consumption of digital media, is rampant but stands as a blatant infringement of intellectual property rights. Slynchuk’s detailed articulation compels internet users to reconsider their online actions and understand the potential legal ramifications of their digital engagements.

Sources

Clario. (n.d.). Illegal things you do online. Clario. Retrieved fromhttps://clario.co/blog/illegal-things-you-do-online/

Published by: gbafu001

Welcome to my ePortfolio! My name is Gloria Kandy Bafunye, and I'm a senior at ODU, focusing on cybersecurity and information technology. Currently, I'm deeply immersed in coursework that delves into the intricacies of securing digital infrastructures and leveraging technology for organizational efficiency. With a passion for healthcare and a strong background in IT, my goal is to transition into a role where I can merge these two worlds seamlessly. Specifically, I aspire to become an IT project manager or IT director within a hospital setting. My experience working within a hospital environment has given me invaluable insights into the software and systems utilized for patient care and administrative functions. I'm eager to leverage this knowledge to drive innovation and streamline processes that ultimately enhance patient outcomes. In addition to my academic pursuits, I actively seek opportunities to expand my skill set and stay current with industry trends. I believe in the power of continuous learning and strive to remain adaptable in an ever-evolving technological landscape. Thank you for visiting my ePortfolio. I invite you to explore further and learn more about my journey and accomplishments. Let's connect and collaborate on ways to leverage technology for the betterment of healthcare delivery.

Categories CYSE200S, CYSE200T, Journal, Journal EntriesLeave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *