Cyber Technologies Interaction Between Offenders and Victims and How we approach Cyber-Policys (Journal #7)

It is known that cyber technology is a powerful and helpful device to use in order to protect ourselves. It is also important to understand who can obtain this power and how they will use it. Unfortunately in our day and age this power is abused by anonymous users around the world. That is the unsettling part of it all. We do not know who is behind that screen that is stealing our information, harassing us, and even using the platform to anonymously bully people. “Anonymous Communications” is where these things can happen. This is described to be when an individual that wants to cause harm hides anonymously online, which makes it easier for that individual to target victims without having any consequences with their actions. This can also expand the reach of that anonymous user from bullying a person online to stealing sensitive information from corporate companies. This also makes it difficult for law enforcement to track that individual down. With my own personal experience, I was a victim of cyberbullying. Which is where anonymous individuals go on social media platforms and either spread false accusations about you or bully you one on one. I remember this happening to me where an anonymous individual was spreading false information about me on different social media platforms. Thankfully that individual was stopped. 

There are many policies to follow in cyber security and as we know cyber security is evolving in front of our very own eyes. One main concept in cyber policy should be “Cyber Education and Awareness” promoting awareness for this especially to the general public, policymakers, and businesses can help individuals be aware of the different cyber threats there are in the world. Keeping individuals aware means that smarter decisions will be made to stop cyber attacks and keep businesses, government, and our people safe.    

Sources:

Full article: Offending and Victimization in the Digital Age: Comparing Correlates of Cybercrime and Traditional Offending-Only, Victimization-Only and the Victimization-Offending Overlap (tandfonline.com)

What is Cyber Policy and Why is it Important? | Utica University Online

Leave a Reply

Your email address will not be published. Required fields are marked *