ePortfolio entry 12

How does cyber technology impact interactions between offenders and victims?

Cyber technology has had a large impact on how cyber criminals are able to interact with victims especially in cases such as cyber bullying and cyber harassment. Technology has allowed offenders to have access to victims in the current day that completely unseen in previous generations. Offenders today are able to stay completely anonymous by multiple means such as burner accounts that they can delete when reported and create a new one to continue their behavior and virtual private networks that make it increasingly difficult for law enforcement to track down the offender especially so when they are commonly switching servers and creating new accounts. Technology such as home security systems that make use of cameras can also be accessed to invade an victims privacy withing closed doors through hacking methods if the victim had the knowledge on how to secure such systems at all. Offenders that are more malicious can also use simple means like email phishing schemes to try and fool more naive individuals into giving up information that can give offenders access to personal information or temporarily them control to your operating systems. Tracking devices are also widely available in the current day and can be used to unknowingly follow a victim. Stalkers are also able to use things like social media to track individuals that may post about their private life such as their job and locations they are visiting or frequenting, allowing them to spy on the victim completely without their knowledge through completely legal means. On the contrary though, the victims of these cyber crimes are able to take advantage of some of the same applications to protect themselves from offenders. Virtual private networks can make it harder to track down a victims physical location through finding their IP address. Users can also take advantage of built in privacy applications in social media sites such as privatized accounts to limit who can view your posts. Lastly, staying up to date on possible cyber vulnerabilities and schemes will severely limit offenders options and taking advantage of applications such as two factor authentication to further secure accounts can provide much reassurance to users.

Leave a Reply

Your email address will not be published. Required fields are marked *