Jorge Romo
Professor Bowman
CYSE200T
04DEC22
ePortfolio Entry #7
Cyber technology impacts interactions between offenders and victims tremendously. It impacts victims because it makes them vulnerable to offenders constantly. Using technology offenders can easily learn all about a specific victim or target without the victims knowledge. The offender can learn about where the victim works through websites like linked in or facebook. They can learn about their location using different spyware or if the victim is posting about it on their social media. That is why we all should be using cyber security by creating our profiles as private and making sure we only have people we know on our social media while refraining from showing what we are constantly doing or where we are.
When creating cyber policies and infrastructures we should use the short-arm predictive approach to counteract escalating threats of cyber attacks and the offenders who may target us individually or as a society. We should be on constant alert and see what vulnerabilities we have along with what threats we are exposed to. We should be updating our software and firewalls while maintaining settings to help protecting our personal identifying information and our whereabouts. “People in various parts of the world can communicate in real time on a variety of devices such as cell phones, tablets, or computers. A photo, video, text message, or email may be viewed by a single individual, shared with another or “go viral” and spread to hundreds of thousands of users in a matter of minutes. Technology is continuously improving, which in turn influences the way that people interact by promoting global communication and allowing individuals to connect with others more readily. However, the Internet and related technology have also become new mediums for misconduct, in that communications via the Internet can be used to threaten, harass, intimidate, and cause harm to others (Recupero, 2008).”(Hazelwood & Koon-Magnin, 2013) While technology develops, we as a society have to continue to improve as well to stay protected and use the short-arm predictive approach.
Work Cited
Cyber Stalking and Cyber Harrassment.pdf – Google Drive
Recupero, P. R. (2008). Forensic evaluation of problematic internet use. Journal of the
American Academy of Psychiatry Law, 36, 505-514.