{"id":337,"date":"2023-11-19T19:22:47","date_gmt":"2023-11-19T19:22:47","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/?p=337"},"modified":"2023-11-19T19:22:47","modified_gmt":"2023-11-19T19:22:47","slug":"11-illegal-things-internet-users-unknowingly-do","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/2023\/11\/19\/11-illegal-things-internet-users-unknowingly-do\/","title":{"rendered":"11 Illegal Things Internet Users Unknowingly Do"},"content":{"rendered":"\n<p><em>Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what<\/em> <em>the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;The eleven things internet users do that may be illegal are described below.<\/p>\n\n\n\n<p>1. Using unofficial streaming services<\/p>\n\n\n\n<p>2. Using torrent services&nbsp;<\/p>\n\n\n\n<p>3. Using copyrighted images<\/p>\n\n\n\n<p>4. Sharing passwords, addresses, and photos of others<\/p>\n\n\n\n<p>5. Bullying and trolling<\/p>\n\n\n\n<p>6. Recording a VoIP call without consent<\/p>\n\n\n\n<p>7. Faking your identity online<\/p>\n\n\n\n<p>8. Using other people\u2019s internet networks<\/p>\n\n\n\n<p>9. Collecting information about children<\/p>\n\n\n\n<p>10. Extracting audio from youtube<\/p>\n\n\n\n<p>11. Illegal searches on the internet<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Of these eleven listed, I believe the five most serious violations are collecting information about children, illegal searches on the internet, bullying and trolling, using other people\u2019s internet networks and faking your identity online. Collecting information about children is a terrifying consequence of the internet; their privacy should be heavily prioritized. It is important we protect them from the dangerous people of the internet that want to take advantage of them. Illegal searches on the internet are another terrible price of having the internet, there are lots of bad things that can be uploaded to the dark web or on unmoderated websites. This type of crime network should be shut down and handled swiftly so that illegal activity cannot occur.&nbsp;<\/p>\n\n\n\n<p>Bullying and trolling are also detrimental, as cyberbullying can increase to tortuous levels, especially with the use of deep fakes or fake photos. Words can be very hurtful and damage one\u2019s self-esteem. People can be extra cruel on the internet given the shield of the computer screen. Using other people\u2019s internet networks is another example. Doing this can increase the bandwidth usage on their network, which can slow down the owner\u2019s computers and other devices. Another danger is that people can use other people\u2019s internet networks to make illegal searches, prompting the owner to be wrongly accused of searching up something he never did. This can be done by the thief using a wireless adapter, sitting in the parking lot when nobody is home, or by sneaking around near the back. It is important to secure your networks. Finally, faking your identity online. This is dangerous as it can create confusion, such as someone pretending to be someone else. This occurs with fake social media accounts, fake emails used for phishing attacks, and with social engineering attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;The eleven things internet users do that may be illegal are described below. 1. Using unofficial streaming services 2&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kendaltaylor\/2023\/11\/19\/11-illegal-things-internet-users-unknowingly-do\/\">Read More<\/a><\/div>\n","protected":false},"author":27206,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/posts\/337"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/users\/27206"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/comments?post=337"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/posts\/337\/revisions"}],"predecessor-version":[{"id":338,"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/posts\/337\/revisions\/338"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/media?parent=337"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/categories?post=337"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/tags?post=337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}