How does cyber technology impact interactions between offenders and victims?
Cyber technology creates a very easy route for ways to impact interactions between offenders and victims. Due to the fact that so much that goes into the internet deals with a combined amount of information, offenders use many methods to get involved into interactions with victims that will create a avenue for crimes to be committed. The internet is not a one way path from one person to another so it is very easy for people to fake an identity to gain a personal relationship with possible victims and gain information needed through a open search of the internet. It is very easy to find information and decipher that information to find weaknesses. One method that cyber technology impacts interactions is through the act of “catfishing” which is the act of stealing an online identity of someone and using that to lure a person into a place of comfort and create a relationship with someone to gain their trust. This is a very often occurring problem that happens at such a high rate that there was a television show created due to the problem it created.
Through phishing there is a blanket email or message sent out that tries to lure people into a link that will lead them outside of their safe space or firewall. Once the link is created, access to personal information and files becomes instantaneous. Though these emails are usually generic, the method that this type of email occurs is rapidly changing. People trying to scam have created methods of finding out email information for companies and information about a persons life or position that may customize the interaction and create a instance of realism where a victim will be more inclined to press a link.
In both of these ways I spoke about, the way cyber technology has been used has greatly impacted the way people and their offenders interact. As an always adapting, ever changing crime spree, people are becoming or vigilant with their interactions with the internet but there will always be ways that may be overseen by any user. Moving forward more advances by offenders will be made and we will all have to adapt to the changes and create a space of understanding with how these criminals enter our systems.