Journal #12: How does cyber technology impact interactions between offenders and victims?


Cybertechnology has bridged the gap for interactions between offenders and victims in many ways. There has never been an easier time, in history, where someone can hide their identity online. The increased possibility of anonymity has allowed offenders to hide behind a screen and mask their intentions. This has made it easier to manipulate and exploit others without a thought about consequences. This has led to a larger uptick in cyberbullying. This is especially true within the demographic of teenagers/adolescents. Offenders can utilize cybertechnology to harass and intimidate their victims using multiple anonymous accounts. This is usually done through social media or messaging apps and has provided offenders with a large pool of potential victims. Another impact observed is online predation. Cybertechnology can and has been used to groom and exploit vulnerable victims like children and teenagers for sexual means. They pose as someone trustworthy, pretending to be someone the same age as the victim or adopting a false “big brother” or “big sister” role and after enough time they engage in extremely harmful behaviors. This also brings up the topic of distribution of revenge and child pornography. Offenders may solicit pictures from underage victims, posing as an underage person themselves to procure explicit photos or videos. Some even distribute explicit photos of a consenting adult as a form of revenge or coercion, sometimes for their own fun and sometimes for a financial incentive. The last example is identity theft. After receiving a victims private, personal information (rather by means of malware, hacking etc.) they can impersonate their victims online. This includes credit card fraud, stealing online accounts like emails, social media or bank accounts, tax identity theft or even employment identity theft. Overall, cyber technology may have introduced new and exciting ways to navigate the digital landscape, it’s important to evaluate the risks and inherent volatility of it as well. Not protecting yourself when using  it, could be as detrimental as any real world tragedy.

Leave a Reply

Your email address will not be published. Required fields are marked *