Tuesday, June 23, 2020
Research on Cyber Bullying & Internet Protection System - 825 Words
Research Paper on Cyber Bullying and Internet Protection System (Essay Sample) Content: Name:Professor:Course:Date:Research paper on Cyber bullying and internet protection systemCyberbullying refers to a situation where a kid or teen is harassed, threatened, humiliated, tormented and embarrassed or targeted by fellow child or teen using mobile phones, the internet, social and digital technologies (Tokunaga, 281).Increased use of computers characterizes the modern-day where the internet has become available to everyone in the whole world. Though the internet has brought about many advantages in the day to activities of various people, organizations, and states in the world, it also has increased problem-related to cyber bullying and security. Cyber security can be referred to the effort of people to protect personal information and digital machines from internet attacks. Therefore, actions should be put in place to safeguard children from malicious software and individuals on the internet; it is important to come up with cyber security systems so as to cu rb cyber bullying (Patchin, Justin, and Sameer, 152). Hence, this paper is going to highlight and discuss some forms of cyberbullying and whether there should be a cyber protection system that can help to reduce this growing internet attacks..The most prevalent form of cyber bullying is through mail and text messages. In this situation, culprits send threatening, harassing, and tormenting messages to children and teenagers. On receiving such messages, the children feel insecure which may make them skip school as they fear to face consequences. In this case, a security system should be developed by the Internet service providers to ensure that such messages are detected to prevent them from reaching kids. The security system is a significant milestone since this has been considered the easiest way to send threatening and tormenting messages to children. This can be the most efficient way to curb rampant cyberbullying since innocent children and teens become psychologically disturbed when they receive such texts.Another form of cyber bullying is through the use of social networks such as Facebook, Twitter, Instagram. Here kids get bullied when there is the spread of negative messages; picture or video publicly displayed for everyone on the site. Usually, this incidence humiliates and embarrasses individuals, and they develop poor self-esteem as they feel so ashamed and betrayed (Patchin, Justin, and Sameer, 152). Also, in this sites, kids can be able to access nude pictures and videos and evil influence that may lead them to engagement in dangerous early sex, alcohol, and drugs. This can highly affect the academic performance of the school going kids and teenagers as they may be devoting a lot of time on the internet (Tokunaga, 282). Therefore, it is important for the social network service providers to develop mechanisms that will ensure that individuals who are under the age of eighteen years do not pass rumors, abusive and fun videos via their network. The c yber security measure can be possible by setting a simpler forum for kids and set up security requirement like a national identity card for those who intend to join such network.Most importantly, cyber security starts with an individual understanding the various forms of cyber attacks that they are likely to face. After having sufficient knowledge about this, it is the responsibility of one to put simple security measures like passwords and privacy. There are diverse forms of threats, and this may be regarded to be of different levels and risks to individuals and more specifically to personal information of kids and their high-tech machines like computers, laptops, and mobile phones. Therefore, when there is a higher likelihood of an attack, it is important to come up with a more sophisticated security system that can minimize internet threats (Keith, Susan, and Michelle, 226).Internet protection system should deal with threats ranging from malicious codes that are well-known as spy ware, malware, and computer viruses. Computer viruses have the ability to delete the complete operating system of a personà ¢Ã¢â ¬s computer. Also, these viruses pose a risk as hackers can be able to get access to all personal data kept the infected computers for personal benefit.Therefore, it is important for people to avoid intrusions into their technological systems at all cost by use of cyber security systems. Cyber protection can be achieved when one acquires an antivirus software that ensures frequents checks so as to ...
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.