crime of the internet

Anonymous

Question Description

must include properly formatted APA citations and references. Make sure you answer each part of question, and number each question. no cover sheet just answer question with the correct word count. Must use your own words. The book I am using is the crime of the internet by Frank Schmallger and Michael Pittaro. 250 words for each questions

1. In no less than 250 words, (1) describe the race, gender, and age characteristics of the child victims of online sexual predators and discuss some of the common methods used by sex offenders to dupe their victims in to submitting to their perverse demands. (2) If you were asked to facilitate a presentation on Internet Safety, what would you focus on and why?

2. What makes the digital piracy of music so attractive to today’s adolescents? How can we, as criminal justice professionals, minimize digital piracy among this particular population?

3. Criminological theories are often used to explain the reasons or causes of certain behaviors. Other than Rational Choice theory and Social Learning theory, identify and discuss another psychological or sociological theory that could be introduced to explain cyberstalking? Present a persuasive argument as to why you selected this particular theory.

4. As an investigator with the newly created cyber crime unit of the New York Attorney General’s office, you have been tasked with setting up a cyber sting operation to investigate and apprehend an International child pornography ring in which several prominent New Yorkers are suspected of participating. What are some suggestions for setting up a sting operation of this magnitude?

5. Compare AND contrast the profiles of the "traditional" terrorist with that of the cyber terrorist. Be sure to note their similarities and differences.

Tutor Answer

henryprofessor
School: Cornell University

Attached.

Question 1
In no less than 250 words, (1) describe the race, gender, and age characteristics of the child
victims of online sexual predators and discuss some of the common methods used by sex
offenders to dupe their victims into submitting to their perverse demands. (2) If you were
asked to facilitate a presentation on Internet Safety, what would you focus on and why?
The exposure to the Internet is becoming an increasing threat to children and teenagers as
they subconsciously post their photos and much of their private information on social media
pages. The Internet has become the target place for prospecting on young teens by sexual
predators. The molesters capitalize on the naivety of these teenagers and mostly target young
Caucasian girls between 15 to 17 years old (Wolak, Finkelhor, & Mitchel, 2008). Most victims
of these crimes are girls, but also boys who expose their gay sexual orientations have also fallen
victims of these sex assaults. The children sex offenders make use of friendly social media pages
or websites where young girls often subscribe to and share their identities and photos only to
become the next victims of sexual abuse. For instance, MySpace and Facebook have been used
most of the times by sexual offenders to get details of their prospects. The teenagers are either
enticed into meeting the sex offenders who approach them with the deception of creating
romantic friendships (Wolak et al., 2008). Alternatively, from the divulged personal information
the predators stalk and kidnap their victims.
The Internet has become a tool for most interactions not only among teenagers but also
adults. Internet privacy is crucial for anyone to protect themselves from any malicious attacks.
Internet users should avoid putting their personal information in the public domain for everyone
to access. Most websites have privacy settings that allow one to control who accesses their
information. It is also important to discourage online interactions with strangers and even more

arranging private meetings with strangers. Young adolescents should avoid divulging personal
information on dating sites to avoid making them easy targets.
Question 2
What makes the digital piracy of music so attractive to today’s adolescents? How can we,
as criminal justice professionals, minimize digital piracy among this particular population?
Digital piracy is the act of copying any online content that has copyrights and distributing
it without proper consent. Piracy has been prevalent among adolescents with the ease of access to
computers and the Internet. The availability of sites where one can freely download the music
makes digital privacy attractive to most adolescents. There are various download stores and
music streaming channels that have gained the attention of most youth (Gunter, Higgins & Gealt,
2010). The use of MP3 over compact discs mainly contributes to the increasing demand for
digital music. The adolescents are mostly enticed with sharing music and videos over the
Internet, and the easiest and cheapest way of obtaining and distributing this content is through
duplicating from the web.
It is important to create awareness among the adolescent’s population of the illegality of
the practice of digital piracy and the legal implications when found guilty of duplicating and
distributing video, music or voice content without authors permissions. It is vital that the moral
decay of piracy is not condoned in schools or even at homes. It, therefore, requires a
collaborative approach both in institutions of learning as well as parenting to fight this rising
criminal behavior among the youth. Learning organizations need to incorporate the piracy
concerns into the curriculums to emphasize the consequences and legal implications for
committing digital crimes (Gunter et al., 2010). As parents give their children computers, they

should discourage them from engaging in digital piracy. The sole purpose is to kill the immoral
trend of theft in the coming generations.
Question 3
Criminological theories are often used to explain the reasons or causes of certain behaviors.
Other than Rational Choice theory and Social Learning theory, identify and discuss
another psychological or sociological theory that could be introduced to explain
cyberstalking? Present a persuasive argument as to why you selected this particular theory.
The emotional theory...

flag Report DMCA
Review

Anonymous
Thank you! Reasonably priced given the quality not just of the tutors but the moderators too. They were helpful and accommodating given my needs.

Similar Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors