In no less than 250 words, (1) describe the race, gender, and age characteristics of the child
victims of online sexual predators and discuss some of the common methods used by sex
offenders to dupe their victims into submitting to their perverse demands. (2) If you were
asked to facilitate a presentation on Internet Safety, what would you focus on and why?
The exposure to the Internet is becoming an increasing threat to children and teenagers as
they subconsciously post their photos and much of their private information on social media
pages. The Internet has become the target place for prospecting on young teens by sexual
predators. The molesters capitalize on the naivety of these teenagers and mostly target young
Caucasian girls between 15 to 17 years old (Wolak, Finkelhor, & Mitchel, 2008). Most victims
of these crimes are girls, but also boys who expose their gay sexual orientations have also fallen
victims of these sex assaults. The children sex offenders make use of friendly social media pages
or websites where young girls often subscribe to and share their identities and photos only to
become the next victims of sexual abuse. For instance, MySpace and Facebook have been used
most of the times by sexual offenders to get details of their prospects. The teenagers are either
enticed into meeting the sex offenders who approach them with the deception of creating
romantic friendships (Wolak et al., 2008). Alternatively, from the divulged personal information
the predators stalk and kidnap their victims.
The Internet has become a tool for most interactions not only among teenagers but also
adults. Internet privacy is crucial for anyone to protect themselves from any malicious attacks.
Internet users should avoid putting their personal information in the public domain for everyone
to access. Most websites have privacy settings that allow one to control who accesses their
information. It is also important to discourage online interactions with strangers and even more
arranging private meetings with strangers. Young adolescents should avoid divulging personal
information on dating sites to avoid making them easy targets.
What makes the digital piracy of music so attractive to today’s adolescents? How can we,
as criminal justice professionals, minimize digital piracy among this particular population?
Digital piracy is the act of copying any online content that has copyrights and distributing
it without proper consent. Piracy has been prevalent among adolescents with the ease of access to
computers and the Internet. The availability of sites where one can freely download the music
makes digital privacy attractive to most adolescents. There are various download stores and
music streaming channels that have gained the attention of most youth (Gunter, Higgins & Gealt,
2010). The use of MP3 over compact discs mainly contributes to the increasing demand for
digital music. The adolescents are mostly enticed with sharing music and videos over the
Internet, and the easiest and cheapest way of obtaining and distributing this content is through
duplicating from the web.
It is important to create awareness among the adolescent’s population of the illegality of
the practice of digital piracy and the legal implications when found guilty of duplicating and
distributing video, music or voice content without authors permissions. It is vital that the moral
decay of piracy is not condoned in schools or even at homes. It, therefore, requires a
collaborative approach both in institutions of learning as well as parenting to fight this rising
criminal behavior among the youth. Learning organizations need to incorporate the piracy
concerns into the curriculums to emphasize the consequences and legal implications for
committing digital crimes (Gunter et al., 2010). As parents give their children computers, they
should discourage them from engaging in digital piracy. The sole purpose is to kill the immoral
trend of theft in the coming generations.
Criminological theories are often used to explain the reasons or causes of certain behaviors.
Other than Rational Choice theory and Social Learning theory, identify and discuss
another psychological or sociological theory that could be introduced to explain
cyberstalking? Present a persuasive argument as to why you selected this particular theory.
The emotional theory...