Professor Sarah Martin
28 May 2017
Word Count: 1547
How much information do you share with others on the Internet? More and more
people share information about themselves over the web without thinking about the risks
associated with increasing technology in their lives. With new social media apps such as
Twitter, Instagram, and Facebook it is more common for the average individual to put
their lives on display for others to see. While using these apps could be beneficial for
connecting with family and friends, it also opens the door for criminals to select potential
victim behind the screen of a computer. Therefore, technological advancements have
increased the risk of becoming a target of cybercrimes.
As technology has advanced, the rate of Internet crimes has risen as well. There
are many different types of cybercrimes that are ever so prominent with our society’s
technological advancements. A few of these cybercrimes include cyber stalking, identity
fraud, and common computer scams. Cyberstalking involves harassing another individual
through utilizing electronic forms of communication. The use of social media has created
a convenient way to share updates with your friends and family but it has become
common today to dismiss the dangers of who has access to that information.
With enough information out in the open, it is possible for an individual to know all
about you without ever formally meeting you. Furthermore, identity fraud is a type of
cybercrime that involves stealing personal/ private information for self-gain. This can be
done to a victim without their knowledge. Having your identify stolen can be very
damaging to an individual’s life if it gets into the wrong hands, as it gives them access to
private records as well as your bank accounts. Computer scams are scams that you see
more commonly when you are on the Internet. These scams target individuals by
promoting someone eye catching that entices them to click on it. Once it is clicked on it
opens the door to virus’s or potential hackers. These scams can also be in the form of an
email that weasels its way through the spam folder. Once the virus or hacker has control
of your computer, the information you have saved is no longer protected. All of the
different types of cybercrimes go to show that the Internet and rising technology has
given individuals numerous opportunities to commit these crimes.
There are also risk factors that go hand and hand with what should and shouldn’t
be shared on the Internet or be put on display for public view. Nowadays there are social
media apps that allow anybody to post pictures of what they are doing, where they are
going, and who they are with. The risk of publicly promoting your every move is that
with so much personal information out for display it makes it extremely easy for a cyber
offender to pick their next victim. According to Matti Näsi in the article “Cybercrime
Victimization among Young People: A Multi-Nation Study” young people are at a much
higher risk of becoming a victim of a cybercrime. The evidence shows that in survey
taken in 2012 “5.3% of people ages 15- 24 reported being a victim of a cybercrime, while
roughly 10% of Internet users reported being a victim of online scams or phishing” (Näsi
204). The target of younger victims could simply be due to their more active approach on
the Internet. Another risk factor associated with cybercrime is the ability to advertise it as
something else. Many people assume that if they see a link shared by a friend online that
it is harmless, but there are numerous ways of phishing through these means. As
computers get hacked it gives the hacker the ability to share virus’s hidden in appealing
links that make it intriguing to click on. Once the link is clicked it can be a matter of
seconds before you are the next victim. As technology advances and becomes more of a
common necessity, more and more people tend to rely on their computers and Internet to
keep track of their public and private information. The reliance on our electronic devises
for vital information makes it much easier for a cyber offender to pick their potential
As technology rises, the risk factors and types of cybercrimes previously stated
are subject to increase. Yet some readers may challenge my view by insisting that
advancements in technology have actually helped fight crime. In the CNBC news article,
“The High-Tech Future of Fighting Crime” author Julia Boorstin sheds light on the new
technological tools that are being used against criminals. In Boortstin’s view, she
describes that there are new tools such as “remote-control aerial vehicles give law
enforcement eyes from above to help with everything from bomb threats to search-andrescue, hazmat spills and active-shooter situations” (Boortstin). Although I grant that
advancing technology has helped law enforcement fight crimes on the ground, I still
maintain that these advancements have created simpler mechanisms to commit
Despite the advancements that have aided law enforcement fight cybercrimes;
there are significant weaknesses that play a role in the prevalence of these criminal
occurrences. Although there are security programs offered for cyber tools there are
loopholes that a persistent offender may get through. Some of these programs do not have
strict guidelines such as required changes in passwords or procedures to lock out an
account. In businesses however, the sensitive information stored in computers are subject
to the same loopholes. Once an offender breaks through the server the information is up
for display. This could give a cyber offender the opportunity to get access to employee
information, or banking accounts. In the journal “Cybercrime and Social Ties” author
E.R. Leukfeldt maintains that technology and social ties both play a vital role in the
weaknesses of security against cybercrimes. Leukfeldt states that technology gives
offenders a place to network or recruit, while cybercrime plays a social role of
“recruitment through social contacts and encounters on the street” (Leukfeldt 243). In
making this comment, he urges readers to identify the different approaches to cybercrime
and use proactive strategies to avoid them.
It is important to keep in mind the weaknesses of cyber security, and know
strategies to avoid falling victim to a cybercrime. In her periodical, “FBI Director:
Information Sharing Is Key to Battling Cyber-Crime,” Fahmida Rashid explains how
cyber threats are growing and that the FBI is taking it into serious matters. According to
Rashid, “each of the 56 FBI field offices around the country now has a dedicated cybersecurity squad, and there are 1,000 agents and analysts focused on cyber-threats”
(Rashid). This statement has important implications for the broader domain of steps we
can take to protect ourselves from cybercrime. One vital strategy that is often overlooked
is changing and creating different passwords. Creating different passwords for different
information makes it more difficult for hackers to get access to more than one account.
Furthermore, using a creative password that only you would know is another way of
ensuring others won’t gain access. Another strategy to avoid cybercrimes includes
providing more than one verification backup on each account. This could be a backup
email address and a phone number; that way, there is more than one wall to get through.
A simple yet effective strategy to protect oneself from a cybercrime is to report it when it
happens. Many companies offer security services, such as notifications that alert you
when something looks off with your account. Each of these notifications is important to
thoroughly check, and report before it’s too late. The essence of these strategies is that
there are multiple ways that an individual can easily take to protect themselves on the
Ultimately, what is at stake here is that the technological advancements we make
each day add to the growing risk of cybercrimes. As beneficial as it is to use the Internet
and social media apps to communicate with friends or family, this information you share
online is never truly private. Sharing too much information about yourself or storing
sensitive documents in your hardware can have a lasting negative impact for a victim if it
gets into the wrong hands. Crimes such as identify theft, stalking, and phishing scams are
just a few of the cybercrimes that are lurking in the cyber world. Being aware of the risk
factors, identifying weaknesses, and utilizing strategies to avoid cybercrimes before they
happen will serve as vital protection for Internet users. Next time before you share
personal or private information on the Internet, think twice about what you are posting
before it gets into the wrong hands of someone from the dark web.
Boorstin, Julia. "The High-Tech Future of Fighting Crime." CNBC. CNBC, 21 Apr.
2017. Web. 25 May 2017.
Leukfeldt, E. "Cybercrime and Social Ties." Trends in Organized Crime, vol. 17, no. 4,
Dec. 2014, pp. 231-249. EBSCOhost.
Näsi, Matti, et al. "Cybercrime Victimization among Young People: A Multi-Nation
Study." Journal of Scandinavian Studies in Criminology & Crime Prevention,
vol. 16, no. 2, Dec. 2015, pp. 203-210. EBSCOhost.
Rashid, Fahmida Y. "FBI Director:Information Sharing Is Key to Battling Cyber-Crime."
Eweek, 02 Mar. 2012, p. 1. EBSCOhost.
Professor Sarah Martin
24 May 2017
Word Count: 1,513
Hungry for Technology
When I think of technology and food, the first thing that comes to mind is my Instagram
feed. All the yummy food that bloggers and foodies post to their social media feeds makes me
think happy thoughts. However, there is more to food and technology than just pictures of food
and trying to find the location they’re from. Advancement in communication and technology are
helping with the understanding of the food industry and community. In this day in age we are
becoming more aware of what we eat, where it comes from, how it’s made and why it matters.
This is now the golden age of technology and there are many things in our everyday lives that it
affects without us paying much attention. Technology isn’t just one thing; it’s a broad word that
includes information, biotechnology, and automation to name a few. In addition, corporations,
government offices, researchers and scientists are using technology to track data, help farmers
and promote food to consumers. Our countries population is growing by the minute, not to
mention the global population as well. We are connected to one another so easily through
technology. As this number grows, so do our needs. Technology is imperative to help us as
societies understand the importance of food and how our “hunger” is connected to
technology like never before.
As consumers, we do our best to understand what we are putting in our bodies. For the
most part we read labels, do research, look online and try to be healthy. The reality is many
people do not do the things I listed. Genetically modified food ingredients or what we know
them by GMO’s have been around for a very long time. GMO’s are generally safe for people and
the earth. That’s why now it’s more important than ever that technology play a part in helping
farmers who in turn help consumers and the environment. For example, a genetically engineered
crop called DroughtGard was approved by the U.S. Department of Agriculture six years ago.
This crop can continue to grow even throughout droughts. In addition to this crop, there is a
soybean genetically modified being used in Argentina that can withstand water shortages. These
GMO’s are helping farmers around the world provide food in safe way. However, this is not
without concerns. While many countries in Europe have not fully embraced this type of
technology, it may be only a matter of time. In his article, “Doubts About the Promised Bounty
of Genetically Modified Crops”, Danny Hakim states, “An analysis by The Times using United
Nations data showed that the United States and Canada have gained no discernible advantage in
yields – food per acre – when measured against Western Europe, a region with comparably
modernized agricultural like France and Germany”. Although I grant that these are valid
numbers, I still maintain changes are already happening in the ecosystems, climate changes and
at this point farmers need all the help they can get. The benefits of GMO’s with changing
technology will only improve as time goes on.
Agriculture and farmers are now turning to technology to provide support on farms
across the country. Farmers are now using drones, satellites, soil sensors, smart phones and
computers to name a few, to assist with all aspects of keeping the farm running and feeding
America. According to Jayson Lusk, in his article “Why Industrial Farms Are Good for the
Environment”, “That’s one reason they’re turning to high-tech solutions like precision
agriculture. Using location-specific information about soil nutrients, moisture and productivity of
the previous year, new tools, known as ‘variable rate applicators,’ can put fertilizer only on those
areas of the field that need it (which may reduce nitrogen runoff into waterways)”. Technology is
helping with the use of water, fertilizer, gmo’s and even herbicide-resistance crops. These crops
are a good example of helping famers control weeds, all without plowing. It has become
common today to dismiss farmers. However, they are the reason we are alive and this new
technology will help ease the burden on farmers of having to feed us.
A long time ago there was an animated show called The Jetsons. It was set in a futuristic
utopia with robots, aliens and other innovative things. So when I read about 3-D food printing, I
envisioned Rosie the Robot “cooking” food for the family using a 3-D printer. Although that was
just a kid’s show about the future, the reality is 3-D food printing does exist now. Granted, this
technology is still in its early stage, it does have a promising future. As Chris Horton states, in
his article “Commercial Kitchens Getting a Taste of 3-D Printed Food”, “At the heart of this
concept is 3-D printing technology, still in its earliest stages, but offering the promise of greater
efficiency in the production of food, with less waste and more customization”. The costs of these
machines are quite expensive, which is why it’s mostly being used in commercial settings. Not to
mention it’s taking away from the art of cooking. Here many chefs would probably object that
these will replace chefs and cooks. However, once all the flaws and kinks are worked out, this
technology will help the average person provide nutrient filled meals for themselves and their
family. These may even become as common as a microwave in the future.
Hunger in the United States, has been an underreported, sad problem that’s been going on
since the first days of this country. We live in a time where people throw away and waste food
like it’s no big deal. Except it is a big deal and it’s one that needs to addressed. According to
Tina Rosenburg, in her article “Going Digital to Rescue Food”, “By some estimates, about 40
percent of all food in America is wasted. Much of it ends up in landfills, where it emits
dangerous-to-the-plant methane gas”. Yet many families are going to be hungry because they
don’t have enough food. New technology is helping organizations like Feeding America, Food
Rescue USA and Rescuing Leftover Cuisine. Using an algorithm, recipients and donors are
matched up through Meal Connect. This will give restaurants instant connections with their
closest food banks. Smaller organizations like Food Rescue USA use apps to guide volunteers.
Giving those instructions and calendars on where they can find food and where to take it. I too
am guilty of throwing food away, when it’s perfectly good. But with this new technology,
hopefully it will make people more aware and eager to help the less fortunate.
Food is one of the most popular topics on social media. As technology is growing so is
the marketing of food products. Twitter, Facebook, Instagram, apps for your smart phone are
altering the way we view food. Social media “Influencers” are changing the game. Influencers
are typically average people on social media that take it upon themselves to promote things they
like. Companies send them free goods or even pay them to promote their products on social
media. Madeleine Shaw who is food vlogger and blogger is a good example of this. She would
blog her healthy recipes to her website and started building a following. She has over 200,000
followers on Instagram and is working on a cookbook. Technology is taking this type of
marketing by storm, proving you don’t always need a celebrity or a super bowl ad to get the
word out. In her article, “Social Media ‘Influencers’: A Marketing Experiment Grows into a
Mini-Economy”, Sarah Halzack maintains that “In other words, while influencer marketing rose
to prominence as a raw, credible antidote to the slick world of television and glossy magazines, it
has metastasized into something every bit as calculated”. Anyone familiar with technology
should agree that social media has changed the way we view things like food. Influencers, of
course, may want to question whether changing technology will either hurt or help them.
Nonetheless, technology has revolutionized the landscape of marketing and promoting food on
In conclusion, we can’t think about food without truly thinking about technology.
Technology is important because it has made it easier to farm, sell, promote, prepare and eat
food. Sure we can start a garden in our backyard and throw a few chickens and cows back there
too. Except for most people that’s not a reality. Ultimately, what is at stake here is the simple
way we consume food. Technology keeps growing and changing, and it affects every single one
of us. For example, when I sit down for dinner the last thing on my mind is the farmer who used
new gmo’s to grow the soybeans, which were bought by the company that made the pasta, which
I then purchased after seeing it advertised online. I even acknowledge that I might throw away
my leftovers, of course that is before writing this paper. Now I look at food and technology
different and understand there’s more to it. My conclusion is that we have to remind ourselves
how important technology is in all aspects of our lives, including the food we eat.
Hakim, Danny. "Doubts About the Promised Bounty of Genetically Modified Crops." The New
York Times. The New York Times, 29 Oct. 2016. Web. 18 May 2017.
Halzack, Sarah. "Social Media 'influencers': A Marketing Experiment Grows into a Minieconomy." The Washington Post. WP Company, 02 Nov. 2016. Web. 18 May 2017.
Horton, Chris. "Commercial Kitchens Getting a Taste of 3-D-Printed Food." The New York
Times. The New York Times, 24 Oct. 2016. Web. 17 May 2017.
Lusk, Jayson. "Why Industrial Farms Are Good for the Environment." The New York Times. The
New York Times, 23 Sept. 2016. Web. 17 May 2017.
Rosenberg, Tina. "Going Digital to Rescue Food." The New York Times. The New York Times,
02 May 2017. Web. 09 May 2017.
Senthilingam, Meera. "The Tech Solutions to End Global Hunger." CNN. Cable News Network,
24 Feb. 2017. Web. 08 May 2017. .
Professor Sarah Martin
English 120 Section # 9676
12 July 2016
Word Count: 1,714
Purchase answer to see full