Wednesday, May 20, 2020

Social Media And Victim Vulnerability - 1538 Words

Social Media’s Contribution To Victim Vulnerability to Online Predators Asonafer Washington Sam Houston State University Abstract This study investigated the relationship between social media access and victim vulnerability to online predators. I administered anonymous surveys to 20 students at Sam Houston State University that inquired about their involvement on social media and their experiences with online predation. I found my results to be supportive of my hypothesis. According to my results, people that spent more time and posted personal information on social media sites had been victims of online predation at some point in their lives. Whereas, the people who answered â€Å"no† to my questions of involvement on social media didn’t have these experiences. Introduction As technology in today’s society continues to advance, people are opting to spend more of their time in cyberspace. Internet access makes it easy to catch up on current events in the world and is also a great way to network and meet new people from different areas without having to leave the comforts of your home. It is common to have a social media account with popular online networks such as Facebook, Twitter, Instagram, or Snapchat. Easy account set-ups make it possible for just about anyone to sign up, no matter the age. However, people ranging from their early teens to late twenties tend to frequent social media networks more than any other age group. Social media is often viewed asShow MoreRelatedSocial Media And Its Effects On Society Essay1603 Words   |  7 Pagesserves as the basis for all human interaction, and in this case, cyberbullying. With the explosion of social media and internet related activities, there has been a sudden increase in cyberbullying cases. Over the years, cyberbullying—which has often been linked â€Å"to harassing text messages, rumors spread online or through social media websites, and derogatory comments about someone on social media sites† (Stockdale, Coyne, Nelson, Erickson, 2015)--has grown tremendously, accounting for nearly â€Å"42%Read MoreDenial Of Services Attack Essay1467 Words   |  6 Pagesaccess data and resources. One of the most common methods of phishing is SQL coding disguised. Cross-site scripting (XSS) is another form of malware injection. ‘Cross-site scripting carried out on websites accounted for roughly 84% of all security vulnerabilities documented by Symantec as of 2007.’ There are two forms of the malware, persistent and non-persistent. Non-Persistent is the most common, typically attacking HTML (hypertext markup language) networks. Common with attacks on search engines, XSSRead MoreShould Sex Offenders Be Committed Using Social Media Sites?1540 Words   |  7 Pages Abstract The issue of sex offenses being committed using social media sites, such as Facebook, is a growing issue in today’s society. This research is designed to determine whether an average Facebook user believes the social media site is used as an avenue for committing sex offenses. In order to conduct the research analysis there will be a Qualtrics survey given to 113 social media users in the Treasure Valley. The survey questions will be based on previous research that has shown demonstratingRead MoreShift Of Emphasis From Racism1180 Words   |  5 Pagesfacade and revealing the underlying problems and inequities that were overlooked and oppressed by the established social order. When Hurricane Katrina hit New Orleans, not only did it bring about complete destruction to the physical landscape, but it also brought to light the social inequalities and vulnerabilities that were present and deeply rooted in the community, which became a social disaster. Soon in the aftermath, many attempted to define and categorize Hurricane Katrina as either a â€Å"class-disaster†Read MoreEssay on The IT Industry and The 9/11 Atack1024 Words   |  5 Pages Before the terrorist attacks, data vulnerability to such intense calamities was thought to be far-fetched until the aftermath of the 9/11 attack where a data backup company lost major data repositories and had to deploy a sizeable number of employees to restore the massive volumes of information. The bringing of businesses’ valuable data systems into the context of being a victim of such attacks, acted as a wakeup call to IT executives about the vulnerability of the systems and why there neededRead MoreEssay about Sociological Analysis of Sexual Assault1554 Words   |  7 PagesAnalysis of Sexual Assault This essay will examine the social and cultural conditions, within the macro-diachronic and micro-synchronic theoretical models , that intensify or perpetuate sexual assault. I have chosen only one concept from each model because these are the only concepts that I feel that I can use to most accurately and comprehensively depict causes and reasons for why sexual assault is deeply entrenched in our social structure. I will thus explore, from these ideological viewpointsRead MoreHuman Trafficking And Its Effects On Society1173 Words   |  5 Pagesthe aftermath of victimization.   Sex trafficking is defines as sexual exploitation of an individual s body in exchange for money or goods.   Often these victims are coerced through methods of fraud or duress.   This impacts both adults and children, but is normally seen as explicit when minors are involved.   Looking at the history, statistics, media and new technologies of sex trafficking, one may apply the Marxist conflict theor y to the perpetuating cycle of the sex industry.  Ã‚  Ã‚   HISTORY   Human traffickingRead MoreThe Streets Are Safer For Women Than They Are For Men1473 Words   |  6 PagesIn reality, the streets are much safer for women than they are for men. Critique this statement using the victimisation/fear paradox AND with reference to current statistics. The perceived and potential threat for street violence is a significant social issue and has led to public fear; it has been imbedded so deep within our minds that it is almost instinctual to be constantly on the lookout for danger when out of the home. Beginning in early childhood through learning about ‘stranger danger’, (FosterRead MoreTrauma And The Trauma Healing Intervention1520 Words   |  7 Pagestraumatized by a certain event that has taken place in her life that has caused a disturbance in her life. Amupanda has not received any treatment helping her cope with the trauma. In the assignment I will be discussing what trauma is as well as vulnerability furthering to the effects and responses of trauma and the different interventions and referral resources there is to help with the Trauma Healing Intervention. Definitions Trauma- According to the American Psychiatric Association (2000), traumaRead MoreThe Big Bad Bully On The Playground915 Words   |  4 Pagesbullies use to harass, threaten, and humiliate their victims. The use of the internet to attack others is sweeping through schools and homes with devastating consequences. Cyber bullying is more harmful than traditional bullying because of the anonymity factor, easier access to victims, and it has greater consequences. A cyber bully terrorizes their victim from behind the protection of a screen. They hide behind anonymity and verbally assault their victims in a manner that they may not be brave enough

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.