Internet Exploitation and Primary Federal Law
From the e-Activity, select two (2) types of online traps that have the most adverse impact on children.
There are seven online traps that have an impact on children as follows:
Pornography
YouTube
Cyberbullying
Sexual Predators
Sexting
Identity Theft
In view of the psychological damage that can be done the Pornography Trap and Cyber Bullying are the two which have the potential to cause tremendous damage. Pornographic exposure is a conceptic trigger that causes an addictive state wherein frequency of viewing causes an accepting or alteration of previously held moralistic values if they have been earlier instilled.
Further it causes levels of desensitization with continued exposure and alteration in thought patterns that effect everyday perceptions of the act of sexual intercourse and is a motivator for more permissive sexual activity. Also, this increase in sexual activity without discrimination is a major cause of sexual transmitted diseases. Therefore, as a child viewer the impossibility of forming correct moral establishment is disabled. Correct psychological presence is not able to be formed because of the influence or influx of unstabilizing sexual content.
Another trap is Cyber Bullying, which is an emotional upheaval that has a severe psychological consequence on children mentally, emotionally and then physically. Also, because of this inability ultimately they may develop a prevalence for alcohol and drugs to help cope, skipping school and might experience in person bullying. Another troubling facet that they may develop are health problems, low self-esteem and receive poor grades due to inner emotional turmoil.
Next, speculate on one (1) way not discussed in the article in which parents or society can protect children from online exploitation. Provide a rationale for your response.
One way not discussed in the article in which parents or society can protect children from online exploitation is to monitor their child’s activities when online by visually participating with child. As an active participant you as the adult have more knowledge and ability to help surf the internet with safety, discretion and use protective measures for yourself and child therefore building a safety net for interactive use while surfing the internet. An effective safety net will allow a promotion of good communication, establishment of protocols, following rules on sites, examination of literature of dangers relating to online usage, prevent the relayance of personal information to strangers, keep passwords confidential, explanation of what is acceptable conversation, understand what netiquette is and alerting authorities if someone approaches inappropriately online (parents then police).
Identify at least three (3) types of exploitation that prevalently occur over the Internet. Next, give your opinion of whether or not you believe that the current primary federal laws are efficient in combatting the types of Internet exploitation in question. Justify your response.
Three types of exploitation that prevalently occur over the Internet are:
Predatorial Stalkers
Child Pornography
Sex Tourism
The federal laws in questions are enacted to be a facilitator in the prevention of the acts of Predatorial Stalking whose ulterior motive is to achieve a goal which could include physical intimidation, psychological intimidation, murder, kidnapping and prostitution of target. Laws are in effect to protect anyone who is subjected to stalking with the applying of all legalities that would be in essence appropriate for different situations depending on the degree of offenses included in the act.
Child Pornography is another type of exploitation that has aspects that range from befriending a hurt child to the actual seduction of a child and leading a child to have prohibited sexual acts. To prevent this type of exploitation laws(Child Protection and Sexual Predator Punishment Act of 1998) have been compiled by the FBI, the Ice, Postal Inspection Services, the Department of Justice’s Child and Obscenity Section (CEOS) and the NCMEC to circumvent and apprehend suspects and offenders. With the combined departments working in conjunction as a whole this is a serious challenge to predators and preventive.
Sex Tourism is another exploitive act on the internet that includes a variety of participants that have children in the possession for the acts of prostitution either against their will or who have been groomed to be an active participant in the sexual act. Laws to assist in some situations that may be connective to a violator from this country that committed an act of sexual perversion against a child is Fight Against Child Exploitation (FACE) where the perpetrator was in another country and a complaint was filed against them would then work in conjunction with the F.B.I. and the Department of Justice to apprehend and press charges. Therefore, with precautions and safety and legal departments working as a collective force against the exploitation of children this should cause a serious decline.
Taylor, R.W., Fritsch, E.J. & Liederbach, J. (2015), Digital Crime and Digital Terrorism.
(3rd ed.). Boston: Pearson, Inc.
http://www.frc.org/onepagers/the-effects-of-pornography-on-individuals-marriage-family-and-community
https://www.stopbullying.gov/cyberbullying/what-is-it/
https://www.stopbullying.gov/cyberbullying/prevention/index.html
https://www.fbi.gov/news/speeches/child-exploitation-on-the-internet-the-dark-side-of-the-web
Reply to co-student #1
It's amazing that an individual would create a community online to entice and entrap children for sexual exploitation. I find the idea abhorrent of exploiting a child and I am appalled at the lowness of these individuals. Predatorial actions toward a child is something that I find intolerable and these predators should be pursued and given the longest sentence possible.
Further the acts of a sexual deviant can not be justified, tolerated or ignored. I agree with you on the need for a web filter to try to keep children from restrictive sites. Any preventative measure that is taken should be a deterrent in the desire for contact with people who are viewed as a criminal element. Fortunately, the Child Exploitation and Obscenity Section is a great facilitator in preventing outright attacks against children.
Thank you.
Felicia
Reply to co-student #2
I agree that pornography and social networks have an adverse affect on children and have an ability to anticipate a child's unsuspecting nature and prey on them because of their ability to be socialized. Peer pressure is also a huge avenue that allows a lot of latitude and maneuverability in the interaction of youth and sometimes in a detrimental fashion and allows the Differential Association Theory to kick in. This theory effectively covers the influx of juvenile crimes because they are usually done as a group and the accomplices are usually influenced by a leader (someone whom everyone admires and want to be).
I also understand your point that being stern about visiting undesirable sites is a stressing point that makes it a non-negotiable move. But because emulation is a learning process it is hard to control their activities unless they have a disdain for vulgar sites and acts of lasciviousness.
I disagree about "we can't be our child's friend". We (as parents) can be their best friend but they still need interaction with people their own age and respectable mentors and example.
Thank you.
Felicia
Saturday, June 18, 2016
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment