Tuesday, December 10, 2019
On
On-Line Dangers Essay On-line DangersIn this day and age of super high-speed networking and digital communications, just about anything on any subject can be found on the Internet. Some materials, such as online libraries are helpful, some, such as studentââ¬â¢s personal homepages are fairly useless, and some sites, such as online medical references, can be lifesaving. All these sites have a right to be on the web. However, there are also sites that could be detrimental to people, such as pornography sites, pages detailing the manufacture of illegal drugs, and instructions on how to build high explosives and other illegal devices. With the number of these types increasing daily, parents and lawmakers alike are becoming concerned for the well being of the public, specifically the younger sector of the population. This raises the issue of how safe the Internet is. With the wealth of useful information available on the Internet also comes dangerous and harmful information regarding everything from stealin g cable to manufacturing high explosives, as well as child pornography and invasion of privacy. If the wrong information fell into the wrong hands, disaster could result. One of the issues most common in the papers today is pornography available on the Internet. There are two main types of pornography available on the Internet: regular and child pornography. Regular porn is rationalized by the following argument: The idea that a TV show or lyric can transform a healthy and connected child into a dangerous monster is absurd. The same goes for the Internet. The idea that certain material on the net can cause a child to grow up to be a child molester is primarily the invention of politicians, who use it to frighten and rally. Religious groups who use it to teach belief to the young, and journalists, who use it to regain their once powerful position in American society. The Internet should be treated with respect, and used with responsibility, just like any other form of media. This type of porno should be allowed on the net, but all sites should require a password of some kind. However, the other type of pornography, child porn, is much more dangerous as well as illegal. This type of pornography often involves people that are willing to spend great amounts of time, money, and energy to gradually seduce their targets, as well as people that immediately engage in sexually explicit conversations with children. Often timeââ¬â¢s children are indirectly victimized through chat rooms and e-mail, or directly by being coerced into a real life meeting. This type of direct meeting can ultimately result in the childââ¬â¢s death. Also, children may come across pornographic material in any one of the alt.sex news groups. These news groups provide a public forum for the discussion of various topics. Several of the alt.sex news groups are alt.sex.incest, alt.sex.beastiality, and alt.sex.pedophilia. Although there are bills providing penalties for the knowing transmission of indecent material to minors through a remote computer or other means, child pornography is still a major problem and threat in cyberspace There are, however, some types o f sites that have content that could be hazardous to the public in general, not just children, and have no place on public forums. One example of this type of site is the ââ¬Å"Books for a Free Peopleâ⬠. This site contains various books for download, including the ââ¬Å"Big Book of Mischiefâ⬠, which has details on how to build explosives, and the ââ¬Å"Book of Funâ⬠, which gives detailed instructions on how to do illegal things such as stealing HBO and eavesdropping on cellular telephone conversations. While these two acts are not physically dangerous, they are still illegal. However, the ââ¬Å"Big Book of Mischiefâ⬠has explicit instructions on how to manufacture such dangerous compounds as nitroglycerin. .ueef9b00eb56870045c73302c1b4b534b , .ueef9b00eb56870045c73302c1b4b534b .postImageUrl , .ueef9b00eb56870045c73302c1b4b534b .centered-text-area { min-height: 80px; position: relative; } .ueef9b00eb56870045c73302c1b4b534b , .ueef9b00eb56870045c73302c1b4b534b:hover , .ueef9b00eb56870045c73302c1b4b534b:visited , .ueef9b00eb56870045c73302c1b4b534b:active { border:0!important; } .ueef9b00eb56870045c73302c1b4b534b .clearfix:after { content: ""; display: table; clear: both; } .ueef9b00eb56870045c73302c1b4b534b { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .ueef9b00eb56870045c73302c1b4b534b:active , .ueef9b00eb56870045c73302c1b4b534b:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .ueef9b00eb56870045c73302c1b4b534b .centered-text-area { width: 100%; position: relative ; } .ueef9b00eb56870045c73302c1b4b534b .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .ueef9b00eb56870045c73302c1b4b534b .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .ueef9b00eb56870045c73302c1b4b534b .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .ueef9b00eb56870045c73302c1b4b534b:hover .ctaButton { background-color: #34495E!important; } .ueef9b00eb56870045c73302c1b4b534b .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .ueef9b00eb56870045c73302c1b4b534b .ueef9b00eb56870045c73302c1b4b534b-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .ueef9b00eb56870045c73302c1b4b534b:after { content: ""; display: block; clear: both; } READ: Bioethics EssayNITROGLYCERINENitroglycerin is one of the most sensitive explosives, if it is not the most sensitive. Although it is possible to make it safely, it is difficult. Many a young anarchist has been killed or seriously injured while trying to make the stuff. When Nobels factories make it, many people were killed by the all-to-frequent factory explosions. Usually, as soon as it is made, it is converted into a safer substance, such as dynamite. An idiot who attempts to make nitroglycerin would use the following procedure:MATERIAL EQUIPMENTDistilled water eye-dropperTable salt 100 ml beakerSodium bicarbonate 200-300 ml beakers (2)Concentrated nitric ice bath contain eracid (13 ml) ( a plastic bucket serves well )Concentrated sulfuric centigrade thermometeracid (39 ml)glycerin blue litmus paperFollowing this, the book gives step by step instructions on how to use the above materials in making nitroglycerin, and although it states that this is a very dangerous explosive to be making, many bored teenagers would just ignore the warnings, reasoning that they will just be extra careful. Information on many other types of explosives can also be found online. One example surfaced shortly after the Oklahoma City bombing. A message was transmitted on the Internet that offered information detailing the components and materials needed to construct a bomb identical to the one used in Oklahoma City, as well as complete details on how the bomb was used, and how it could be better. At the end of the message a disclaimer was added that stated that the information was only to be used for educational purposes, theoretically relieving the author of the message of any legal responsibility. Another large concern is the issue of privacy. One assumes that when they send an e-mail message, the only other person that will read the message is the intended recipient. This is a common myth held by the average person, as e-mail messages are quite easy to intercept and scan for key words, and can be done on a large scale. Although the Electronic Communications Act of 1986 provides stiff penalties for anyone whom intentionally intercepts or attempts to intercept an electronic message (e-mail). However, this still does not stop illegal monitoring of messages by individuals, as it is widely believed that system operators often read messages and files without authorization. This act also allows Internet providers the right to intercept, disclose, or use electronic communications while engaged in an activity necessary to service or protection of rights and property. This shows that even the ECA does not entirely protect your privacy. Another threat to priva cy is found in the agencies thought to be secure. In 1998, Internal Revenue Service papers were released showing that itââ¬â¢s employees had been using IRS computers to illegally prowl through the tax files of family, friends, neighbors, and celebrities since 1989. Another example can be seen at the DMV where police employees have been known to illegally trace license plates for personal use. A final danger on the net is the threat of online scams. With about 15 million people that are now able to participate in online forums, discussion groups, and conferences with other strangers that share a particular interest, it is quite easy for the clever scam artist to choose a potential victim. Fraudulent sellers use these various on-line services to promote bogus stock offerings, credit repair services, and other far fetched ideas or offers. More chances for Internet scam artists to claim victims can be found in the on-line classified advertising. No matter where you read these, you are likely to find some that are false, such as ads promoting ââ¬Å"miracleâ⬠weight loss products and programs. A good way to avoid being ripped off by these scams is to use your common sense: if it looks too good to be true, it probably is. .u10162fd209e9af684221305119a969f1 , .u10162fd209e9af684221305119a969f1 .postImageUrl , .u10162fd209e9af684221305119a969f1 .centered-text-area { min-height: 80px; position: relative; } .u10162fd209e9af684221305119a969f1 , .u10162fd209e9af684221305119a969f1:hover , .u10162fd209e9af684221305119a969f1:visited , .u10162fd209e9af684221305119a969f1:active { border:0!important; } .u10162fd209e9af684221305119a969f1 .clearfix:after { content: ""; display: table; clear: both; } .u10162fd209e9af684221305119a969f1 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u10162fd209e9af684221305119a969f1:active , .u10162fd209e9af684221305119a969f1:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u10162fd209e9af684221305119a969f1 .centered-text-area { width: 100%; position: relative ; } .u10162fd209e9af684221305119a969f1 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u10162fd209e9af684221305119a969f1 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u10162fd209e9af684221305119a969f1 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u10162fd209e9af684221305119a969f1:hover .ctaButton { background-color: #34495E!important; } .u10162fd209e9af684221305119a969f1 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u10162fd209e9af684221305119a969f1 .u10162fd209e9af684221305119a969f1-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u10162fd209e9af684221305119a969f1:after { content: ""; display: block; clear: both; } READ: President John F. Kennedy EssayIn the digital age, we are offered a wide variety of conveniences and services through the Internet. Even though most of these can be useful, there are many evils out there in the digital world. Although there is probably no way we can ever make the Internet one hundred percent safe, we can use our good judgement to keep ourselves out of harms way. This includes knowing the tip-offs for online scams, never giving your credit card numbers out to sources that you donââ¬â¢t trust, and most importantly, monitoring your child when he or she is on the computer. It is up to the Internet user to keep themselves safe from the dangers that lurk on-l ine. Computers and Internet
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.