free essay

In the present-day world, the use of modern technology has triggered the popularity of online and internet services. Apparently, the Internet is very helpful in day-to-day activities like transactions and communication among others. However, the Internet is very harmful since it can transform into an instrument of destruction.

To start with, the information one says or writes on the Internet never disappears. The above implies that one's ideas written on the Internet remain there forever. Hereby, one will never actually be able to delete what they post online. The reason is that there many engines, devices and other servers that archive information written online. Consequently, the police may even use the files to prosecute people. In fact, many people have been charged with unlawful usage of evidence from the internet archives (National Sheriffs' Association & National White Collar Crime Center, 2004). For instance, one can write on the Internet that they are going to commit murder. Hence, someone can notice it and notify the police, and even if a person deletes the post, the police will be able to find them. Apparently, such situations more often occur on Facebook. The upside is that such practices may aid in handling online planned crimes.

 

However, on the other hand, it violates the right to privacy. It is a well-known fact that it is impossible to secretly discuss any issues even business ones online. As a result, the Internet is quickly transforming into a huge Brother Management network where solitude rights are violated (National Sheriffs' Association & National White Collar Crime Center, 2004). The management personnel that operate things have become completely fanatical about surveillance, supervision and forage for almost everything that one performs on the Internet. The single thing that is important to remember is that nothing one performs on the Internet will be personal. Thus, if a person is fanatical about solitude, then the very last arena for them is the Internet. It is crucial not to post such information on the Internet that can give the authorities the possibility to hold one responsible (Boyd & Hargittai, 2013). It is worth noting that the Internet is generating a permanent record on each person, and they enhance by posting enormous volumes of information regarding themselves on shared media websites such as Facebook and Twitter.

The Internet is the ultimate instrument for crowd communication that the earth has ever seen, and it provides regular citizens the capacity to converse with each other like never before. However, there is a disadvantage of the usage of the Internet. The reason is that everything one does on the Internet is under control, while being monitored and traced since Internet privacy does not exists. If one believes that they still possess some solitude on the Internet, then they are maybe uninformed about the current trends or under a delusion.

Secondly, the Internet is a bloodcurdling place at times. Today, the world has changed since people are using the Internet even for murder. Moreover, a considerable number of people is always searching for ways to hurt others online. For instance, The Craigslist murderer is an exemplary case. The above man killed several individuals, while he was acting as if he was buying something from Craigslist (Boyd & Hargittai, 2013). The man could steal into people's houses and kill them. As a result, it is vital to remember that there are individuals online who aim to hurt one, and a person has to be conscious of it. Accordingly, it is advisable that one does not post the address or phone number on the Internet. The reason is that somebody may notice it and utilize it to one's detriment. Thus, one should not place private information in general.

Third, the Internet is full of forgeries. Apparently, many people have been robbed online. The reason is that online thieves create scams of all types, ranging from selling fake goods to deceiving one by soliciting credit card information. Although there are trusted sites like Amazon and EBay, there are several others that are better to avoid (Rosson, 2004). It is, therefore, advisable not to utilize a site if it does not seem safe or right. Moreover, if someone requests information which one feels not necessary to give, then one should not provide it. The online thieves use various excuses to gather information from an individual. Sometimes, they may say that there are some problems with one's credit card and it is required to provide expiration date or additional information on it. Thus, it is crucial not to yield to such requests. Although an individual may not be attempting to con one, it is healthier to be protected than later remorse.

STEP 1 You order custom writing service
STEP 2 Professional writers develop your paper
STEP 3 We check the paper on plagiarism
STEP 4 We send the paper to you
STEP 5 Editors checks paper again
STEP 6 We send your revised paper

Forth, the Internet is full of viruses. Hereby, one has to insure that they are protected from internet viruses. For example, there are such viruses as Trojan horses and spyware can be very harmful. Thus, it is advisable to utilize the newest software to guard the computer against viruses such as Macafe. The above software and others like this assist one to protect their computer against viruses (Livingstone & Smith, 2014). Due to the fact that the anti-virus program is expensive, it is nevertheless reasonable to buy it because the expenses will be considerable if one cracks the system. Several people in Asia, Africa, and America are attempting and struggling to steal into people's computers. Hacking is a grave and forever growing concern since one can be exposed to danger by simply creating an email. Furthermore, it is sometimes hard to detect some viruses until it is too late.

There exist all types of Trojans and viruses one can unintentionally download to a hard drive. Afterward, the viruses and Trojans are within the processor, and they commence all kinds of theft procedures. Moreover, they crack one's passwords, imitate individual records and folders, and log keystrokes. As a result, all individual information can be uploaded to a site so that it will be tough to find the robbers (Livingstone & Smith, 2014). The above example is a grave crisis and needs to be avoided. Moreover, serious monitoring of the children using the Internet should be ensured. Parents should being alert of the information, programs, and games among others children are downloading to avoid sites with malicious Trojans.

Fifth, another issue with regard to the Internet use is cyber bullying. It is worth saying that it is not similar to traditional harassment. The focal disparity is that it makes use of the Internet to conduct the harassment actions. However, the psychosomatic effects remain similar. The sufferer feels scared and unaccompanied, whereas the criminal attempts to conceal their identity. In fact, cyber bullying can take place in various forms. It may be in the form of commentary, imagery and video regarding an individual posted online, making the sufferer feel frightened and upset (Livingstone & Smith, 2014). Moreover, the bullies may hack into the sufferer's private account and harass them from inside.

Bullying on the Internet can be as scary as other forms of intimidation. In fact, the female beings are typically the sufferers of this type of behavior. For instance, they may be beleaguered by an ex-boyfriend or girlfriend who is troubled regarding the ending of their association. Moreover, the above can also commence when one feels insulted by another person. Furthermore, bullying can even start in a haphazard way by one online unknown person towards another.

The bullying originates from sexting. In fact, it is the distribution of nasty messages or videos of nude pictures, transparent underwear or any sexual messages, images or videos. The above may occur with a boyfriend or girlfriend or somebody a person has met online. It is possible that a person may have sent a sexual photograph, video cassette or wording to someone else. The reason is that one may be pressed to prove their sexuality, feel beleaguered, endangered or blackmailed to send pictures or one perceives it as an ordinary matter since they are in love with the individual and trust them (Livingstone & Smith, 2014). Nevertheless, it is imperative to note that it is a point of no return once one presses the send button. Even though one utilizes apps such as Snap Chat, the individual can take a display shot. Thus, one risks to be recognized as somebody they are not.

Limited time offer 15% OFF your first order

In conclusion, the Internet is the greatest tool for communication that the world has ever had. However, the Internet has some downsides. The reason is that it poses many risks that make it unsafe for the users. Among them are the problem of the lack of privacy, cyber bullying, viruses, online theft and murder. One has to be careful while posting anything on the Internet. Although not everybody will attempt to hurt a person or obtain something from them, it is crucial to shield oneself from the possible negative consequences.

Contact Us