Conklin, White, Williams, Davis, and Cothren, (2016) outlines that, due to the massive and sheer number of connection among the people and electronic devices, cyber-crime is now indeed a bigger risk worldwide currently than ever before. Cybercrime refers to aspects or kind of cyber or computer related crimes. Based on statistics and data available on cybercrime, it is speculated that every three seconds somebody's identity gets stolen. Cybercrime has surpassed prohibited drug trafficking regarding money making criminally. Moreover, if there were no security packages that are sophisticated, unprotected personal computers could get infected within four minutes just after connecting to the internet. There are several ways in which individuals are committing cybercrime use depending on their goals and the skill-set. They include copyright infringement, fraud, bullying, child pornography, cyber stalking, and theft of personal data among many other crimes (Conklin et al., 2016). In this paper will intensively give a deeper discussion on child pornography as related to computer crime by the how it is carried out, the impacts to the society and finally on the prevention measures.
Child pornography as related to cybercrime incorporates the sharing of photos and videos that are sexually explicit to the public specifically from children. Moreover, the dissemination, distribution, and transportation of this sexually related videos and photos still fall under child pornography or the illegal images of child sexual abuse (Gragido & Pirc, 2011). Children who get victimized serve a long-lasting and significant impact on their lives. Most children will not be in a position to reveal if in one way or another that they were either videotaped or photographed as a result of the guilt, shame, and embarrassment that will engulf them. Literally, from research carried out such children would experience low self-esteem, anxiety, and depression. As a result of such incidences, the law enforcement authorities in the United States in 2011, allegedly, turned 22 million videos and images to the national center for exploited and missing children to try and identify the victims (Gragido & Pirc, 2011). Indeed up to date, it is reported that the law enforcement is making inroads. Some companies have joined hands together so as in unison they can thwart individuals buying and selling child pornography. Such companies include Microsoft and Google that merged last year.
To curb or deter child pornography is a nail and tooth battle, but with the advent of thorough investigation and prosecution of the victims involved is making inroads. There are various ways in which individuals might innocently be victimized as a child pornography victims unknowingly. Therefore, to reduce such cases I have given out points inclusively on how to avoid to be one among the child pornography cyber-crime victims in conjunction with the prevention and reduction measures of such incidences.
Prevention of Cybercrime on online child pornography the following should be done; block pornographic websites by installing an antivirus application on your personal computer and setting it over the internet (Bohme, 2013). If you are using Local Area Network or Metropolitan Network, you have the responsibility to contact the administrators so as to restrict the access to such areas. Ensure that you talk and put on board the people viewing or exposing children to pornographic content. Explain to them accordingly on the impact and effects posed by doing carrying out such activities, and it should be well-understood that discussion may resolve such issues if right a right channel is undertaken (Conklin et al., 2016). Report prostitution activities such as cyber prostitution and report such cases to the local area authorities so as they can respond promptly and take proper actions.
Alternatively, you may file a report concerning child pornography with the CyberTipLine or the Internet Crime Compliant Centre, if therapy is needed, find enough support from the family, friends and even professionals (Berlatsky, 2014). Keep the date, time, the website and the activity that transpired, interactions in conjunction with the incidences for record keeping purposes and evidences.
In conclusion, it is important that people are aware of child pornography as one among the cases of cybercrime so that they can evade it. Most people are often get victimized in child pornography cybercrimes due to lack of knowledge concerning the same. Therefore, it is the responsibility of every individual to understand this incidence as it is increasingly flooding the market and equally becoming a dangerous adventure globally especially in the developing world. In summary, the ways to avoid being involved in child pornographic cybercrime victims are; keep latest patches and updates to your computer. Incorporate the use of security software to protect your computer, protect your personal computer, chose strong passwords to use, and configuration of your computer securely and avoid committing the affair knowingly since it is heavily punishable (Conklin et al., 2016).
References
Conklin, W. A., White, G. B., Williams, D., Davis, R., & Cothren, C. (2016). APrinciples of computer security.
Berlatsky, N. (2014). Cybercrime. Detroit: Greenhaven Press, a part of Gale, Cengage Learning.
Bohme, R. (2013). Security and Privacy on economic information related to computer crime. Berlin, Heidelberg: Springer Berlin Heidelberg.
Gragido, W., & Pirc, J. (2011).Child pornography Cybercrime and Espionage: An Analysis of Subversive multi-vector threats. Rockland, MA: Syngress.
Cite this page
Child Pornography as Related to Cybercrime - Essay Sample. (2021, May 31). Retrieved from https://midtermguru.com/essays/child-pornography-as-related-to-cybercrime-essay-sample
If you are the original author of this essay and no longer wish to have it published on the midtermguru.com website, please click below to request its removal:
- Essay on Investigation for a Missing Persons Case
- Parents Monitoring their Children on the Internet - Essay Example
- Essay Sample on Civilizing Cyberspace Policies
- Paper Example on Class Distinction and Human Rights
- Practitioner Interview With Researcher in the Field of Criminal Law
- Youth Equity Framework: Helping Youngsters Overcome High Poverty & Crime Rates - Essay Sample
- Digital Market Plan: Leveraging Microcomputers' Life Cycle - Essay Sample