20 Aug 2022

117

Online Predators: How to Protect Your Children

Format: APA

Academic level: College

Paper type: Case Study

Words: 622

Pages: 2

Downloads: 0

The first case study is a literature review about online predators who take advantages of children and adolescents through online platforms by using tricks and violence. The paper discusses various reports and data of the rates, causes and impacts of sexual assaults that have happened through the socialmediaplatforms. The paper also reviews measures of prevention of online sexual assaults. 

Online predators target the adolescents. Research shows that 75% of girls are victims of online predators.This shows that girls are at a high risk of being victims. At this age they are more interested in exploring their sexuality. However, boys who are uncertain of their sexuality and gays can easily become victims of sexual assault. The online predators consist of a diverse range of people with no identifiable characteristics. Their actions are motivated by various factors. Some of the factors include fear towards his age mates, need to relive his young age, and feel superior through controlling minors. On the other hand, Pedophiles do not use the internet to trick children into sexual activities. Most children are not active online users. Irrespective, online predators use other online means to get access to children. For instance through accessing child pornography and getting in touch with guardians (Wolak, Finkelhor Mitchell & Ybarra, 2008). 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Youths who are vulnerable to online predators are those who are active online users. This is common among the adolescents who share private information and engage in sexual talks. Such behaviors among adolescents are not normal. However, research shows that, most adolescents do not send their private information to strangers. Youths who are lonely, depressed, shy, and those who have previously been molested are dependent on social networks in search for solace. Online predators take advantages of such situations to get close to them before they make sexual advances. High percentages of youths who encounter violent online predators entertain sexual talks from strangers (Wolak et al ., 2008). 

There are parents who therefore prefer to monitor their children activities through their social media platforms as a means of protecting them from online predators. Some researchers’ advice parents to monitor their children devices for sexual contents andalso follow them or track them through their socialmediaplatformsas ways of counteracting online predators (elgersma, 2017). However, such actions raise the issue of ethics and privacy. Some parents may take advantage and violate the privacy of their children especially when they are youths and have a right to privacy. 

The second case study is a discussion on how some digital platforms are inadequate in preventing online violence. The writer argues that most social media platform rely on users to report violent contents (Wihbey, 2015). Through the use of various literatures from several researchers, the article analyzes the impacts of the social media on issues related to the violent extremists, online radicalization and terrorism. 

The advancement in technology has attracted high number of internet users therefore enhancing online terrorism. Most researchers have found out that violent extremists are usually active social media users and also high rate of radicalization happens online. The government, security systems and the public can use social media platforms to reduce social terrorism. The public can help in countering attacking terrorism through methods like online awareness, adoption of online activities and digital trackers (Wihbey, 2015). 

The government can counter attack the violent extremists, online radicalization and terrorism through digital trackers. This raises the issue of ethics and privacy because the government can take advantage of that. Individual privacy is violated by national intelligence if any slight suspicion is detected. The government knows that social media can also be used to prevent any initiated violence. They use it to monitor people who post content that is meant to disrupt peace. Violation of privacy is an ethical standard that should be taken advantage of by the government to identify and investigate the violent extremist patterns as a way of weakening terrorism network (Buchanan & Gomez , 2017). 

References 

Buchanan, E., & Gómez, S. (2017). Considering the ethics of big data research: A case of Twitter and ISIS/ISIL. Plos One, 12, 12.) 

Elgersma, C. (2017). The Facts About Online Predators Every Parent Should Know. Retrieved: https://www.commonsensemedia.org/blog/the-facts-about-online-predators-every-parent should-know 

Wihbey, J. ( 2015). Social and News media, violent extremism, ISIS and online speech: research review. Retrieved https://journalistsresource.org/studies/society/social-media/social media-violent-extremism-isis-online-speech-research-review. 

Wolak, J., Finkelhor, D., Mitchell, K. J., & Ybarra, M. L. (January 01, 2008). Online "predators" and their victims: myths, realities, and implications for prevention and treatment. The American Psychologist, 63, 2.) 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Online Predators: How to Protect Your Children.
https://studybounty.com/online-predators-how-to-protect-your-children-case-study

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Ethics

The Relationship Between Compensation and Employee Satisfaction

In line with the United States Occupational Safety and Health Administration (OSHA), work-related illness or injury derive from incidents or contact with the workplace hazards ( Singhvi, Dhage & Sharma, 2018). As far...

Words: 363

Pages: 1

Views: 96

17 Sep 2023
Ethics

The Tylenol Murders: What Happened in Chicago in 1982

The Chicago Tylenol Murders of 1982 were tragedies that occurred in a metropolitan region of Chicago and involved an alarming amount of recorded deaths. It was suspected to that the deaths were caused by drug...

Words: 557

Pages: 2

Views: 129

17 Sep 2023
Ethics

Ethical and Legal Analysis: What You Need to Know

Part 1 School Counselors (ASCA) | Teachers (NEA) | School Nurses (NASN) |---|--- The ASCA is responsible for protecting students’ information from the public. They always keep them confidential,...

Words: 531

Pages: 2

Views: 89

17 Sep 2023
Ethics

Naomi Klein: The Battle for Paradise

Corporate Social Responsibility (CSR) refers to self-driven motives by an organization or a state government to ensure the well-being of its people is safeguarded. Corporate Social Responsibility creates a strong...

Words: 1369

Pages: 6

Views: 391

17 Sep 2023
Ethics

What is Utilitarianism?

It is a normative theory that defines the morality of an action on whether it is right or wrong, based on the result (Mulgan, 2014) . This theory has three principles that serve as the motto for utilitarianism. One...

Words: 833

Pages: 3

Views: 154

17 Sep 2023
Ethics

Argument Mapping: Traffic Fatality

The first part of the paper critically analyzes the claim that "The US should return to the 55-mph speed limit to save lives and conserve fuel." According to Lord and Washington (2018), one of the verified methods of...

Words: 1111

Pages: 4

Views: 91

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration