The first case study is a literature review about online predators who take advantages of children and adolescents through online platforms by using tricks and violence. The paper discusses various reports and data of the rates, causes and impacts of sexual assaults that have happened through the socialmediaplatforms. The paper also reviews measures of prevention of online sexual assaults.
Online predators target the adolescents. Research shows that 75% of girls are victims of online predators.This shows that girls are at a high risk of being victims. At this age they are more interested in exploring their sexuality. However, boys who are uncertain of their sexuality and gays can easily become victims of sexual assault. The online predators consist of a diverse range of people with no identifiable characteristics. Their actions are motivated by various factors. Some of the factors include fear towards his age mates, need to relive his young age, and feel superior through controlling minors. On the other hand, Pedophiles do not use the internet to trick children into sexual activities. Most children are not active online users. Irrespective, online predators use other online means to get access to children. For instance through accessing child pornography and getting in touch with guardians (Wolak, Finkelhor Mitchell & Ybarra, 2008).
Delegate your assignment to our experts and they will do the rest.
Youths who are vulnerable to online predators are those who are active online users. This is common among the adolescents who share private information and engage in sexual talks. Such behaviors among adolescents are not normal. However, research shows that, most adolescents do not send their private information to strangers. Youths who are lonely, depressed, shy, and those who have previously been molested are dependent on social networks in search for solace. Online predators take advantages of such situations to get close to them before they make sexual advances. High percentages of youths who encounter violent online predators entertain sexual talks from strangers (Wolak et al ., 2008).
There are parents who therefore prefer to monitor their children activities through their social media platforms as a means of protecting them from online predators. Some researchers’ advice parents to monitor their children devices for sexual contents andalso follow them or track them through their socialmediaplatformsas ways of counteracting online predators (elgersma, 2017). However, such actions raise the issue of ethics and privacy. Some parents may take advantage and violate the privacy of their children especially when they are youths and have a right to privacy.
The second case study is a discussion on how some digital platforms are inadequate in preventing online violence. The writer argues that most social media platform rely on users to report violent contents (Wihbey, 2015). Through the use of various literatures from several researchers, the article analyzes the impacts of the social media on issues related to the violent extremists, online radicalization and terrorism.
The advancement in technology has attracted high number of internet users therefore enhancing online terrorism. Most researchers have found out that violent extremists are usually active social media users and also high rate of radicalization happens online. The government, security systems and the public can use social media platforms to reduce social terrorism. The public can help in countering attacking terrorism through methods like online awareness, adoption of online activities and digital trackers (Wihbey, 2015).
The government can counter attack the violent extremists, online radicalization and terrorism through digital trackers. This raises the issue of ethics and privacy because the government can take advantage of that. Individual privacy is violated by national intelligence if any slight suspicion is detected. The government knows that social media can also be used to prevent any initiated violence. They use it to monitor people who post content that is meant to disrupt peace. Violation of privacy is an ethical standard that should be taken advantage of by the government to identify and investigate the violent extremist patterns as a way of weakening terrorism network (Buchanan & Gomez , 2017).
References
Buchanan, E., & Gómez, S. (2017). Considering the ethics of big data research: A case of Twitter and ISIS/ISIL. Plos One, 12, 12.)
Elgersma, C. (2017). The Facts About Online Predators Every Parent Should Know. Retrieved: https://www.commonsensemedia.org/blog/the-facts-about-online-predators-every-parent should-know
Wihbey, J. ( 2015). Social and News media, violent extremism, ISIS and online speech: research review. Retrieved https://journalistsresource.org/studies/society/social-media/social media-violent-extremism-isis-online-speech-research-review.
Wolak, J., Finkelhor, D., Mitchell, K. J., & Ybarra, M. L. (January 01, 2008). Online "predators" and their victims: myths, realities, and implications for prevention and treatment. The American Psychologist, 63, 2.)