Saturday, December 14, 2019
Short Critical Reflection Essay Free Essays
Some might say the crime of the 21st century will be white collar. If that is true, what will be the major types of cybercrime? How can we safeguard against it? As technology evolves, and monetary transactions become more commonplace over the internet, it is almost like an invitation is being sent out to give dishonest people an open arena for many types of cybercrimes. Computer viruses have evolved from the Brain, introduced in 1986 as a preventative measure against copying programs on floppy disks, to more dangerous ones today. We will write a custom essay sample on Short Critical Reflection Essay or any similar topic only for you Order Now Over the years, computer viruses became a tool for criminals targeting internet banking and government websites. â⬠(Groot-2011) Cyber criminals use such things as botnets (cybercrime infrastructures which consist of ââ¬Ëhijackedââ¬â¢ computers used for illegal activities), phishing (using fake websites or e-mails pretending to be your bank or credit card company to collect your passwords and logins for internet banking), and Trojan, which disguises itself as a useful application, but allows third parties to gain access to personal data on your computer. There are tens of thousands of forms of malware out there, and they can do anything from compromise and wipe out bank accounts to access and threaten top secret government programs. One thing we as users can do is to remember that banks never ask for passwords or pin numbers through email, so if by chance we receive an email asking for this, DELETE it. Another way to safeguard against potential threats is by using security software. ââ¬Å"The best protection is to install a virus protection application on your computer. (Bowles-2010) To help track down cyber delinquents, around 200 CERT (Cyber security and Incident Response Team) teams are in place in 43 countries around the world, which, originally established by the Dutch government, ââ¬Å"doesnââ¬â¢t have investigative powers, but works closely with the police and Public Prosecution Office and uses the expertise of anti-virus companies to limit damage. â⬠(Groot-2011) Our own Department of Justice ââ¬Å"has a Computer C rime and Intellectual Property Section that is responsible for finding those individuals who are abusing the powers of computers and breaking the law. (Bowles-2010) Hopefully, more and more of these types of cyber agencies will emerge and help slow down the instances of cybercrime. Online education has evolved over the last ten years as much as the cell phone. Given this, what have been some of the major improvements and changes in the digital classroom? One of the major improvements in the digital classroom, at least the ones at Ashford, is having the accessibility of online text books. My 19 year old daughter is taking college classes online through another school, and she has to order all of her text books and wait for the mailman to deliver them. More than once, the books have arrived after her class began, which left her so behind in her studies. Online education also offers the benefit of working and studying at our own pace and leisure, while also offering us (students) the ability to connect to learning opportunities anywhere, anytime. Being a mom, I have also noticed how my childrenââ¬â¢sââ¬â¢ school has started adopting technology in their classrooms; for example, using smart boards instead of the traditional chalkboards that we had in our day. The teachers post homework assignments online, as well as grades, attendance, and schedules. My three high school students email back and forth with their teachers, coaches and musical directors. As stated in our text book, ââ¬Å"Most educators see online learning as essential for the longââ¬âterm success of their schools. â⬠(Bowles-2010) I am inclined to agree with that, as I see daily interactions between my teenagers and their teachers. In addition, with all the crazy laws out there de-personalizing the school relationships between students and teachers in the school setting, where a simple hand on the shoulder could lead to a teacherââ¬â¢s dismissal, this at least gives students the sense that their teachers view them as important. Technology can fundamentally change the learning process so itââ¬â¢s more engaging and tailored to studentsââ¬â¢ needs and interests. â⬠(ed. gov-2010) If I post a poem on my Facebook site and someone cuts and pastes it on their site is that a case for stealing my intellectual property? The answer to this lies in anoth er question. Who is the original author? If you post a poem that is the creation of someone else in the first place, (and if you did and it is, you had better give credit to said author! ), then the answer would be a resounding no. Someone else cutting and pasting an already referenced work cannot be considered an act of plagiarism. However, if the poem in question is an original example of your own talent as a poet, then I would say you have a case for that person stealing your intellectual property. That being said, if you post a poem online, then you obviously had intent of sharing it, which anyone proud of their accomplishments would want to do. At the same time, you wouldnââ¬â¢t wish for someone else to take credit for your idea(s). ââ¬Å"One option is the traditional copyright, and another is available from Creative Commons. (Bowles-2010) The traditional copyright gives the originator of innovative creation absolute rights to it, usually for a limited time. It also ââ¬Å"gives the copyright holder the right to be credited for the work, to determine who may adapt the work to other forms, who may perform the work, and who may financially benefit from it. â⬠(Wikipedia-2012) Nevertheless, if the co pyright runs out, the content becomes public domain, where anyone can use, distribute, or otherwise utilize the work, without legal implications. Another alternative is Creative Commons, a nonprofit organization that promotes legal sharing and remixing. ââ¬Å"Authors and artists can submit their work with copyright terms attached, such as ââ¬Å"all rights reserved,â⬠ââ¬Å"some rights reserved,â⬠or ââ¬Å"no rights reserved. â⬠(Bowles-2010) References: Willemien, Groot (2011) Cybercrime is the threat of the future Retrieved from http://www. rnw. nl/english/article/cyber-crime-threat-future ed. gov 11/09/2010 The Digital Transformation in Education: U. S. Secretary of Education Arne Duncanââ¬â¢s remarks at the State Educational Technology Directors Association Education Forum Retrieved from http://www. ed. gov/news/speeches/%E2%80%9C-digital-transformation-education%E2%80%9D-us-secretary-education-arne-duncan Bowles, M. D. (2010) Introduction to computer literacy. San Diego, CA: Bridgepoint Education, Inc Retrieved from https://content. ashford. edu/books/AUINF103. 10. 2/sections/sec8. 1 The United States Department of Justice Computer Crime Intellectual Property Section Retrieved from How to cite Short Critical Reflection Essay, Essay examples
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.