Nobody downloaded yet

Cyber Security: Regulations of Social Networks - Research Paper Example

Comments (0) Cite this document
Criminals have become confident enough in themselves to post information concerning their criminal activities on social networks. An author of this paper will discuss the arguments for law enforcement to be allowed to monitor the social networking sites to prevent crime…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96% of users find it useful
Cyber Security: Regulations of Social Networks
Read TextPreview

Extract of sample "Cyber Security: Regulations of Social Networks"

Download file to see previous pages While social networks continue to grow in popularity, there arises the need to monitor them because their growth also has the potential of increasing the potential of cybercrime. The necessary structures to ensure that there is the policing of social networking sites have yet to be put in place and this is because of the right of individuals to their privacy. While this is the case, the lack of policing social networks ensures that they are a haven for cybercriminals and a danger to the society, meaning that law enforcement officers have to be involved in monitoring these sites. Such monitoring should be allowed especially when they are investigating crimes, in which case they should not be required to obtain a warrant, because doing so might hamper the course of their investigations.
One of the reasons why law enforcement officers should be allowed to monitor social networking sites when conducting investigations is because there are sexual predators that use these sites to get their victims, especially children. These criminals lure children to give them information about themselves or make them send pictures of themselves, whether in the nude or otherwise, with evil intent (Pemberton 20). In addition, there are also the cases of children being allowed to access social networking sites from quite a young age. These children end up becoming exposed to the inappropriate material within social networks and these vary from explicit material, the violent content including videos, pictures, and writings. These are very harmful to a child because they may not only lead to a child being molested by predators but may also lead to him display inappropriate behavior due to the watching of pornography.  ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(Cyber Security: Regulations of Social Networks Research Paper, n.d.)
Cyber Security: Regulations of Social Networks Research Paper. Retrieved from
(Cyber Security: Regulations of Social Networks Research Paper)
Cyber Security: Regulations of Social Networks Research Paper.
“Cyber Security: Regulations of Social Networks Research Paper”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Cyber Security: Regulations of Social Networks

Security of Social Networks

... 2009, ‘Direct-to-consumer genomics, social networking, and confidentiality’, American Journal of Bioethics, vol.9, no.6, pp.45-46. Strater, K & Richter, H 2007, ‘Examining privacy and disclosure in a social networking community’, Symposium on Usable Privacy and Security, Pittsburg, pp.1-2. Terry, NP 2010, ‘Physicians and patients who ‘friend’ or ‘tweet’: Constructing a legal framework for social networking in a highly regulated domain’, Indiana Law Review, vol.43, no.2, pp.285-342. Timm, DM & Duven, CJ 2008, ‘Privacy and social networking sites’, New Directions for Student Services, no.124, pp.89-103.... ? SECURITY OF SOCIAL NETWORKS BY 07 August Security of...
10 Pages(2500 words)Essay

Cyber Security

...themselves to either the junk mail you receive or through your local network provider. These deceitful codes are usually very intricate and tricky so that a normal person using Personal computer cannot access them. IT professionals spend huge amount of their time to solve these codes. These codes are not only restricted to spyware and malware but also consist of bugs, worms and viruses which are a cause of a lot of damage. (Cyber Security (2010)) These malicious codes are very harmful indeed but there is a bigger imposter than them. These are the attackers or hackers. They are much hazardous and harmful then these mere codes. Codes and Viruses can only do what they are designed to do by...
10 Pages(2500 words)Coursework

Cyber security

...formulating cyber security is the response time to cyber attacks. Incidents of attack happen at cyber speed, but often it takes a while for the management system to detect and respond to the incident. Failure to respond with urgency to cyber attacks increases the company’s vulnerability. Appropriate training of employees on the threat and remedy framework is a critical obligation of any organization. Cyber security threats that can affect important goals In e- commerce for instance, rights of access to digital content have become an issue of immense economic and social significance. Wealthy nations have...
4 Pages(1000 words)Coursework

Cyber security

...CYBER SECURITY Cyber Security E-government comes at a cost. Is there a trade-off that occurs between the security of federal systems and the cost savings from reduced paperwork? I concur with the response given to the question since it has fully explored the benefits and setbacks of e-government against the benefits of manual storage of information. The answer has outlined the gains the government enjoys for employing technology to store its information. It has clearly shown that substantial amounts of money can be saved in terms of money invested in storage space. This is a true reflection of what takes place when digital data storage is used. The fact...
2 Pages(500 words)Coursework

Cyber security

...Cyber Security Cyber Security Affiliation If someone asked you for advice on what he or she should do first to get started onIntrusion Detection, what would you recommend? If someone asks me for advice on what he or she should do first to get started on intrusion detection then I would suggest him to think about what advantages or opportunities he expects from the deal he is going to make. In this scenario, one excellent starting point can be from looking at the impact of previous intrusions (Bloedorn, Christiansen, Hill, Skorupka, Talbot, & Tivel, 2002). However, if he or she has been caused to experience intrusions and hacking act before, they will be acquainted with...
1 Pages(250 words)Coursework

Cyber Security Policy Initiatives

...rely. The giant task of protecting cyberspace entails increased effort in bilateral forums. However, the successful execution of this attempt demands seeking of continued collaboration and cooperation with the social sector as well as recovering the security of different networks through the expansion of international rules, regulations and standards, enlarge the official system’s aptitude to fight cybercrime and persist to build up and uphold best practices. By engaging the private sector to assist in dealing with the boundaries of law enforcement and national refuge, cybersecurity threats are dealt with in a far more effective way than ever before. The current...
11 Pages(2750 words)Research Paper

Cyber Security

...Insert Introduction The world today is more interconnected than ever before. As many people become more dependent on modern technology, there has equally been an emergence of vulnerability to cyber attack such as security breaches, spear phishing and social media fraud. With all its advantages, increased connectivity means increased risk incidences involving theft, abuse and fraud. Ensuring cyber security is the role of every individual as it’s everyone’s duty to ensure it is safer, more secure and resilient (Marshall, 67). Cyber security refers to the body of technologies, processes and practices...
1 Pages(250 words)Essay

Cyber Security a generic term covering the multiplicity of crimes found in penal codes or in legislation having the use of computers as a center component (Girasa, 2002). Cybercrime can be analyzed in a narrow and broad sense. Narrowly, it can be defined as an illegal activity related to computer and computer aided services. Broadly, it refers to an illegal work, which can be committed by means relating to computers or any kind of network system. The concept of cyber security in modern world can be discussed in light of increasing cyber threat. Cyber security can be defined as a system which is used by the government and various organizations to...
10 Pages(2500 words)Term Paper

Cyber Security

...Cyber Security Cyber Security There is a pressing need for organization’s antivirus policy to specify that anti-virus be configuredin a way that they quarantine files infected with viruses rather than automatically deleting them. Deleting the infected files often lead to non-functioning of the application or operating system, an aspect that can temporarily paralyze operations of a business. This would automatically result into losses, especially if the problem is serious (Mishra, 2013). Experts suggest deleting the infected files as the worst option an antivirus can resort to. Furthermore, some antivirus applications identify certain types of files as infected while...
1 Pages(250 words)Essay

Cyber Security as the Process of Different Security Measures

...and intrusion detection system if the intention is to protect the network systems of the organization. Cyber Security Policy Jennifer Bayuk (2012, pp5) focuses on the importance of policy implementation toward fostering cyber security. She emphasizes the need for modern organizations to adopt new laws and regulations concerning computer operations, private enterprise objectives, configuration variables, and information distribution (Bayuk, 2012, pp24). The guidebook provides a detailed account of cyber security, potential threats, and the countermeasures upon detection of any attacks. The goal of...
6 Pages(1500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Cyber Security: Regulations of Social Networks for FREE!

Contact Us