Short Critical Reflection Essay

Some might say the crime of the 21st century will be white collar. If that is true, what will be the major types of cybercrime? How can we safeguard against it? As technology evolves, and monetary transactions become more commonplace over the internet, it is almost like an invitation is being sent out to give dishonest people an open arena for many types of cybercrimes. Computer viruses have evolved from the Brain, introduced in 1986 as a preventative measure against copying programs on floppy disks, to more dangerous ones today. Over the years, computer viruses became a tool for criminals targeting internet banking and government websites. ” (Groot-2011) Cyber criminals use such things as botnets (cybercrime infrastructures which consist of ‘hijacked’ computers used for illegal activities), phishing (using fake websites or e-mails pretending to be your bank or credit card company to collect your passwords and logins for internet banking), and Trojan, which disguises itself as a useful application, but allows third parties to gain access to personal data on your computer.

There are tens of thousands of forms of malware out there, and they can do anything from compromise and wipe out bank accounts to access and threaten top secret government programs. One thing we as users can do is to remember that banks never ask for passwords or pin numbers through email, so if by chance we receive an email asking for this, DELETE it. Another way to safeguard against potential threats is by using security software. “The best protection is to install a virus protection application on your computer. (Bowles-2010) To help track down cyber delinquents, around 200 CERT (Cyber security and Incident Response Team) teams are in place in 43 countries around the world, which, originally established by the Dutch government, “doesn’t have investigative powers, but works closely with the police and Public Prosecution Office and uses the expertise of anti-virus companies to limit damage. ” (Groot-2011) Our own Department of Justice “has a Computer Crime and Intellectual Property Section that is responsible for finding those individuals who are abusing the powers of computers and breaking the law. (Bowles-2010) Hopefully, more and more of these types of cyber agencies will emerge and help slow down the instances of cybercrime. Online education has evolved over the last ten years as much as the cell phone. Given this, what have been some of the major improvements and changes in the digital classroom? One of the major improvements in the digital classroom, at least the ones at Ashford, is having the accessibility of online text books. My 19 year old daughter is taking college classes online through another school, and she has to order all of her text books and wait for the mailman to deliver them.

More than once, the books have arrived after her class began, which left her so behind in her studies. Online education also offers the benefit of working and studying at our own pace and leisure, while also offering us (students) the ability to connect to learning opportunities anywhere, anytime. Being a mom, I have also noticed how my children’s’ school has started adopting technology in their classrooms; for example, using smart boards instead of the traditional chalkboards that we had in our day. The teachers post homework assignments online, as well as grades, attendance, and schedules.

We will write a custom essay sample on
Short Critical Reflection Essay
or any similar topic only for you
Order now

Someone else cutting and pasting an already referenced work cannot be considered an act of plagiarism. However, if the poem in question is an original example of your own talent as a poet, then I would say you have a case for that person stealing your intellectual property. That being said, if you post a poem online, then you obviously had intent of sharing it, which anyone proud of their accomplishments would want to do. At the same time, you wouldn’t wish for someone else to take credit for your idea(s). “One option is the traditional copyright, and another is available from Creative Commons. (Bowles-2010) The traditional copyright gives the originator of innovative creation absolute rights to it, usually for a limited time. It also “gives the copyright holder the right to be credited for the work, to determine who may adapt the work to other forms, who may perform the work, and who may financially benefit from it. ” (Wikipedia-2012) Nevertheless, if the copyright runs out, the content becomes public domain, where anyone can use, distribute, or otherwise utilize the work, without legal implications.

Another alternative is Creative Commons, a nonprofit organization that promotes legal sharing and remixing. “Authors and artists can submit their work with copyright terms attached, such as “all rights reserved,” “some rights reserved,” or “no rights reserved. ” (Bowles-2010) References: Willemien, Groot (2011) Cybercrime is the threat of the future Retrieved from http://www. rnw. nl/english/article/cyber-crime-threat-future ed. gov 11/09/2010 The Digital Transformation in Education: U. S.

Secretary of Education Arne Duncan’s remarks at the State Educational Technology Directors Association Education Forum Retrieved from http://www. ed. gov/news/speeches/%E2%80%9C-digital-transformation-education%E2%80%9D-us-secretary-education-arne-duncan Bowles, M. D. (2010) Introduction to computer literacy. San Diego, CA: Bridgepoint Education, Inc Retrieved from https://content. ashford. edu/books/AUINF103. 10. 2/sections/sec8. 1 The United States Department of Justice Computer Crime & Intellectual Property Section Retrieved from

Custom writing services

×

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out