Tomake the United States safer, tougher rules governing the usage ofthe internet should be executed.This paper explains why tightening the rules governing the usage ofthe internet will turn the security turmoil occasioned by theinternet around. To illustrate, this paper will shed light on threeof the most common forms of modern internet abuse: sexual predation,cyber bullying, and cyber terrorism.
Thesheer speed at which the internet has developed over the past decadesis unlike any other advancement of its kind. “Coupled with theswift development of social media platforms like Twitter, Facebook,YouTube, Instagram, and LinkedIn, the internet has transformed theworld into a tiny global community,” on the word of Hasinoff (12).Currently, people use broadband connection to communicate with theirrelatives and friends miles away. From this point of perspective, theinternet’s invention presented positive changes in the process ofcommunication. However, as Nacos puts it clear, “there are someprivacy concerns occasioned by the usage of the internet. As more andmore individuals use different social media platforms to disclosetheir personal information, privacy concerns arise” (73). Theexploitation of sensitive personal data by third parties to attackothers warrants the regulation of the internet.
Onaccount of these attacks, there have been many media catchphraseslike “sexual predation, online terrorism, and cyber bullying.”The insinuation is that America is no longer “safe” because ofthese online bullies. As Sarvamangala elucidates, “Americanchildren are facing imminent intimidations from deranged sexualpredators spending hours on social media searching for young girlsand boys to exploit sexually” (24). Terrorists employ social mediaplatforms like YouTube and Facebook to publicize their detestableplans as well as actions (Taylor et al 112). The subsequent sectionsof this paper delve into the negative externalities brought about bythe rapid development of the internet- justifying the need forimproved internet security.
Reinforcingmore internet regulations will reinstate America’s safety sincethese rules will “support” the reduction of cyber bullyingincidences. Cyber bullying is “the type of bullying that transpiresover digital electronic devices like tablets, computers, as well ascell phones,” says Mesch (76). These digital devices usecommunication tools like websites, chats, text messages, and socialmedia to pass information across. Thousands of Americans are cyberbullied through derogatory emails, rumors sent by text messages, orembarrassing pictures and videos posted online. Nacos illuminatesthat a study conducted in 2013 exposed that 9.2% of high schoolstudents in grades 9-12 experienced cyber bullying more than once.Another study conducted in 2014, 19.7% of high school students in thesame grades were electronically bullied more than once (69). Studentsthat are cyber bullied are more likely to use drugs (deal with thetraumatic situation), skip school (sometimes dropping out of school),receive poor grades, have low self-esteem, suffer from depression,and have health problems (depression and stress) (Boyd 119).
Therehave also been reported cases of suicide (occasioned by cyberbullying). Mayfield observes that “cyber bullying is detrimental tothe physical, mental, and psychological health of Americans. From thestatistics explained previously, it is apparent that the number ofvictims doubled in one year- from 9.2% in 2013 to 19.7% in 2014 asindicated by Nacos (71). If internet regulations are not heightened,probably the number of victims will be tripling annually in thefuture. The chain reaction is that many American students will starttaking drugs, skipping school, suffering from low self-esteem, havingstress-related health problems, receiving poor grades at school, andat its worst committing suicide! All because of cyber bullying!American will benefit “socially” from tightening the regulationssurrounding the usage of the internet (Kwak et al. 222). For thatreason, enhanced internet security in the United States of America iswarranted.
Enactingmore regulations governing the usage of the internet will makeAmerica “safer” by diminishing the number of online sexualpredation cases. A sexual predator is “an individual that is tryingto obtain- or is obtaining sexual favors- form another individual,normally a child, in a predatory, derogative, and abusive manner,”as defined by O’Keefe and Kathleen (213). It is the opinion ofBarnes that “many social media platforms call for the submission ofan individual’s personal and sensitive information like, but notlimited to: mobile phone numbers, family pictures, baby pictures,details of residence, and place of employment” (6). Using socialmedia platforms, sexual predators often profile their victims fromtheir social media foot prints making it easier for them tophysically track their victims. To break such primitive habits,O’Keefe and Kathleen observe that “internet regulations should bestepped-up” (217). Sexual predators are also misusing the internetby hacking into other people’s personal computers and laptops-which necessitates the need for enhanced security.
Accordingto Mayfield, “sexual predators often go to the point of prying onneedy children, giving them financial goodies in exchange of theirparticipation in child pornography- especially in countries wherechildren are not effectively protected by the law” (53). Thechildren are in some circumstances trafficked from their homes andmoved to other states to work as sex slaves. “If the regulationsgoverning the internet are not tightened, there definitely will be anincrease in child pornography, instances of sexual predation, andchild trafficking,” remarks Boyd (122). Boyd continues to say that“if the regulations governing the usage of the internet are notmade harsher, there will be a dramatic increase in the number ofsexually harassed victims!” To safeguard the incorruptibility ofAmerican citizens, an intensification of internet regulations issuitably warranted. Additionally, as Sarvamangala retorts, “securitymeasures should be increased to lessen the odds of a sexual predatorgaining access to sensitive information on the personal computers ofinnocent Americans who might be potential targets of mean people”(27). America will be safer if sexual predators are where theybelong- in prison!
Tayloret al. make it clear that “terror groups employ different socialmedia platforms to radicalize individuals all over the world. Forinstance, Al-Qaeda uses YouTube, Twitter, and Facebook to reach outto millions of people worldwide”. The internet has played a majorrole in the process of radicalizing. Fresh recruits are searched forby terror groups on social platforms like YouTube and Facebook byuploading convincing videos showing how they train (88). It is theopinion of Hasinoff that “with the emergence of new terror factionslike ISIS and ISIL, there has been an increase the number of horrificvideos and pictures on the internet. Horrific videos of beheadings,mass killings, kidnappings, and other terror related activities arefrequently uploaded to social sites by these gangs” (17).
XuTun Ming notes that “the perpetrators of terror use the internetwrongfully to spread fear globally. In the event of assaults plannedby these groups, they often take to different social media platformsto make public, their contributions in the ill-fated events.”(111). Therefore, it is the opinion of Barnes that “if moreregulations regarding the usage of the internet are not implemented,then the frequency of internet abuse by these terror groups willundoubtedly proliferate” (98). Reports have been made aboutradicalized youths being absorbed into ISIS and ISIL from as far asSomalia in East Africa!
Tomake matters worse, these terror groups communicate over the internetdue to its cheap costs and availability. ISIS members in Iraq havebeen known to communicate with terrorists in other factions acrossthe globe (Kwak et al. 225). Because of the convenience of socialmedia (in terms of rapid response), terror gangs plan and executetheir heinous plans over the internet. Thus, according to Kwak etal., “the enactment of more rules to regulate the usage of theinternet is warranted because without red-tape rules, these terrorgangs will magnify their ghastly activities by leaps and bounds”(227).
Itis an undisputable point that the development of the internet haselicited two-point significances. In terms of communication, theinternet has converted the world into one tiny global village wherean individual in America can have a live hangout with another one inAfrica, Asia, or any other continent. Owing to the advancement ofsocial sites, Boyd explains that “individuals across the world canshare pictures and videos at the click of a button” (123).Therefore, from this specific point of perspective, the internet hassignificantly improved the process of communication. However, theinternet has also elicited numerous social disadvantages. Consideringthe fact that social media sites provide their users with the optionof uploading their photos and videos, many people have their photosonline.
Additionally,sites like Instagram and Facebook have check-in services throughwhich service users can specify the exact location of where theywork, stay, or visit frequently. Armed with sensitive personalinformation, deranged individuals with the intentions of maltreatingother people in the community can profile their victims withoutdifficulties (Nacos 72). Such individuals gain access to the picturesof their victim’s home, place of residence, where their childrenattend school and right about any personal information a criminalwould need to profile a target. It is because of this “socialconvenience” that mentally deranged individuals start prying oninnocent users of social media, which eventually culminates intoaccounts of sexual predation, kidnapping, children pornography, andcyber bullying frequently broadcasted on television.
Furthermore,as Barnes explains, “terror groups employ social media toradicalize desperate youths with the aim of absorbing them into theirfactions” (103). These groups also use the internet to intimidateChristian-concentrated nations all over the world by uploadinggruesome videos of Christian beheadings and mass killings. YouTubeand Facebook are the most preferred online channels employed byterrorists for the simple fact that they have millions of userswhich means that their information reaches out to the millions theyintend to intimidate (Barnes 45).
Inas much as the internet did offer a myriad of communication andinformation benefits, it has also presented social challenges. As amatter of fact, the internet has transformed the globe into a smallvillage where distance is no longer a factor in keeping in touch withfriends and family across the world. However, the internet haspresented social challenges as well. Because of the proliferation ofthe internet and social media, cases of cyber bullying, sexualpredation, child pornography, and terrorism have significantlyincreased which warrants more regulations regarding the usage of theinternet. If tougher internet usage rules are put into play, theincidences of cyber bullying, child pornography, sexual predation,and terrorism will significantly diminish because the wrongful usersof the internet will be barred by enforceable laws. The process ofimposing more internet regulations means that America will be madesafer. America will be great again because the incidences of childpornography, sexual predation, terrorism, and cyber bullying willultimately disappear thanks to the enforcement of more regulationsgoverning the usage of the internet.
Barnes,Susan B. "A privacy paradox: Social networking in the UnitedStates." FirstMonday 11.9(2006). Web 11 Jul. 16.
Boyd,Danah. It`scomplicated: The social lives of networked teens.Yale University Press, 2014. Print.
Hasinoff,Amy Adele. "Sexting as media production: Rethinking social mediaand sexuality." NewMedia & Society(2012): 1461444812459171. Web 11 Jul. 16.
Kwak,Haewoon, et al. "What is Twitter, a social network or a newsmedia?" Proceedingsof the 19th international conference on World wide web.ACM, 2010. Web 11 Jul. 16.
Mayfield,Antony. "What is social media?" (2008). Print.
McGhee,India, et al. "Learning to identify Internet sexual predation."InternationalJournal of Electronic Commerce15.3 (2011): 103-122. Web 11 Jul. 16.
Mesch,Gustavo S. "Parental mediation, online activities, and cyberbullying." CyberPsychology& Behavior12.4 (2009): 387-393. Web 11 Jul. 16.
Nacos,Brigitte. Mass-mediatedTerrorism: Mainstream and Digital Media in Terrorismand Counterterrorism.Rowman & Littlefield, 2016. Print.
O`Keeffe,Gwenn Schurgin, and Kathleen Clarke-Pearson. "The impact ofsocial media on children, adolescents, and families." Pediatrics127.4 (2011): 800-804. Web 11 Jul. 16.
Sarvamangala,Dr. "Effects of Social Media." InternationalJournal Of Scientific Research And Education4.06 (2016). Web 11 Jul. 16.
Taylor,Robert W., Eric J. Fritsch, and John Liederbach. Digitalcrime and digital terrorism. PrenticeHall Press,2014. Print
Xu,Jun-Ming, et al. "Learning from bullying traces in socialmedia." Proceedingsof the 2012 conference of the North American chapter of theassociation for computational linguistics: Human languagetechnologies.Association for Computational Linguistics, 2012. Web 11 Jul. 2016.