wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Juveniles, Internet and Computer Crime

profile
Uzma Behlim
Aug 27, 2022
2 Likes
0 Discussions
120 Reads

     Everyone knows that kids generally take to computers more quickly and easily than their elders. Today’s children grow up with access to computers – and not just standalone computers but computers that are networked to the rest of the world through the Internet. Many of them love to explore and experiment, as children have always done; that’s an important element in learning. Unfortunately, that exploration and experimentation can lead them to virtual “places” that are legally off limits, and turn them into criminals (or juvenile delinquents) even without their awareness that they’re doing anything wrong.

 

Who is a juvenile?

A juvenile is a child who has not completed the age of Juvenile Justice 16 years in the case of boys, or the age of 18 years Act, 1960 in the case of girls.

 

 

Penalties for juvenile offenders

Juveniles aged 12 to 17 who commit an offence are penalised under juvenile criminal law. The court may also apply juvenile criminal law to adults aged 18 to 22 years.

On April 13,2009 a news flashed in The Times Of India newspaper which brought into Light that how adolescent children are nowadays more likely to engage in juvenile cybercrimes such as hacking and online bullying.

The activities they do for fun have a specific name in the cyber crime world that can cost them a fortune and, most importantly, their future.

Financial crimes

Cyber pornography

Sale of illegal articles

Impersonation

Online gambling

Hacking

Email spoofing

Forgery

Cyber Defamation

Cyber Bullying

Cyber Stalking

And many more…

 

Kids nowadays have a premonition of being hidden on the internet. No, you are not! In the world of internet, the concept of “Nobody will ever know” is entirely false.

The biggest and most prominent solution is to educate yourself, your peers, your elders, and most importantly, your young ones. They need to know the difference between right and wrong and the consequences of their actions. Being a knowledgeable person in the field of IT, our duty is not only to sit back and write codes to earn money, but also to make our acquaintances aware of this field.

 

"The most dangerous criminal may be the man gifted with reason, but with no morals." - Martin Luther King Jr.

 

Sadly, these are the missing chapters in Today's Education.


Comments ()


Sign in

Read Next

Next time you click on "Remind me later", think twice!

Blog banner

indian premier league

Blog banner

Direct Memory Access

Blog banner

Why Data Security Is Important

Blog banner

Deadlock in Operating System

Blog banner

RAID

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

Meal Maharaj — 3 CP, 5 CP, 8 CP. Same Love, Different Portions

Blog banner

10 Alien Encounters and Abduction Stories

Blog banner

OPERATING SYSTEM

Blog banner

Operating system

Blog banner

Types of Malware in Cyber Security

Blog banner

geographic information system (GIS)

Blog banner

DATA SCIENCE IN BUSINESS AND MARKETING

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

Blog banner

TECHNOLOGY : BOON OR CURSE ?

Blog banner

Music is life

Blog banner

The Peephole

Blog banner

Number Guessing game --lisp

Blog banner

Web browser forensics:Tools,Evidence collection and analysis

Blog banner

ahh wait a min

Blog banner

IT service level agreement

Blog banner

MAHAKAL LOK UJJAIN

Blog banner

Information of meesho company

Blog banner

Vulnerability Assessment

Blog banner

Deadlock

Blog banner

Penetration Testing

Blog banner

BrainGate Technology

Blog banner

Memory Management in Operating System

Blog banner

Os Virtual Memory

Blog banner

Top 4 Places To Stay In Copenhagen

Blog banner

5 People who claimed to have Time Traveled

Blog banner

Starvation and Deadlock.

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

Balance

Blog banner

MySQL

Blog banner

Zomato (Income Sources)

Blog banner

Evolution of the Microprocesor

Blog banner

I/O Buffering

Blog banner

Functions of operating system

Blog banner

MAILFENCE

Blog banner

Memory Management

Blog banner