wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Juveniles, Internet and Computer Crime

profile
Uzma Behlim
Aug 27, 2022
2 Likes
0 Discussions
120 Reads

     Everyone knows that kids generally take to computers more quickly and easily than their elders. Today’s children grow up with access to computers – and not just standalone computers but computers that are networked to the rest of the world through the Internet. Many of them love to explore and experiment, as children have always done; that’s an important element in learning. Unfortunately, that exploration and experimentation can lead them to virtual “places” that are legally off limits, and turn them into criminals (or juvenile delinquents) even without their awareness that they’re doing anything wrong.

 

Who is a juvenile?

A juvenile is a child who has not completed the age of Juvenile Justice 16 years in the case of boys, or the age of 18 years Act, 1960 in the case of girls.

 

 

Penalties for juvenile offenders

Juveniles aged 12 to 17 who commit an offence are penalised under juvenile criminal law. The court may also apply juvenile criminal law to adults aged 18 to 22 years.

On April 13,2009 a news flashed in The Times Of India newspaper which brought into Light that how adolescent children are nowadays more likely to engage in juvenile cybercrimes such as hacking and online bullying.

The activities they do for fun have a specific name in the cyber crime world that can cost them a fortune and, most importantly, their future.

Financial crimes

Cyber pornography

Sale of illegal articles

Impersonation

Online gambling

Hacking

Email spoofing

Forgery

Cyber Defamation

Cyber Bullying

Cyber Stalking

And many more…

 

Kids nowadays have a premonition of being hidden on the internet. No, you are not! In the world of internet, the concept of “Nobody will ever know” is entirely false.

The biggest and most prominent solution is to educate yourself, your peers, your elders, and most importantly, your young ones. They need to know the difference between right and wrong and the consequences of their actions. Being a knowledgeable person in the field of IT, our duty is not only to sit back and write codes to earn money, but also to make our acquaintances aware of this field.

 

"The most dangerous criminal may be the man gifted with reason, but with no morals." - Martin Luther King Jr.

 

Sadly, these are the missing chapters in Today's Education.


Comments ()


Sign in

Read Next

Demystifying Cryptography: A Beginner's Guide

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

10 Reasons to date your best friend

Blog banner

10 Reasons Why Guy BestFriends are the Must in Every Girl's Life

Blog banner

Hot Mango Pickle (Methiyu)

Blog banner

Virtual memory

Blog banner

A Journey By Train

Blog banner

FREE VERSION OF G-MAIL

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

5 Common Faults In Construction Tenders

Blog banner

Types of Hackers

Blog banner

GIS in Disaster Management

Blog banner

Explain Kernel in OS

Blog banner

Data Security must be your Priority!

Blog banner

The Five Steps of Data Science

Blog banner

The Role of Teachers in Building a Child’s Confidence

Blog banner

Facebook marketing

Blog banner

Data Analytics in Data Science

Blog banner

Race Condition in Operating Theatre

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

Evolution of Operating System

Blog banner

What is Virtual Memory

Blog banner

Deadlock

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

Guidelines for a low sodium diet.

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

Uniprocessor Scheduling

Blog banner

Memory Management

Blog banner

Facebook Shut Down an AI Program!!! Facebook AI bots became Terminators???

Blog banner

HACKING MOBILE PLATFORM

Blog banner

VIRTUAL MACHINE

Blog banner

The Right way of cooking

Blog banner

Tracking Emails & Email Crimes

Blog banner

INTRODUCTION TO C#

Blog banner

Child labour

Blog banner

URL vs Domain

Blog banner

Blockchain uses and use cases

Blog banner

AI and Cyber Security

Blog banner

ASANA- A Management System.

Blog banner

Introduction my self

Blog banner

Linker

Blog banner