wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Juveniles, Internet and Computer Crime

profile
Uzma Behlim
Aug 27, 2022
2 Likes
0 Discussions
120 Reads

     Everyone knows that kids generally take to computers more quickly and easily than their elders. Today’s children grow up with access to computers – and not just standalone computers but computers that are networked to the rest of the world through the Internet. Many of them love to explore and experiment, as children have always done; that’s an important element in learning. Unfortunately, that exploration and experimentation can lead them to virtual “places” that are legally off limits, and turn them into criminals (or juvenile delinquents) even without their awareness that they’re doing anything wrong.

 

Who is a juvenile?

A juvenile is a child who has not completed the age of Juvenile Justice 16 years in the case of boys, or the age of 18 years Act, 1960 in the case of girls.

 

 

Penalties for juvenile offenders

Juveniles aged 12 to 17 who commit an offence are penalised under juvenile criminal law. The court may also apply juvenile criminal law to adults aged 18 to 22 years.

On April 13,2009 a news flashed in The Times Of India newspaper which brought into Light that how adolescent children are nowadays more likely to engage in juvenile cybercrimes such as hacking and online bullying.

The activities they do for fun have a specific name in the cyber crime world that can cost them a fortune and, most importantly, their future.

Financial crimes

Cyber pornography

Sale of illegal articles

Impersonation

Online gambling

Hacking

Email spoofing

Forgery

Cyber Defamation

Cyber Bullying

Cyber Stalking

And many more…

 

Kids nowadays have a premonition of being hidden on the internet. No, you are not! In the world of internet, the concept of “Nobody will ever know” is entirely false.

The biggest and most prominent solution is to educate yourself, your peers, your elders, and most importantly, your young ones. They need to know the difference between right and wrong and the consequences of their actions. Being a knowledgeable person in the field of IT, our duty is not only to sit back and write codes to earn money, but also to make our acquaintances aware of this field.

 

"The most dangerous criminal may be the man gifted with reason, but with no morals." - Martin Luther King Jr.

 

Sadly, these are the missing chapters in Today's Education.


Comments ()


Sign in

Read Next

Confidence Building Activities for the New School Year

Blog banner

File Organization and Access

Blog banner

Love is in air.....

Blog banner

MUTUAL EXCLUSION

Blog banner

Banaras

Blog banner

Hypothesis Testing in Data Science

Blog banner

K-means use cases

Blog banner

KAHAWA TEA

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

LiquidPlanner

Blog banner

Bit Coins

Blog banner

Reclaim Your Bite and Beauty: All About Dental Restorative Treatments

Blog banner

Can a Water Flosser Replace Manual Flossing? Here’s What Dentists Say

Blog banner

Sage

Blog banner

Interrupts in operating system.

Blog banner

CSI and Organizational Change

Blog banner

Deadlock in Operating System

Blog banner

Friendship

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

Understanding - Proof of Work!

Blog banner

Outlook.com

Blog banner

Cache Memory in Operating Systems

Blog banner

Atlantis - The Lost Island.........

Blog banner

GIS Bharat Maps

Blog banner

Hash password! Is it really secured?

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

Principles of Concurrency

Blog banner

Financial Fraud Detection

Blog banner

Synchronization

Blog banner

How to Encrypt and Decrypt Using GNU PGP

Blog banner

Threat management

Blog banner

Threads

Blog banner

10 Unknown facts about India's Independence

Blog banner

Network Forensics Tools and Techniques

Blog banner

Self-love: Being the reason of your own smile

Blog banner

Some web vulnerabilities

Blog banner

E-learning in today's world

Blog banner

Teenagers of Today

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

What is service level Agreement?

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

All you need to know about “Off-page SEO”

Blog banner