wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Juveniles, Internet and Computer Crime

profile
Uzma Behlim
Aug 27, 2022
2 Likes
0 Discussions
120 Reads

     Everyone knows that kids generally take to computers more quickly and easily than their elders. Today’s children grow up with access to computers – and not just standalone computers but computers that are networked to the rest of the world through the Internet. Many of them love to explore and experiment, as children have always done; that’s an important element in learning. Unfortunately, that exploration and experimentation can lead them to virtual “places” that are legally off limits, and turn them into criminals (or juvenile delinquents) even without their awareness that they’re doing anything wrong.

 

Who is a juvenile?

A juvenile is a child who has not completed the age of Juvenile Justice 16 years in the case of boys, or the age of 18 years Act, 1960 in the case of girls.

 

 

Penalties for juvenile offenders

Juveniles aged 12 to 17 who commit an offence are penalised under juvenile criminal law. The court may also apply juvenile criminal law to adults aged 18 to 22 years.

On April 13,2009 a news flashed in The Times Of India newspaper which brought into Light that how adolescent children are nowadays more likely to engage in juvenile cybercrimes such as hacking and online bullying.

The activities they do for fun have a specific name in the cyber crime world that can cost them a fortune and, most importantly, their future.

Financial crimes

Cyber pornography

Sale of illegal articles

Impersonation

Online gambling

Hacking

Email spoofing

Forgery

Cyber Defamation

Cyber Bullying

Cyber Stalking

And many more…

 

Kids nowadays have a premonition of being hidden on the internet. No, you are not! In the world of internet, the concept of “Nobody will ever know” is entirely false.

The biggest and most prominent solution is to educate yourself, your peers, your elders, and most importantly, your young ones. They need to know the difference between right and wrong and the consequences of their actions. Being a knowledgeable person in the field of IT, our duty is not only to sit back and write codes to earn money, but also to make our acquaintances aware of this field.

 

"The most dangerous criminal may be the man gifted with reason, but with no morals." - Martin Luther King Jr.

 

Sadly, these are the missing chapters in Today's Education.


Comments ()


Sign in

Read Next

How return on investment is defined in IT services

Blog banner

Evolution of Operating system.

Blog banner

File management in os

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Severe landslides continue to cause concern in Joshimath, Uttarakhand

Blog banner

JIRA SOFTWARE

Blog banner

Man is free by the birth .

Blog banner

Modern Operating Systems

Blog banner

Zero Trust Security Model: Revolutionizing Cybersecurity in the Digital Age

Blog banner

Introduction to Virtual Memory - 080

Blog banner

To-Do List In LISP

Blog banner

Benefits of yoga and meditation

Blog banner

Memory hierarchy

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

1.1 basic elements

Blog banner

Platonic Solids

Blog banner

Cyber Forensics in Healthcare: Protecting Patient Data and Preventing Breaches

Blog banner

Why Festivals Are the Best Classrooms for Young Minds?

Blog banner

Data Acquisition in Cyber Forensics

Blog banner

E-mail security

Blog banner

Service Transition Process in ITSM

Blog banner

Art and Culture of Rajasthan

Blog banner

EVOLUTION OF MICROPROCESSOR

Blog banner

Data Mining

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

DIGITAL ECONOMY

Blog banner

GIS info about Bermuda Triangle

Blog banner

Open Source Project By Google

Blog banner

Social media

Blog banner

Diwali

Blog banner

Self managing devices

Blog banner

Memory Management

Blog banner

THREADS (assignment 1)

Blog banner

Child labour

Blog banner

Photography

Blog banner

Evolution of operating systems

Blog banner

What is Virtual Memory

Blog banner

A-B-C of Networking: Part-3 (Topology [Bus & Star])

Blog banner

Direct memory access

Blog banner

USPS mail

Blog banner

Interesting fact about kangaroo.

Blog banner

INTERNET

Blog banner