wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Juveniles, Internet and Computer Crime

profile
Uzma Behlim
Aug 27, 2022
2 Likes
0 Discussions
120 Reads

     Everyone knows that kids generally take to computers more quickly and easily than their elders. Today’s children grow up with access to computers – and not just standalone computers but computers that are networked to the rest of the world through the Internet. Many of them love to explore and experiment, as children have always done; that’s an important element in learning. Unfortunately, that exploration and experimentation can lead them to virtual “places” that are legally off limits, and turn them into criminals (or juvenile delinquents) even without their awareness that they’re doing anything wrong.

 

Who is a juvenile?

A juvenile is a child who has not completed the age of Juvenile Justice 16 years in the case of boys, or the age of 18 years Act, 1960 in the case of girls.

 

 

Penalties for juvenile offenders

Juveniles aged 12 to 17 who commit an offence are penalised under juvenile criminal law. The court may also apply juvenile criminal law to adults aged 18 to 22 years.

On April 13,2009 a news flashed in The Times Of India newspaper which brought into Light that how adolescent children are nowadays more likely to engage in juvenile cybercrimes such as hacking and online bullying.

The activities they do for fun have a specific name in the cyber crime world that can cost them a fortune and, most importantly, their future.

Financial crimes

Cyber pornography

Sale of illegal articles

Impersonation

Online gambling

Hacking

Email spoofing

Forgery

Cyber Defamation

Cyber Bullying

Cyber Stalking

And many more…

 

Kids nowadays have a premonition of being hidden on the internet. No, you are not! In the world of internet, the concept of “Nobody will ever know” is entirely false.

The biggest and most prominent solution is to educate yourself, your peers, your elders, and most importantly, your young ones. They need to know the difference between right and wrong and the consequences of their actions. Being a knowledgeable person in the field of IT, our duty is not only to sit back and write codes to earn money, but also to make our acquaintances aware of this field.

 

"The most dangerous criminal may be the man gifted with reason, but with no morals." - Martin Luther King Jr.

 

Sadly, these are the missing chapters in Today's Education.


Comments ()


Sign in

Read Next

An Overivew Of Cache Memory

Blog banner

Memory input output management

Blog banner

Understanding Regression Analysis

Blog banner

SQL Injection

Blog banner

Is Your Password Complex Enough?

Blog banner

Blockchain Transactions

Blog banner

DURGA POOJA

Blog banner

HTML vs HTML5

Blog banner

How to grow followers on Instagram business account?

Blog banner

Subnet Masking

Blog banner

ProofHub

Blog banner

How Social Media Algorithms Will Work in 2026?

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

virtual memory

Blog banner

CONCURRENCY

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

Phishing

Blog banner

HACKING MOBILE PLATFORM

Blog banner

Service Transition Process in ITSM

Blog banner

Microsoft powerpoint presentation

Blog banner

Review on Recovering Deleted Files

Blog banner

Deadlock

Blog banner

Service Operations in ITSM

Blog banner

100 Awesome Keyboard Shortcuts that you didn't knew

Blog banner

Types of Hackers

Blog banner

Theads

Blog banner

15 Interesting Facts about India

Blog banner

Session Vulnerabilities

Blog banner

What is Email? Uses of Emails

Blog banner

IOT Hacking Techniques

Blog banner

Autonomy Vehicles: Future Ki Gadiya

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

Network Forensics Tools and Techniques

Blog banner

Women Empowerment

Blog banner

Os Virtual Memory

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

Busted : Common Web Security Myths

Blog banner

Scheduling

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

Embedding a Youtube video on Wisemonkeys

Blog banner

Evolution of Operating system

Blog banner