wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Juveniles, Internet and Computer Crime

profile
Uzma Behlim
Aug 27, 2022
2 Likes
0 Discussions
120 Reads

     Everyone knows that kids generally take to computers more quickly and easily than their elders. Today’s children grow up with access to computers – and not just standalone computers but computers that are networked to the rest of the world through the Internet. Many of them love to explore and experiment, as children have always done; that’s an important element in learning. Unfortunately, that exploration and experimentation can lead them to virtual “places” that are legally off limits, and turn them into criminals (or juvenile delinquents) even without their awareness that they’re doing anything wrong.

 

Who is a juvenile?

A juvenile is a child who has not completed the age of Juvenile Justice 16 years in the case of boys, or the age of 18 years Act, 1960 in the case of girls.

 

 

Penalties for juvenile offenders

Juveniles aged 12 to 17 who commit an offence are penalised under juvenile criminal law. The court may also apply juvenile criminal law to adults aged 18 to 22 years.

On April 13,2009 a news flashed in The Times Of India newspaper which brought into Light that how adolescent children are nowadays more likely to engage in juvenile cybercrimes such as hacking and online bullying.

The activities they do for fun have a specific name in the cyber crime world that can cost them a fortune and, most importantly, their future.

Financial crimes

Cyber pornography

Sale of illegal articles

Impersonation

Online gambling

Hacking

Email spoofing

Forgery

Cyber Defamation

Cyber Bullying

Cyber Stalking

And many more…

 

Kids nowadays have a premonition of being hidden on the internet. No, you are not! In the world of internet, the concept of “Nobody will ever know” is entirely false.

The biggest and most prominent solution is to educate yourself, your peers, your elders, and most importantly, your young ones. They need to know the difference between right and wrong and the consequences of their actions. Being a knowledgeable person in the field of IT, our duty is not only to sit back and write codes to earn money, but also to make our acquaintances aware of this field.

 

"The most dangerous criminal may be the man gifted with reason, but with no morals." - Martin Luther King Jr.

 

Sadly, these are the missing chapters in Today's Education.


Comments ()


Sign in

Read Next

The Secure Software Development Life Cycle (SDLC)

Blog banner

Social Engineering Attacks

Blog banner

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

"Audit" In Data Science

Blog banner

Scheduling

Blog banner

Sessions In OS.

Blog banner

Save Environment

Blog banner

Music helps reduce stress

Blog banner

INDIAN CHEAPEST COSMETICS BRAND

Blog banner

The seven-step improvement process

Blog banner

NETWORK SECURITY RISKS

Blog banner

How to insert contacts in zoho crm using php

Blog banner

Things You Should Leave Behind In 2025, Whilst In 2026

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

Importance of business process documentation

Blog banner

Virtual memory

Blog banner

Note Taker App

Blog banner

Memory Management

Blog banner

Data Mining

Blog banner

Process states

Blog banner

Memory Management

Blog banner

A small world of Sockets

Blog banner

6 Digital Marketing Trends You Must Watch Out For In 2022

Blog banner

Memory Management in Operating System

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

MYNTRA

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner

Decision Tree: A Diagram Model

Blog banner

FILE SHARING

Blog banner

Interrupts

Blog banner

LiquidPlanner

Blog banner

Teenagers of Today

Blog banner

New Horizon Europe project ‘EvoLand’ sets off to develop new prototype services.

Blog banner

Deadlock in Operating System

Blog banner

ONLINE NEWSROOMS

Blog banner

Blockchain in IoT Applications

Blog banner

1.1 basic elements

Blog banner

Cyber Security Control

Blog banner

Deadlock and Starvation

Blog banner

Linux Threads:

Blog banner

Memory Management

Blog banner