Tuesday, May 5, 2020

Psychology In Service Of National Security -Myassignmenthelp.Com

Question: Discuss About The Psychology In Service Of National Security? Answer: Introduction: Social media today is used by unethical and illegal users to insult, bully and threaten others without the fear of being punished. Dekker, Rianne, and Godfried state that social media is even used to distort important national and international data by illegal organisations to spread panic and fear among the common people. The social media platforms today consist of video sharing and streaming websites like Youtube, communication based websites like Facebook and picture sharing websites like Instagram. The numbers of users of these social networking websites are so vast that is practically impossible to monitor their activities. The users often use social media to bully and threaten innocent people using fake names and often go unpunished which encourages them to continue their illegal ventures. The essay would point out how social networking is used by these illegal users to insult, bully and threaten others. It would also include facts like cyber laws and how users prevent these un lawful attempts to arouse fear among them. Discussion: Insult and passing derogatory comments on the digital platform is one of the most illegal and unethical applications of the social media websites. Unethical groups use social media to pass insulting comments against certain communities and races. For example, there are people who pass comments on others on the grounds of races, colours, creeds, religions, sexual preferences or other any other personal attributes. Such comments make the group of people being victimized threatened and endangered (huffingtonpost.in). The impact of these racist and insulting comments on the social media is often disastrous. Today, most of the countries like the United Kingdom share their human resources with other countries by virtue of international ties between them. These means the population of these countries have large proportions of residents from other countries. For example, the latest census of Britain shows that almost half its present population is from Asia and Africa. These people have thei r own religions, cultures, traditions and even physical features like skin colours which are distinct from the resident British population (ons.gov.uk). Thus, passing insulting comments on social media result in fear, insecurity, agony and resentment among these people. These negative feelings sometimes result in uprising and public show of anger against the racist comments (news24.com). These clashes between the insulted community and the government of the resident country (the UK in this case) may lead to breach of diplomatic ties between the country of origin of the insulted community and the resident country (Boehme). According to Martin, these uprising in countries and resultant international tensions endanger the security of countries involved. The banned groups often use the strategy of cyber insult to create diplomatic disturbances between countries to give ultimatum to their inhuman intentions. These groups usually present these insults as personal opinion which they share with their friends and acquaintances on the social platforms. The serious impacts of hate comments passed on the social media has led to the governments of countries like the United States pass laws to detect and check this misuse of the digital platform. For example, the Federal Trade Commission which draws its power from Section 5 of the Federal Trade Commission Act seeks to warn consumers against unethical groups (ftc.gov). Cyber bullying or using the social media platforms to bully innocent people refers to passing incorrect information about others usually to cause harm to them. The unlawful organizations use the social media to bully unsuspecting people to gain undeserved benefits like gaining confidential financial information. The bully can take form of sexual harassments, rumors about victims personal lives and threats (Kowalski et al.). These acts arouse negative reactions among the victims like making them feel afraid, insecure, depressed and even lead them to commit suicides. Compared to cyber insult, cyber bullying has more damaging impacts on the victims. The mentally weak people often enter depression phase due to cyber bulling. Doty et al. point out that cyber bullying is prevalent in the workplaces where a certain section of employees are targeted on the grounds of their attributes like sexuality. The employees holding high positions and even peers often use social media platforms like Fac ebook to harass female employees. This often results in the targeted female employees resigning from the organizations which lead to loss of efficient employees, thus affecting the productivity of these organizations. This has led the apex management of organizations to make policies to check all forms of cyber bullying among the employees (Yahner et al). Cyber bullying today has reached a new height and has financial as well legal implications. Unauthorized groups usually camouflage as authentic financial institutions and communicate with customers in forms of emails, calls and messages. They ask predetermined questions to extract financial information from these customers like debit card details. They use these details to obtain money from the accounts of these customers and channelize the money to finance unlawful activities like terrorism. These illegal organizations again use the accounts of customers to channelize their earnings back into the global economy, which is known as money laundering (stopbullying.gov). This strong relationship between cyber bullying, terrorist financing and money laundering has led countries around the world monitor the flow of money in the accounts of the bank customers stringently. For example, the Foreign Account Tax Compliance Act or FATCA by the United States requires all non-American financial in stitutions maintain record of their customers and to report their identities to the US Department of Treasury (irs.gov). This clearly shows that such stringent acts by financial institutions to prevent cyber bullying of financial nature limits the liquidity of the accounts of customers. Thus, the impact of cyber bullying is restricted to individual victims. It has devastating impacts on the financial conditions of the people and even on the flows of money within the economies. Cyber threats are the acts of gaining access to data stored on computers without gaining authorization from the owners of the data. The hackers often use virus and malwares to intrude into databases of companies to gain confidential financial information to finance their unlawful activities. These hackers steal information about customers and use cyber bullying to gain access to the bank accounts of these customers to finance their unlawful like terrorism (Bashir and Aqeel). However, cyber crime using social media websites is not restricted to hacking information from company to finance inhuman activities. Unlawful groups today threat top officers of the global multinational companies and government officials to extort money from them. The militant groups today upload videos of them threatening governments and countries on Youtube and Facebook. They use social media platform to flaunt their power to endanger global peace and harmony. The governments of developed and emerging countrie s in particular are subjected to these forms of threats (abcnews.go.com). These threats usually create panic among the people within countries as they often lead to waning of the trust of the people in the might of their countries to protect them. The three categories of cyber crimes using the social media platform are increasing alarmingly mainly due to lack of infrastructure to punish the people involved in these activities. The first factor which prevents the countries checking cyber crime is the lack of proper ways to deal with them. The groups which indulge in cyber crimes are financially and technically very strong. They use technology to protect their actions from being detected by government agencies like defense forces and police. Moreover, laws of most of the countries require the convicts or their representatives to be present to commence a legal case against them. For example, the Federal Rules of Criminal Procedure in the United States requires physical presence of the accused persons to protect their rights to justice (uscourts.gov). The main players of cyber crime usually route cyber crime activities from outside their target countries. Thus, the Supreme Courts of the affected countries are not able to convict t hese criminals which rid them of the fear of punishments. There are diverse ways in which countries deal with cyber crimes and try convicts of the crime if caught. The criminals often use these loopholes in the judiciary systems of different countries to escape from being convicted (Harichandran, Vikram., et al.). Thus, complexities in judiciary systems of countries are responsible for the cyber criminals carrying out cyber crime with increasing intensity. The groups involved in cyber crimes on the social media are usually linked to financially powerful terrorist groups. They bribe the top officials of governments of different countries to escape punishments. Thus, the corrupted government machineries of different countries are also responsible for increasing power of cyber criminals on social media (Zuech, Taghi and Randall). Conclusion: One can conclude from the discussion that social media today has emerged as a powerful platform to give shape to cyber insults, cyber bully and cyber threats without the fear of punishment. The three forms of cyber crimes using the social media are interrelated and have devastating impacts on the victims. Cyber insults hamper the societal and bilateral relationships. The cyber bullying impacts individuals both at financial and emotional level. The cyber threats impact companies, governments and their stakeholders like the public. The loopholes in the legal systems around the world, corruption and lack of technological infrastructure to prevent cyber crime in entirety prevent conviction of the cyber criminals. The countries urgently require adopting a common legal system which would allow trial of cyber criminals. The countries should minimize the corruption levels to crackdown on cyber crimes and cyber criminals. This would compel these groups to curtail their unlawful activities. References: "2011 Census Analysis: Ethnicity And Religion Of The Non-UK Born Population In England And Wales - Office For National Statistics."Ons.Gov.Uk, 2018, https://www.ons.gov.uk/peoplepopulationandcommunity/culturalidentity/ethnicity/articles/2011censusanalysisethnicityandreligionofthenonukbornpopulationinenglandandwales/2015-06-18. "Criminal Cases."United States Courts, 2018, https://www.uscourts.gov/about-federal-courts/types-cases/criminal-cases. "Foreign Account Tax Compliance Act FATCA | Internal Revenue Service."Irs.Gov, 2018, https://www.irs.gov/businesses/corporations/foreign-account-tax-compliance-act-fatca. "Privacy Data Security Update (2016)."Federal Trade Commission, 2018, https://www.ftc.gov/reports/privacy-data-security-update-2016. "These White People Will Respond To Your Racist Trolls So You DonT Have To."Huffington Post India, 2018, https://www.huffingtonpost.in/entry/white-nonsense-roundup-racism-white-privilege_us_59c1811ae4b0186c22069390. "What Is Cyberbullying."Stopbullying.Gov, 2018, https://www.stopbullying.gov/cyberbullying/what-is-it/index.html. "Why We Will Keep Exposing Social Media Racists."News24, 2018, https://www.news24.com/Columnists/Ahmed_Areff/why-we-will-keep-exposing-social-media-racists-20170120. Arora, Bhavna. "Exploring and analyzing Internet crimes and their behaviours."Perspectives in Science8 (2016): 540-542. Bashir, Bisma, and Aqeel Khalique. "A Review on Security versus ethics."International Journal of Computer Applications151.11 (2016). Boehme, Franziska. "We Chose Africa: South Africa and the Regional Politics of Cooperation with the International Criminal Court."International Journal of Transitional Justice11.1 (2017): 50-70. Dekker, Rianne, and Godfried Engbersen. "How social media transform migrant networks and facilitate migration."Global Networks14.4 (2014): 401-418. Doty, Jennifer L., et al. "Patterns of bullying and sexual harassment: connections with parents and teachers as direct protective factors."Journal of youth and adolescence(2017): 1-16. Harichandran, Vikram S., et al. "A cyber forensics needs analysis survey: Revisiting the domain's needs a decade later."Computers Security57 (2016): 1-13. Keinis, Virginijs. "The Theoretical and Practical Challenges of European Security Community in the Context of Globalisation."European Integration Studies11 (2017): 65-74. Kowalski, Robin M., et al. "Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth." (2014): 1073. Martin, Jarred. "Towards a national security psychology in the South African National Defence Force Psychology in the Service of National Security, A. David Mangelsdorf (Ed.): book review."SA Journal of Industrial Psychology40.2 (2014): 1-3. Ross, Brian, and James Meek. "ISIS Threat: US Military Warned About Social Media Use."ABC News, 2018, https://abcnews.go.com/International/isis-threat-home-fbi-warns-us-military-social/story?id=27270662. Yahner, Jennifer, et al. "The co-occurrence of physical and cyber dating violence and bullying among teens."Journal of interpersonal violence30.7 (2015): 1079-1089. Zuech, Richard, Taghi M. Khoshgoftaar, and Randall Wald. "Intrusion detection and big heterogeneous data: a survey."Journal of Big Data2.1 (2015): 3.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.