{"id":42,"date":"2022-04-13T17:31:40","date_gmt":"2022-04-13T17:31:40","guid":{"rendered":"https:\/\/student.wp.odu.edu\/kmorg032\/?p=42"},"modified":"2022-04-13T17:31:40","modified_gmt":"2022-04-13T17:31:40","slug":"entry-12","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/kmorg032\/2022\/04\/13\/entry-12\/","title":{"rendered":"Entry #12"},"content":{"rendered":"\n<p>Welcome Fellow Readers, I will be answering how does cyber technology impact interactions between offenders and victims? For assignment eportfolio entry number twelve. Nowadays, the newer generation of the internet has opened many opportunities to cyber stalking and cyber harassment. What is an offender? According to Law Cornell, \u201cOffender\u00a0is a legal term used in the context of\u00a0criminal law\u00a0to refer to a\u00a0person\u00a0convicted\u00a0of committing a\u00a0crime\u00a0or\u00a0offense. An adult offender is a person convicted of committing a crime after reaching the\u00a0legal age\u00a0of majority. A young offender (usually called a\u00a0juvenile delinquent) is a person convicted of committing a crime during late adolescence or early adulthood but before reaching the legal age of majority. A first offender is a person convicted of committing a crime for the first time. Under the\u00a0U.S. Sentencing Commission Guidelines Manual, a career offender is an adult offender who commits a\u00a0felony\u00a0that is either a crime of violence or a controlled substance offense after being convicted of two prior crimes of violence or controlled substance offenses.\u201d What is a victim? According to Collins Dictionary, \u201cA victim is\u00a0someone who has suffered as a result of someone else&#8217;s actions or beliefs, or as a result of unpleasant circumstances.\u201d\u00a0<\/p>\n\n\n\n<p>&nbsp;Cyber Technology&nbsp;has made an adverse consequence in regard to collaborations among wrongdoers and casualties. The Cyber Technology has made it more straightforward for hoodlums to take information from individuals whether it be their character, credit\/banking information, clinical records, or other individual information. Before lawbreakers would need to actually collaborate with individuals to get this data yet presently it should be generally possible on the web. They could without much of a stretch stunt individual into accepting they were giving their data to individuals they trust. They could even be hacking in their PCs to recover this data by conveying malware. The development pace of cybercrime is expanding quickly as a result of the progressions in the cyber technology.&nbsp;<\/p>\n\n\n\n<p>Work Cited:&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.law.cornell.edu\/wex\/offender\">https:\/\/www.law.cornell.edu\/wex\/offender<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.collinsdictionary.com\/us\/dictionary\/english\/victim\">https:\/\/www.collinsdictionary.com\/us\/dictionary\/english\/victim<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome Fellow Readers, I will be answering how does cyber technology impact interactions between offenders and victims? For assignment eportfolio entry number twelve. Nowadays, the newer generation of the internet has opened many opportunities to cyber stalking and cyber harassment&#8230;. <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/kmorg032\/2022\/04\/13\/entry-12\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":20947,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/kmorg032\/wp-json\/wp\/v2\/posts\/42"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/kmorg032\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/kmorg032\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/kmorg032\/wp-json\/wp\/v2\/users\/20947"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/kmorg032\/wp-json\/wp\/v2\/comments?post=42"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/kmorg032\/wp-json\/wp\/v2\/posts\/42\/revisions"}],"predecessor-version":[{"id":43,"href":"https:\/\/student.wp.odu.edu\/kmorg032\/wp-json\/wp\/v2\/posts\/42\/revisions\/43"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/kmorg032\/wp-json\/wp\/v2\/media?parent=42"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/kmorg032\/wp-json\/wp\/v2\/categories?post=42"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/kmorg032\/wp-json\/wp\/v2\/tags?post=42"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}