Lisa Selin Davis Internet Trolls Summary

Good Essays
In the article “Internet Trolls” by Lisa Selin Davis, she talks about people who spread negativity on the internet. According to her article, people leave nasty comments on the internet because they feel like they are alone and can hide behind the computer. Also, they want to get a reaction out of people and gain attention, so they say harsh, hurtful comments. She believes people don’t think before they type. These “trolls” can be categorized into many different groups including: hackers, catfishers, and cyberbullies. First of all, hackers are people who use the internet to gain access to other people’s private information with a malicious intent. They will attack innocent people and take their information for many reasons. Davis says that their behavior is anonymous and unethical. Identity theft is a form of hacking where people steal important information such as social security numbers, identification numbers, and credit cards. They can …show more content…
These people use social media to pretend to be someone that they are not. In some cases they do this in order to date someone they feel is out of their league. Catfishing has become increasingly popular, they even made a hit TV show about it. In the show, the creator of the show and his partner try and see if the person online is who they say they are and usually they are not. Catfishers steal information and pictures from strangers or a friend they wish they could be and put it out there hoping to deceive a person into being with them. Davis says catfishers are suffering from the “disinhibition effect,” which is “the frequency of self-interested unethical behavior increases among anonymous people” (3). In other words, catfishers think just because they can’t see the person then they have a chance to trick that person and nobody would get hurt. Perhaps, they just don’t care if the other person gets hurt. The catfishers know they can’t get hurt because catfishers have a fake

Related Documents

  • Decent Essays

    Types of Cyberbullying and Cyberstalking [2]: 1. Trolling and Flaming: This category includes posting mean spirited, rude or angry messages 2. Excluding: For malicious reasons leaving someone out of an online group. 3. Masquerading: Creating media profiles in Facebook, Twitter or other social networking sites as someone else in order to damage the reputation of the victim.…

    • 1404 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Cyberbullying

    • 1652 Words
    • 7 Pages

    One type of cyber bullying would be cyber stalking, this is repeated unwanted messaging being sent to a person. Another type is cyber threats, this consists of threatening through the internet a person’s physical safety. Defamation is “dissing” someone on social media where all can see. Exclusion would be just excluding someone from a group message or event on purpose, not accidently. Another very common type of cyber bullying is flaming and trolling.…

    • 1652 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    Malware has become a serious issues , as we know the world now depending for technology to communicate , shopping , and educations. So I will explain what type of of malware and how to prevent from it. Malware is a serious problem and customer are mostly victim. The malware basically is a software design by hacker to perform a malicious work. Publish the the advertisements in browser and gain the password account.…

    • 1452 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Cyber Crime is a malicious activity including the illegally receiving data, system interferences that compromises network and integrity and availability and copyright infringements. In other words, Cyber Crime is an illegal activity performed with the help of a computer system. It was started with hackers trying to break into computer networks. Some did it for thrill of accessing high level security networks, but others have quest to gain sensitive, classified material. Eventually, criminals started to infect computer systems with computer viruses, which led to breakdown on personal and business.…

    • 1830 Words
    • 8 Pages
    Decent Essays
  • Decent Essays

    Nowadays many hackers found different ways to hack personal information of others such as bank details, credit card details, insurance details, business details and many more important files. With just detecting an IP address of internet user, the hacker can hack the full computer or smart phone and steal all the information. Normally, the victim doest know that their information is stolen. Other than that, cheating also is done through internet such as on social media on BlogSpot. Too much information in social media such as Facebook are seen and scanned by cheater around the world.…

    • 744 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    As I mentioned, the internet is full of cyber bullying which is when people humiliate or talk bad about each other on the internet through a form of social media such as Facebook or Instagram. People can lie about who they are and you can open yourself up to being stalked over the internet by Predators. These predators can track you down over the internet, threaten you and even use your personal information. Your account can be hacked and they can also use your photos without your permission. Predators can find out where you live and work including your social security number because people make mistakes when they put their true information on the internet.…

    • 832 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    They may also perform tests and exposure assessments. • Cracker – Black hat A cracker gains unauthorized access to computer systems for personal gains with unethical intentions, such as stealing corporate data, violate privacy rights, stealing funds, etc. In the recent past, the official website of the government of Maharashtra was hacked on September 20, 2007. The state government took the help of the Cyber Crime Branch to investigate the case. The website contained detailed information about government departments, circulars, reports, and similar other important data.…

    • 1304 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Hackers are one of the many problems connected to the use of the net. As E-commerce grew so did the amount of hackers stealing peoples personal information like name, address, credit card number too their social security and use it to make purchases, transfers and more. Black Markets, private shopping sites, give a person access to illegally sold products around the world with the use of a currency called bit-coin. Most times the sites aren’t accessible and just so they can stay unnoticeable they have a unique uniform resource locator. To go even further, the internet allows a user a since of invisibility and the creation of another identity that may not be true.…

    • 1110 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Cyber Bullying Speech

    • 983 Words
    • 4 Pages

    Examples of cyberbullying are sending hurtful text and or posting embarrassing things on social media. (commonsensemedia.org) Cyber bullying is a very serious thing that has a lot of different effects on different people. The victim of the cyber bullying may feel vulnerable, and they find it difficult to fell safe When their personal life has been invaded and exposed. (verywell.com) The cyber bully might post the victims private information about their family, friendships, and relationships. The victim may feel depressed because the cyber bully destroys there self confidence.…

    • 983 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Cybercriminal Crimes

    • 779 Words
    • 4 Pages

    They are cyber criminals that can anonymously attack anyone from behind a computer (Vigoroso). These criminals can do anything from stealing some quick cash to stealing someone’s very identity. These types of crimes are on the rise worldwide and can leave victims financially crippled. Cybercrime is defined as “any illegal activity that uses a computer as its primary means of commission” (Rouse). Many of the world’s major countries…

    • 779 Words
    • 4 Pages
    Decent Essays