Anda di halaman 1dari 3

Freeman 1

Texie Freeman
English 0371.01
Mr. Thompson
October 1, 2016
Never Anonymous
While most internet users could argue that being anonymous online is a right and not a
privilege to privacy, they probably do not think about the dangerous people that lurk behind
screens across the world. Since the internet is so huge, there is no way to control or know what a
person does online. Strangers on the internet can take advantage of not only grown adults but
kids as well. When we allow anonymity on the internet we make it easy for cyberbullies,
terrorist, and sexual predators to hide their identity.
First, allowing people to be anonymous online makes it easy for cyberbullies to victimize
people. Cyberbullies use tactics such as making anonymous online post to make fun of the victim
in front of their peers. When this happens the victim might feel out casted at school, work or any
place where socializing occurs. This can lead to lower self-esteem and effect the way the victim
views things. Cyberbullies have existed since the beginning of the internet, and the population of
them is only growing. With the increasing use of electronic communication technologies,
bullying, a long-standing problem in childrens lives has begun to take place through electronic
communication technologies as well as in person (Bayraktar Page 2). Anonymous postings
should be regulated by a filter before being allowed to be put on the internet to minimize online
bullying.

Freeman 2

Secondly, sexual predators do and often hunt for unsuspecting victims online. Most
parents do not regulate what sites their kids visit and that makes them more susceptible to sexual
predators. When the stranger gains a childs trust and he or she can tell them personal facts and
not online does it put their digital life in danger but also their physical and mental health. The
effects on victims have been shown to include anxiety, post-traumatic stress disorder, depression,
and developmental disruption. (Schulz Page 2).
In addition, while cyberbullies and sexual predators are more well to be online, most
internet users are well unaware of the biggest threat on the internet, terrorists. Since it is so easy
to make a new identity online, this allows them to spam the internet with horrible messages.
When they make many accounts, its harder to take down one account when they have already
made four or five more in its place. Much like in past circumstances, they use these accounts to
persuade other users such as teens and young adults to do their budding which basically opens up
a door in the US to them. Like all of us, terrorists now use the Internet for many purposes. It is
commonly believed that planning operations, fundraising, and recruitment are the three main
ways that terrorists take advantage of online communication. (Morrison Page 1). While the U.S
can not prohibit online terrorist from posting since they are halfway across the world, they could
put up blocks from letting them into certain sites like Twitter and online government websites.
When we allow anonymity on the internet we make it easy for bad users like these to take
advantage of innocent people. Anonymity on the internet is putting everyone at risk. To regulate
the dangers online, there should be distinct online rules like internet users can only make two
email accounts and not have multiple user names. Internet traffic should be closely monitored to
see what users are posting. If we take certain steps, we can reduce the population online who do
not have good intentions.

Freeman 3

Work Cited
Bayraktar, Fatih, et al. "Cyberbullying: The Discriminant Factors Among Cyberbullies,
Cybervictims, And Cyberbully-Victims In A Czech Adolescent Sample." Journal Of
Interpersonal Violence30.18 (2015): 3192-3216. PsycINFO. Web. 11 Oct. 2016.

Schulz, Anja, et al. "Online Sexual Solicitation Of Minors." Journal Of Research In Crime &
Delinquency 53.2 (2016): 165-188. Academic Search Complete. Web. 11 Oct. 2016.

MORRISON, STEVEN R. "Terrorism Online: Is Speech The Same As It Ever Was?." Creighton
Law Review 44.4 (2011): 963-1002. Academic Search Complete. Web. 11 Oct. 2016.