Abdul+Syukur_912



SUMMARY media type="custom" key="12476546" media type="custom" key="12480046"

From the article above, the Internet became the real life problems. Stalking and harassment are problems that many people especially women are familiar with in real life. It become known as ‘cyber stalking’ or ‘on-line harassment’. There are just many predators in cyberspace as anywhere else. It is only their methods have changed. Although distressful enough, the situation can even escalate to the point where your harasser traces your home address and telephone number; causing you to face not just emotional distress but also physical danger. Cyber stalking can be a devastating experience for a person online. Girls and guys may be stalked on-line, but statistics show that the majority of victims are female. Girls are the minority of the Internet population which means that their attention is generally a fierce competition between male users. So the conclusion is everybody must confidentiality about their personal information because we cannot trust people even our best friends

ALMOST ALL OF THE WORDS ARE TAKEN FROM ORIGINAL SOURCE..LEARN TO PARAPHRASE OR RESTATE !

In the article “Cyber Stalking A Real Life Problems ** ” **  by Kegler, we learn about the stalking and harassment are problems among people especially women. It has becomes known as cyber stalking or on-line harassment. There are many predators in cyberspace as anywhere else. The victims of cyber stalking had to face not just emotional distress but also physical danger because of their personal information was being spread. Cyber stalking can be a devastating experience for a person online. Men and women may be stalked on-line, but statistics show that the majority of victims are females. Women are the minority of the Internet population which means that their attention is generally a violent competition between male users. Hopefully, everybody will keep their personal information confidential because we cannot trust people even our best friends.

 **(2) ** ** Answer the following questions about the videos ** <span style="background-color: white; display: block; font-family: 'Courier New'; font-size: 13.5pt; text-align: justify;"> - What is your opinion about cyber threats ? <span style="display: block; font-family: 'Times New Roman',serif; font-size: 150%; text-align: justify;"> From my opinion, cyber threats is a cyber terrorism <span style="background-color: white; font-family: Arial,sans-serif; font-size: 9pt;"> by using the Internet <span style="background-color: white; display: block; font-family: 'Courier New'; font-size: 13.5pt; text-align: justify;"> - Give suggestions on what can be done to prevent cyber threats? <span style="display: block; font-family: 'Times New Roman',serif; font-size: 150%; text-align: justify;"> Confidentiality our personal information and always change password. <span style="background-color: white; display: block; font-family: 'Courier New'; font-size: 13.5pt; text-align: justify;"> - Can cyber threat be considered as a significant impact due to sophistication and <span style="background-color: white; display: block; font-family: 'Courier New'; font-size: 13.5pt; text-align: justify;"> modernization of an era? Why? <span style="display: block; font-family: 'Times New Roman',serif; font-size: 150%; text-align: justify;"> Yes, because people can access our personal information and become a new method how to harassment others.
 * || News 1 || News 2 ||
 * MAIN IDEA || Cyber criminal || Cyber attack ||
 * DETAILS || Can access personal information || Can access business and government information ||
 * SIMILARITIES || Cyber crimes || Cyber crimes ||
 * DIFFERENCES || How to identified cyber criminal || How to prevent cyber criminal ||