Monday, December 30, 2019

Concerns of Medieval Europe - 708 Words

Concerns of Medieval Europe The 16th and early 17th centuries of Western Europe were dark and dramatic, as French Catholics had slaughtered more than ten thousand Protestants in Paris on August 23rd, 1572. However, during this period, people began to challenge and question religion. Francis (Francois) Rabelais published his satirical novels Gargantua and Pantagruel (between 1532 and 1564) to criticize the French Catholic Church on social hypocrisy; about forty years later, Miguel de Cervantes completed his satirical book Don Quixote (in 1605) to show readers the absurdity of government in society. The social concerns of their time were religion and politics, which remain hot topics in today’s world. Rabelais’s books Gargantua and Pantagruel criticize the Catholic Church because it had obtained excessive political power, as it began to constitute social laws for life. The Catholic Church was using excommunication as a tool to maintain control of people and society, even though the church was deceitful to its own followers. Rabelais suggests that the church was too arrogant for constructing laws for people to follow, although, individuals should not dismiss religion entirely, but rather keep it aside while they purse a humanistic education. In his books, he mentions clergymen as having human qualities of heroism, bravery, and humor, even though they were piously corrupt. In chapter eight, the character Gargantua writes a letter to his son Pantagruel about pursing aShow MoreRelatedThe Medieval Machine by Jean Gimpel600 Words   |  3 Pages The Medieval Machine by Jean Gimpel, shows information about the technological accomplishments of the middle Ages. The basic idea is that during the two centuries from around 1050 Western Europe went through a kind of industrial revolution that was just as important as of the nineteenth century’s. In his book Jean Gimpel goes over medieval primary industry, which includes energy sources like the creation of mills that were moved by wind power or by water. In these cases, the turningRead MoreThe Medieval Machine : The Industrial Revolution Of The Middle Ages1377 Words   |  6 Pages The Medieval world has a certain connotation to its meaning. People throughout time have found the era synonymous with negativity. It has often been referenced to as the middle or dark ages lending people the view of a world with little to no progress along human advancement. We often paint the picture of medieval Europe with kings, queens, lords and peasants. We also immediately thing of the bubonic plague that wiped out almost a third of the European population at the time. However, there areRead MoreComparing similarities and differences between Medieval Europe, China and Islamic countries.1489 Words   |  6 PagesRelationships between the individual and society vary between cultures, religions and ethnicities. Nevertheless, throughout history, how the individual is seen in society varies accordingly. In Medieval Europe, China and Islamic countries, religious beliefs and different philosophies greatly contributed and effected how individuals in a community acted and interacted w ith their society and other countries. Different lifestyles and common norms contributed to the differences in relationships becauseRead MoreEssay about Christendom and The Song of Roland1119 Words   |  5 Pageseleven century to twelfth century. This epic poetry holds an important place in the history of France and invention of Christendom. The Song of Roland is a cultural artifact that takes us to the journey of Medieval Europe, when religion becomes an important element for the formation of proto-Europe. Religion plays a crucial role in The Song of Roland and becomes the reason of criticism. Some readers might take this poem as a religious text, whereas, for some reader it is a fictional literary work andRead MoreChristians, Jews, and the Black Plague1707 Words   |  7 PagesRelations between the Christians and Jews of medieval Europe were always influenced by their unequal social and economic statuses and the religious competition that existed between them. While the Jews s erved a purpose in the Christian religion, this purpose meant that the more populous Christians that had come to dominate Europe only tolerated the Jews. No premise of equality existed, and the Jews came to depend on relationships with lower-level rulers to secure their relative safety. RumorsRead More The Impact of Charlemagne Upon Europe Essay1605 Words   |  7 Pagesor Charles the Great, reigned during a time of much turmoil and upheaval in Europe during middle ages. Charlemagne’s background and family history contributed much to his rise to power. The triumphs of his past lineage prepared him to take on the task of governing the Frankish Empire, and defending it from invaders. Charlemagne accomplished much during his supremacy. He not only brought education back into medieval Europe, but also invented an efficient way to govern his people. His conquests againstRead MoreAncient Greece And Modern Medieval Europe1686 Words   |  7 PagesMany historians and scientists regard Europe as completely devoid of interest in the history of science. Contemptuously, medieval Europe is most often referred to as the â€Å"Dark Ages,† the epithet clearly illustrating the struggles of the time period and disdain for this part of history. The modern perception of medieval society is overwhelmingly dominated by a skewed interpretation of a barbaric, war-torn civilization barely surviving through suffrage of plague and poverty that stifled nearly everyRead MoreHistorical And Philosophical Movement Of The Renaissance1596 Words   |  7 Pagesthe writings and concerns of the medieval times through the emergence of humanism and free will, the revival of antiquity, natural philosophy and enlightment of knowledge. To understand why the Renaissance played a significant role in this transition, it is important to first consider how the medieval times differed from it. The medieval times lasted from the 5th to the 15th century and marked its beginning with the collapse of the western roman empire. The history of the medieval times has oftenRead MoreThe History of the Western World from 500 B.C. to 1500 A.D.1178 Words   |  5 Pagesmovement or occurrence. This period was the medieval period that was an era experienced in Europe during this time. The dark ages were also experienced during this time between 500 A.D and 900 A.D. This period starts in the fall of the Roman Empire which witnessed decay everywhere . The weight of poverty, insecurity and isolation was too great to permit the production of literary artistic and scholarly master pieces. There was little cultural creativity in Europe in the 1000A.D to the latter part of theRead MoreThe Medieval And Renaissance Era719 Words   |  3 Pagespaper, we’re going to address the fundamental changes in the Medieval and Renaissance era over those hundreds of years, especially concerning architecture, in which brought us to our present. The Medieval and Renaissance eras significantly altered the history not only through philosophy but through art and architecture as well in which was the aftermath of such evolution in beliefs and values. As there were non stop wars throughout the Medieval period, people were more concerned with the safety of their

Sunday, December 22, 2019

Religion vs. Secularism - 2082 Words

Religion and Secular Public Policy The relationship that never worked In the American presidential election of 2004, faith-based policies and issues of religion were at the center of the controversy. With his religious stances on abortion, gay marriage, and faith-based education, as well as his campaigns success in painting him as a man of religious conviction, President George W. Bush commanded the pious, Christian population, which appeared in great numbers at the polls. Senator John Kerrys campaign, alternatively, painted its candidate as an intellectual, academic politician. The senator appealed to the more secular and intellectual population that, in the end, proved less populous than the pro-Bush voters. Though it is difficult to†¦show more content†¦A pre-election trip across the Arkansas countryside is all it takes to see evidence of religions coupling with politics. Removable letters outside a church in Conway, AR displayed not the usual reminders of church services, but instead reminded voters that a vote for Bush is a vote for God. 4 Because most truly religious people hold allegiances to things higher than their countries, such as the Vatican or God Himself (the laws of God are above the laws of Man), religion itself has a blinding effect for these people who also hold the right to vote. This church, clearly favoring the President, employed guilt tripping as a tactic to bolster the Republican vote in the area. Religion tends to define the lines between issues: it tells its followers what to believe. Such messages, whether literally displayed on church lawns or subliminally implanted in campaign advertisements and speeches, do not call the legality of religion in politics into question (this discussion is not about the separation of church and state) but instead call into question the ethics of casting a vote in the political arena based on a belief held in the religious arena. The problem with the relationship between secular politics and religion is that it is entirely unnatural: the two institutions are bot h necessary and both omnipresent. Religion and public policy are twoShow MoreRelatedDoes Religion Foster Democracy?1383 Words   |  6 PagesDoes religion foster democracy? This question has plagued many political scientists for decades. Carsten Ancker examines the theories of Samuel P. Huntington in her work â€Å"Religion and Democracy: A Worldwide Comparison.† In 1991, Huntington hypothesized that religion led to the institutionalization of democracy, especially Christianity. Huntington referenced the rise of democracies in the 70’s that were related to the spread of religion as well as earlier, when Protestantism was popular. In his bookRead MoreEssay on Women Empowerment5257 Words   |  22 Pagesoften have ripple effects to future generations. The roles that men and women play in society are not biologically determined - they are socially determined, changing and changeable. Although they may be justified as being required by culture or religion, these roles v ary widely by locality and change over time. Key issues and linkages: 1)Reproductive health: Women, for both physiological and social reasons, are more vulnerable than men to reproductive health problems. Reproductive health problemsRead MoreEssay on Women Empowerment5266 Words   |  22 Pagesoften have ripple effects to future generations. The roles that men and women play in society are not biologically determined - they are socially determined, changing and changeable. Although they may be justified as being required by culture or religion, these roles vary widely by locality and change over time. Key issues and linkages: 1)Reproductive health: Women, for both physiological and social reasons, are more vulnerable than men to reproductive health problems. Reproductive health problemsRead MorePrayer, Homosexuality, And Alcohol And Drugs1469 Words   |  6 PagesReligion vs. Secularism in Prayer, Homosexuality, and Alcohol and Drugs The Puritans left England to be able to have the freedom of choosing their religion. Their voyage seems like a long time ago, but still today, America struggles to find the balance between religion and freedom. This paper will discuss three areas where this battle is manifested: public prayer, homosexuality, and alcohol and drugs. America today reflects the outcome of each side’s ability to make laws and the measures that wereRead MoreExtempore Topics1028 Words   |  5 Pagesguy) Bollywood(SOP) dressed to kill commonwealth games and impact on india Unity in Diversity small efforts giga results package is everything today(consumerism) Arjuna and Management(as my name is Arjun) Race horses are born and not bred NIT vs IIT(NITIAN) Bird Watching K2 most pleasant day of my life If I were at the center of the earth Mother can make great nations Swimming is the best sport titan sunshine being mayawati gurunanak(school name) delhi as a capital pencil sangam Read More2- Religion Does Not Cause Wars860 Words   |  4 PagesReligion Causes War. So often is this sentiment heard in the best sellers from Richard Dawkins to Sam Harris that it has almost become a proverb. It is said so often that people believe it without question. But, in fact, religion does not cause war. If you are an atheist, I ask for your intellectual honesty in evaluating this question. You have every right to believe what you will, but we should all be honest and not sling mud where it is not warranted. Laying war at the feet of religionRead MoreDoes Religion Imply Morality?1321 Words   |  6 PagesDoes religion imply morality? Not exactly, according to research. Contrary to popular belief, non-religious persons are not evil and do have morals. In fact research shows that people associated with no religion may be more moral than those who are religious. Furthermore, the irreligious do good deeds for the sake of being a good person, while religious people tend to do it for recognition or because someone or something tells them to. The origin, the truth, and the perpetuation of this stereotypeRead MoreIndi A Country Of Personal Laws1482 Words   |  6 Pagesunified set of a secular law, that will be applicable for each and every citize n of India irrespective of his/her religious community. It proceeds on the assumption that there is no necessary connection between religion and personal law in a civilized society as was said in Sarla Mudgal vs. Union of India and others1 Political parties have made it a point of luring the minority for their vote banks and leaving it no more a legal question. It is ironic that a constitutional provision intended to bringRead MoreFreedom Of Religion Is Closely Associated With Separation1126 Words   |  5 PagesFreedom of religion is closely associated with separation of church and state, a concept advocated by James Madison and Thomas Jefferson. The United States Constitution addresses the issue of religion in two places: in the First Amendment, and the Article VI prohibition on religious tests as a condition for holding public office. The First Amendment prohibits the Congress from making a law â€Å"respecting an establishment of religion, or prohibiting the free exercise thereof † (Christofferson 1). ThisRead MoreSolution to Ignou Papers2652 Words   |  11 Pages==== 2. Does the post – Industrial society differ from the Industrial society? Explain 20 Solution: Yes the Post – Industrial society is differing from the Industrial society because of the following reason: * Limited production (i.e. artisanship vs. mass production) * Primarily an agricultural economy * Limited division of labor. In pre-industrial societies, production was relatively simple and the number of specialized crafts was limited. * Limited variation of social classes * Parochialism—Social

Friday, December 13, 2019

Counselor’s failure to connect with client Free Essays

â€Å"There is also some current there, you feel hurt because, in some ways you’re saying to me that you can’t love her as full as you really love her, you can’t show her. † The counselor failed to connect with the client when the client is told thatâ€Å"there is always going to be a conflict. † The client was in the course of sharing her thoughts to which the counselor mutters the word â€Å"anytime† thrice. We will write a custom essay sample on Counselor’s failure to connect with client or any similar topic only for you Order Now The client seems to be distracted by the constant response of â€Å"anytime† to which she simply said â€Å"okay†. Then the counselor proceeds with periodic interruptions and said â€Å"conflict in you so the relationship with the daughter can be as full as it can. † The client wanted to state something but the therapist continues to elaborate on what she thinks the client wants to say. Another part that the counselor did not connect to the client is when counselor stated to add reinforcement schedules, or intellectual, other intellectual strategies to start where the client is the strongest. The client replied by asking if her tears will control of the reinforcement schedules, or intellectual strategies which were ignored by the counselor. The counselor continues to advise the client to â€Å"build her heart to your head and not from your head to your heart, that’s a personalized view. † It is clear that the session is not client-centered towards the end of the conversation. The client spoke in soft voice saying â€Å"yeah yeah. † While the counselor continues to elaborate her piece of advice by saying â€Å"It would make sense and it would be an area of strength there† and â€Å"it makes sense. And it’s just that I had it in the wrong† without acknowledging the client’s question. The counselor also finished the client’s sentence when he or she said the word â€Å"order† indicating that the counselor did not let the patient say what she needs to say. It failed to promote understanding given the need for the client to reiterate what she heard from the counselor to confirm mutual understanding. Overview of the session The session was about the dilemma of the client on teaching her daughter to sleep in her separate bed. The mother reinforces this behavior but easily succumbs to the cries of her daughter to let her sleep beside her mother. The mother wants to teach her daughter how to be independent enough to sleep alone. There was a significant progress of this reinforcement when the daughter is promised to have rewards during birthdays and Christmas. The mother has frustrations on how she surrenders and let her daughter have her own way. In addition to, the mother has trouble sleeping when her daughter cries until she is transferred to her mother’s bed. The main issue of the client is that she feels angry with herself more than she feels angry toward her daughter. The client thinks that she is the one to blame for allowing her daughter to get some leeway thus allowing herself to be weak to stand by her own rules. A non-evaluative overview of what happens in the session The session allowed the client to express her trouble and feelings with regards to reinforcing her daughter to sleep in her own bed. The client opened up her problem at the first half of the session while the counselor rendered her opinions and suggestions on how to view the disciplinary actions applied to the client’s daughter as well as how to approach the issue by taking â€Å"small, increment† steps. How did you feel while reading about the session? (no more than half a page) While the reading the session, it struck me how important it is to share burdens or worries. Issues such as parenting or reinforcing good behavior of children can be a battle of emotions and will. Thus, a parent can be torn between following her mother’s instincts to let her child have her or his desires but at the same time should be a disciplinarian. After all, the role of parents is to rear their children to be responsible and productive individuals. I also realized that the conflict between being too lenient and strict when it comes to parenting is often a battle of emotions for most mothers. Motherly love often gets in the way on instilling discipline on the child as pity gets the better of a mother upon seeing her child showing signs of distress such as crying, throwing tantrums, or helplessness. Lastly, there is a need for making appropriate responses during counseling. The responses made should be oriented in a manner to further explore a client’s feelings by expressing acknowledgment, accepting by letting the client talk, exploring with additional questions, and validating the client’s responses by asking the client to further elaborate her or his thoughts. My opinion of this counseling session Based on what I read, the counseling session has its good and bad points. Counseling is considered a good therapy for clients who need to talk their problems out. Thus, the client in one way or another expressed her pent up anger and frustrations. The counselor was able to listen and give suggestions to the client and her problem. Counseling skills that the counselor attempt to use and list some examples using your transcript. The counseling skills employed by the counselor are verbal attending behavior include things such as your tone of voice, rate of speech, sighs, and uhms. The classic â€Å"uhum† is a verbal sign of interest that encourages a client to keep talking. What do you see as the counselor’s main strengths or good qualities? The main strength of the counselors is having the ability to form interpretations and use of empathetic comments. The counselor expressed his or her own interpretations when the client narrates her struggles on reinforcing her daughter and the need to sleep in her bed. The act of nodding your head or being silent while the client is talking serves as a powerful message to encourage the client to express his or her feelings. This therapeutic form of communication can only be used on specific instances thus should not be used all the time since it shows disinterest. The counselor made empathetic comments such as â€Å"so, but, but you’re still left with a, holding your breath. † and you’re really testing your own patience with the three days, four days, two weeks, then back. † Thus it validates clients’ reactions as acceptable, normal, or understandable. How to cite Counselor’s failure to connect with client, Papers

Thursday, December 5, 2019

The Threats of Cyber Crime free essay sample

The hackers that were once just bored 13year olds holed up in their bedrooms, playing with computers and testing their abilities are now cyber criminals, using their college learned computer skills to steal millions of dollars. What once made everyone fear for their email accounts, MySpace and Facebook pages, have now upgraded to cyber terrorism and it only takes a click of a mouse. Cyber-crime doesn’t only affect businesses; it can also destroy our personal lives. Cyber-crime is a crime committed online. Sometimes it can be stealing someone’s username and password to an Internet site. One friend might think it’s funny to try and login on another friend’s website and upload incriminating photos or videos of them. It could also be a group of people who find each other through chat rooms, who plan on hacking into the CIA’s database. Two hacker groups that have been in the news lately, Anonymous and LulzSec, have recently hacked into 77 police databases in the United States. Once hacked, they released all the information of anyone who has filed a complaint to the police. This also included anyone who wanted to stay anonymous and credit card information they found on file. The reason these groups committed such cyber-crime was because the FBI has been conducting investigations on the members of these groups. They released a statement with the leaked data stating they felt no sympathy for what they’ve done (Swaine, 2011). These hacker groups can be a very dangerous sort. During the riots in Britain, a conservative member of Parliament had death threats emailed to her children. This occurred because she urged social networks to be taken down while the riots continued. It’s assumed that the hacker groups Anonymous and LulzSec ent them, but they haven’t claimed any responsibility for them as of yet (Brit MP says hackers threatened her kids, 2011). Investigators are skeptical thought because these groups have yet to make any death threats. Cyber-crime is now an underground economy pulling in a $100 billion dollars annually, worldwide. In this day and age, internet merchants are becoming more and more popular. There was a time when seein g the UPS man drop a package off was exciting. It meant a family member sent a present or that something special came. Now people are getting packages every day instead of going to the mall or local shopping center. Society today is even able to order all household groceries online. But in order to do so, a lot of times people have to pay for what they order through Paypal. com. PayPal. com cited a report by the Australian Competition and Consumer Commission that showed losses to cyber-crime totaled at $63 million in 2010. (Internet Crime Caution Alarm Over $63m Cyber Sting, 2011) The definition of cyber-terrorism is the use of computer network tools to shut down critical national infrastructures (such as energy, transportation, government operations) or to coerce or intimidate a government or civilian population. The premise of cyber terrorism is that as nations and critical infrastructure became more dependent on computer networks for their operation, new vulnerabilities are created (Lewis, 2002) When doing a Google search of cyber-crime, 10. 4 million webpages came up (Coleman, 2011). The bigger the businesses that are hacked, the more mainstream cyber-crime becomes. The most threatening part of cyber-crime above all else, is that it funds terrorism. Al Qaeda’s Chief Cyber Terrorist was arrested in his London loft with the data of 30,000 credit cards, all of which he was using to fund his operations (Coleman, 2011). Cyber-crime has become the most threatening crime in so many ways, because it can be linked in one way or another to other crimes. And worst of all, society isn’t even in a position to defend itself against it yet. An article published in the Wall Street Journal quoted the Pentagon stating â€Å"If a cyber-attack produces the death, damage, destruction or high-level disruption that a traditional military attack would cause, then it would be a candidate for a use of force consideration, which could merit retaliation. (Pentagon: Cyber Attacks Can Count As Act Of War, 2011) There have been recent attacks on the Pentagons computer systems, which has created urgency for a better approach to keep the hackers out. There have been reports stating that the United States Government plans to spend $13. 3 billion by 2015 to defend against cyber-crime. In the fall of 2010 the International Cyber Security Protection Alliance (ICSPA) was formed. They are a global not-for-profit organization â€Å"established to channel funding, expertise and assistance directly to assist law enforcement cyber-crime units in both domestic and international markets. (Coleman, 2011) In April of 2011, Sony Online Entertainment was hacked. The attack and intrusion could end up costing the company hundreds of millions of dollars. When the company announced they had been hacked, share prices dropped 30 percent. â€Å"It seems no fraud monitoring services are currently being offered: this may be a sign that Sony is not yet confident what accounts the hacker gained access to, and so is not willing to offer such a service to 70 million + users until they know who has been affected, when such a service could cost over $100m† said Matthew Norris, e-risk and privacy expert at specialist insurer Hiscox. (FOi: Future amp; Options Intelligence, 2011) One of the best ways to protect from cyber-crime at home is to make sure the wireless Internet is protected with a password so it’s †Å"secure†. Anyone can hack into a home network using a cell phone device or PDA and confiscate all the email passwords and bank account information of their victims. There have also been suggestions of using at least one capital letter in your password or a mix of letters and numbers. Also, don’t use anything that someone might be able to guess, such as a birthday, anniversary date, children’s names, etc. In the world of E-Commerce, protecting client’s information is critical to a business’s success. Fraud filters can be put in place, as well as insuring the company is P. C. I. (Payment Card Industry) compliant. To become P. C. I compliant, the E-Commerce company cannot retain client credit card data such as credit card number, expiration date or ccv code. In place of this, the company can use tokenization practices. Tokenization practices assign the credit card information to a specific token so that instead of handing over the full credit card information, a token is applied to the client’s credit card information. At the point of sale, the token is passed over to the payment processor; the payment is applied and given back to the merchant. A token has no defined value, in place of the true data that does have value. That way if a system is hacked, the tokens are taken, not the actual data. Some people might say that political crime or financial crime is the most threatening, for obvious reasons. Political crime effects our government and financial crimes can destroy our economy. Currency counterfeiting and money laundering are both big issues when it comes to financial crimes. But in researching the effects of financial crime, it comes right back to cyber-crime with data fraud and spam. With the increasing technology, committing a financial crime will also be considered committing a cyber-crime because the Internet is used for everything from purchases, to storing consumer’s information. Political crime on the other hand, can still be committed as an act in itself. Espionage, treason or any other act committed against the government or state doesn’t have to be done through the Internet. Terrorism, as the 10 year anniversary of September 11th approaches, is also a very devastating political crime. It took the lives of thousands of people. It destroyed families who lost loved ones; and it destroyed the people who survived. Yes it made history, but it destroyed a landmark, it started the onslaught of the recession the United States is suffering from currently. Besides the thousands of people that were killed onsite that day, the â€Å"War against Terrorism† has taken thousands of soldier’s lives who were defending their country. Political crime comes in at a very close second, if not at a tie, for the most threatening crime. Cyber crime can also be committed when a cell phone with wireless internet is used to engage in unlawful sexual acts. In the case United States v. Kramer, the defendant pled guilty to transporting a minor across interstate commerce with the intent to commit criminal sexual activity. The defendant’s cell phone was used to make phone calls and send text messages to the victim. Statute 18 U. S. C. S.  § 1030(e)(1) was broad enough to allow the U. S. District Court of the Western District of Missouri to sufficiently show how the defendants cell phone could be considered a â€Å"computer† because it had internet access. Kramer appealed to the U. S. Supreme Court, but the judgment of the district court was affirmed (United States v. Kramer, 2011). Statute 18 U. S. C. S.  § 1030(e)(1) states whoever intentionally accesses a computer without authorization or exceeding authorized access and thereby contains information contained in a financial record of a financial institution, information from any department or agency of the United States, or information from any protected computer is committing fraud. The punishment for committing these acts can be a fine or imprisonment for no more than 5 years. In Phoenix, Arizona; the father of a 14 year old girl found text messages on her cell phone from a 20 year old man. The text messages that were sent were inappropriate messages about sex, and the victim admitted that the suspect also inappropriately touched her months back. If those text messages hadn’t been noticed, these crimes committed against a minor would have gone unnoticed. The suspect, Ethan Cook, was booked at the County Jail on three counts of child molestation, four counts of sexual abuse and one count of luring a minor for sexual exploitation (Fishman, 2010). The new technology that society uses makes everything so much more convenient, but, in the wrong hands can also create even more danger. Children at the age of 5 are given cell phones to appease them in public and at home. Parents used to worry about parental controls on the computers their children were using, because the dangers lurked in chat rooms and unwanted email. Now these children of the same age have personal cell phones to do all the social networking they want, with no cares in the world. Cyber-crime takes place with the spam mail in an email account, or a politician or celebrity’s risque photos posted all over the internet without consent. It affects the kids in high school who trust the wrong people with the wrong secrets or even gossip in the workplace. Too much time spent surfing around for email newsletters can often lead to strange emails from people claiming to be priests from other countries, or claims for large sums of money. They ask for the personal information of their victim and sometimes even lead them out to whatever country the scam is coming from. Then they take all of their victims’ money and leave them stranded. Cyber crime is committed when a computer is used to search for child pornography or a cell phone with internet capabilities is used to sexually harass another person. When a person accesses a business’s computer without authorization, or when a death threat is emailed. The possibilities of cyber-crime are endless and no matter how cyber crime is used, it always ends up hurting someone. References 18 U. S. C. S.  § 1030(e)(1)