Digital Privacy and Digital Inclusion Access to Technology updated 1 1

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 41

K.

Mahesh Adithya Srivathsan

BA.LL. B (student)

Maheshtony0464@gmail.com

264/B Mitta Street, Tirupathi pin- 517501, Andhra Pradesh, India, PH: 9704702889

B. Lavan Kumar

B.SC (student)

lavan.sn2424@gmail.com

Muthu Nagar,4th line, Yogimallavaram, Tiruchanoor, Tirupathi Andhra


pradesh,517503, India PH: 89782 92879

Title: Digital Privacy and Digital Inclusion

Sub-theme: influence of media on delinquent behaviors


DECLARATION:

We, K. Mahesh Adithya Srivathsan and B. Lavin Kumar , solemnly declare that the
research work presented in this paper titled "Digital Privacy and Digital Inclusion:
influence of media on delinquent behaviors" is the result of my own original
investigation and has not been submitted for any other degree or qualification at any
university or institution. All sources used for the purpose of this research are
appropriately cited and acknowledged in the bibliography. Furthermore, I affirm that
no part of this paper infringes upon the intellectual property rights of any other
individual or entity. Any contributions made by others to this research are duly
acknowledged.

I understand the importance of academic integrity and take full responsibility for
ensuring that this work is entirely original and free from any form of plagiarism.

K. Mahesh Adithya Srivathsan

B. Lavan Kumar

28/02/2024
Abstract:

This is the age that we step into the world of digitalization. One could access any kind
of information within the single tap or click from their devices, as in this era the internet
has been flooded with various kinds of contents which includes information to various
kinds of online services. Digital inclusion is one of the few compelling steps that has
been implemented in recent times implying that people should have access to the
internet all over the world.

The negative consequence of digital exclusion is hindering the greater vision of digital
inclusion, especially their certain set of solutions prescribed by the digital inclusion to
negate the digital divide.

The most reliable way to understand the concept of digital inclusion is to consider the
number of people who don’t have any kind of internet sources and access. During 2020
there has been research done by the UNESCO on the world broadband usage and the
survey has regarded that the internet has penetrated only to the 53.6% of the
population, in many of the underdeveloped countries there has been drastic drop of
percentage to 32% this also includes rural areas in the united states where at least 1
person in 5 members lack access to internet coverage.

While it may seem that internet coverage is an obvious choice to increase inclusion but
it’s also essentially important to know the productive and effective usage of internet
which is termed as digital literacy. These skills include how to search precise
information, safe interactions, guarding online privacy. Only 67% have been able to
answer about phishing scams, cookie settings according to survey.

Digital inclusion and information technology plays an important role in digital equality
where everyone has digital resources and skills needed to participate in socio-economic
aspects of society.
This exploration will shed light on how the digital world shapes our society and the
behavior of its younger members. It will also help us understand the challenges we face
in ensuring digital inclusion and privacy while mitigating the negative impacts of
media influence.

Keywords: digital inclusion, digital exclusion, digital divide, phishing scams, digital
equality
Introduction:

In the ever-expanding landscape of the digital era, the interconnected forces of digital
inclusion, privacy, and media influence are instrumental in shaping the dynamics of
contemporary society. The pursuit of digital inclusion seeks to bridge the gap between
technological haves and have-nots, ensuring equitable access to information and
communication technologies (ICTs) for all. Concurrently, the safeguarding of privacy
becomes paramount as individuals navigate an online world where personal
information is both currency and vulnerability. Amidst these complexities, the influence
of media plays a pivotal role, acting as a powerful shaper of societal perceptions and
behaviors.

This exploration delves into the nuanced interplay between digital inclusion, privacy
concerns, and the impact of media influence, particularly in the context of delinquent
behavior. Delinquency, often associated with various societal factors, can be both
influenced and exacerbated by the omnipresent reach of digital media. As we embark
on this inquiry, it is crucial to unravel the intricate threads connecting these elements
and discern how their convergence shapes individuals' online conduct.

This discussion aims to shed light on the potential consequences of the intersection
between digital inclusion, privacy considerations, and media influence, specifically
focusing on their impact on delinquent tendencies. By examining the intricate dynamics
at play, we seek to better comprehend the challenges and risks posed by the digital age,
while also identifying opportunities to foster a digital environment that upholds both
inclusivity and privacy. Through this exploration, we can develop insights into
mitigating negative influences, promoting responsible digital citizenship, and
cultivating a balanced coexistence with the powerful forces of the digital realm.

The advent of the digital age has brought about significant changes in our society,
particularly in terms of digital inclusion and privacy. Digital inclusion refers to the
effort to ensure that every individual and community has access to Information
Communication Technology (ICT), along with the skills to make use of it. However,
while digital inclusion aims to democratize data access, it requires sophisticated data
organization and sharing that doesn’t compromise privacy.

On the other hand, the influence of media, especially on young minds, has been a topic
of concern. Studies show that media exposure has significant impacts on youth
violence. The media can instill violent thoughts in young minds, desensitize them, and
lead to delinquent behavior. Furthermore, it cultivates feelings of anger and hatred
towards other groups, creating a negative environment for socialization.

In this context, it is crucial to explore the intersection of digital inclusion, privacy, and
the influence of media on delinquent behavior.
Statement of problem:

While digital inclusion has the potential to democratize access to information and
opportunities, it also raises significant privacy concerns. Simultaneously, the pervasive
influence of media, particularly on young minds, can lead to delinquent behavior.

The challenge lies in ensuring digital inclusion and privacy while mitigating the
negative impacts of media influence. The lack of comprehensive strategies to address
these interconnected issues exacerbates the problem. Therefore, it is crucial to develop
an integrated approach that promotes digital inclusion, protects privacy, and manages
the influence of media to prevent delinquent behavior.
Review of the literature:

The study titled "Research on vulnerable people and digital inclusion: toward a
consolidated taxonomical framework" offers a systematic analysis of existing literature
concerning vulnerable populations and their integration into digital platforms. It
provides an extensive overview of the definitions, trends, patterns, and advancements
characterizing research in this domain.

In contrast, the study "Revisiting digital inclusion: A survey of theory, measurement


and recent research" delves into the internet's pivotal role as a foundational technology,
dissecting the fundamental elements of digital inclusion. It explores various theoretical
frameworks, measurement methodologies, and recent research findings in this area.

Similarly, "Exploring the Measurement of Digital Inclusion: A Review of Literature"


underscores the significance of quantifying digital inclusion while synthesizing the
rapidly expanding literature on measurement approaches. It highlights the necessity of
robust metrics for accurately assessing digital inclusion initiatives' effectiveness.

On a different note, "Unrestrained Media and Juvenile Delinquency: An


Interdisciplinary Exploration" investigates the escalating occurrences of juvenile
delinquency in India attributed to unrestricted and explicit media content. This
interdisciplinary study sheds light on the societal impacts of media exposure on
adolescent behavior.

Meanwhile, "Delinquent Behavior: Systematic Review of Genetic and Environmental


Risk Factors" conducts a comprehensive analysis of both genetic and environmental
influences contributing to delinquent behavior. It offers valuable insights into the
multifaceted determinants of deviant conduct among youth.

Furthermore, "Adolescent Deviance and Cyber-Deviance. A Systematic Literature


Review" delves into the realms of adolescent deviance and online misbehavior,
synthesizing existing literature on these topics. It aims to deepen understanding of the
complexities surrounding youth deviance in digital environments.

Moreover, "Bridging Digital Divides: a Literature Review and Research Agenda for
Information Systems Research" scrutinizes Information Systems research pertaining to
digital disparities within technologically advanced settings. It outlines a research
agenda aimed at addressing and mitigating digital divides.

Additionally, "Digital Strategies: A Systematic Literature Review" provides a


comprehensive examination of digital strategies' role in facilitating organizational
digital transformation success. It offers insights into the strategic approaches adopted
by organizations to harness digital technologies effectively.

Lastly, "Digital technologies: tensions in privacy and data" consolidates diverse


viewpoints and proposes a framework comprising three fundamental principles and
seven propositions to comprehend digital technology's implications on firm
performance amidst increasing privacy concerns and legal complexities.

In conducting the literature review, it became evident that while the selected book
provided a comprehensive overview of the subject matter, there were additional
insights and perspectives that were not covered within its pages which is been
mentioned in this paper.
Research objectives:

1. To understand the impact of digital inclusion on the privacy of individuals and


communities.

2. To investigate the relationship between media exposure and delinquent behavior


among youth.

3. To identify strategies that can ensure digital inclusion and privacy while mitigating
the negative impacts of media influence.

4. To evaluate the effectiveness of current policies and regulations in addressing these


interconnected issues.

5. To propose recommendations for future policies and practices.


Research questions:

1. How does digital inclusion impact the privacy of individuals and communities?

2. What is the relationship between media exposure and delinquent behavior among

3. What strategies can be implemented to ensure digital inclusion and privacy while
mitigating the negative impacts of media influence?
Hypothesis:

Increased digital inclusion leads to a significant rise in privacy concerns among


individuals and communities. There is a positive correlation between the level of media
exposure and the incidence of delinquent behavior among youth. Implementing robust
data protection measures, regulating media content, promoting digital literacy, and
fostering responsible digital citizenship can effectively ensure digital inclusion and
privacy while mitigating the negative impacts of media influence.
Digital inclusion and its impact on privacy:

21st century is mostly influenced by digital technology especially in the teens. Every
aspect and facet of human life such as communication, healthcare, finance, education is
influenced by the technology. Also, the digital age is the time where social inequalities
provide vast opportunities for innovation, economic growth, employment and socio
advancement.

However, the issues with the rise of technology the issues such as privacy concern,
securities, standardizations, data sharing also begin to rise. Hence with the inclusion of
technology it's also equally important to take measures against the risk, so the
implementation of national digital policy is essential to layout the foundation for safe
usage of digital technologies, while safeguarding rights and integrity of the citizens.

Suppose an explorer sets out to experience the new place he is taken as advantage of his
inexperience in the same manner if an inexperienced person goes to social media feels
vulnerable and often considered exposed so it's also essential for the people in this era
to learn about the digital technology as it acts like a cherry in the top of the cake of
digital inclusion.

Safeguarding data privacy within the digital infrastructure is closely intertwined with
advancing digital inclusion and bridging the digital divide. As a growing number of
services and interactions transition to online platforms, it becomes imperative to
consider the privacy challenges faced by marginalized communities and individuals
who encounter obstacles in accessing, comprehending, and managing their personal
data. This section delves into the convergence of privacy and digital inclusion,
emphasizes the significance of educating and empowering users, and outlines
approaches to championing privacy and data protection in a manner that is both
inclusive and equitable.
In this world new users should first learn about the privacy tools before their first
Google search and making their first Instagram reel but here individuals are naive and
go online without any kind of awareness are being targeted, cyber bullied, tracked,
profiled. They are also unaware of popup that giggle, removing cache files, cookie
settings, tackling Anonymous messages and temptation to invest in online shares and
weight loss feats etc.

In today's world of interconnection, a secure data infrastructure is much more


important to avoid risks of privacy concerns, as data has become part of our digital
systems. The protection of privacy and personal information has paramount level of
importance.

Successful digital infrastructure always depends on trustworthiness on how data is


being handled, for this data privacy lays the foundation of maintaining the integrity of
trust. By implementing robust privacy measures the digital companies will boost the
confidence of the users which promotes the usage of digital platforms and services with
advanced infrastructure.

Privacy measures, transparency, data protection, data control enhances the firm usage
enabling to lay more emphasis on usage of digital platforms. Hence the principles of
transparency, trust, consent, digital awareness and user control are much more
important components.

Building an advanced digital infrastructure requires a thin balance between privacy and
data sharing. While protecting personal data is essential, it is equally important to
enable authorized data sharing for sake of societal benefits.

Effective data governance frameworks which incorporate privacy controls, secured data
anonymization techniques, robust legal and technical safeguards provide responsible
data sharing preserves privacy rights of individuals.
Challenges faced by data privacy:

Cookie Proliferation: Cookies, small data pieces stored by websites on users' browsers
to monitor preferences, behavior, and identity, vary in harm and usefulness. While
some are innocuous or beneficial, others, utilized by third-party advertisers or trackers,
may collect and share user data without consent or awareness.

Cell Phone GPS Functionality: Mobile phones incorporate GPS functionality to precisely
determine users' locations and movements, aiding navigation and emergency services.
However, this capability can also be exploited by malicious entities or authorities to
monitor users' activities, whereabouts, or associations.

Phishing Attacks: Phishing attacks involve deceitful attempts to acquire user personal
data by posing as legitimate entities or websites. Users might receive emails or
messages prompting them to click on links or provide personal information, potentially
resulting in identity theft, financial loss, or malware infection.

Unsecured Browsing: Unsecured browsing entails using the internet without


encryption or protection, exposing user data and communications to potential
interception, modification, or theft by hackers, ISPs, governments, or other entities.

Mitigating the challenges and threats:

As technological advancements continue, new challenges emerge that impact both data
privacy and the integrity of digital infrastructure. The escalating threat of cyber security
is a shared concern for digital citizens today, demanding a collective effort to uphold a
secure online environment. Hacking has emerged as a significant challenge, evidenced
by its disruptive impact on critical systems such as hospitals, banking, and shipping in
2017. Despite the severity of such anti-social behavior in offline contexts, there is a
notable lack of efforts to educate schoolchildren about its gravity.
Various online threats, including spam, phishing, viruses, malware, and bots, carry
widespread consequences. Digital citizens can shield themselves from these risks by
acquiring the appropriate protective tools and understanding how to implement them.
Just as we prioritize caring for our home and physical environment, understanding and
safeguarding our digital environment has become equally crucial, especially with the
integration of the internet of things and internet-connected toys into daily life. The
sustainability of both online and offline realms hinges on knowledge, critical
understanding, and a commitment to human rights and dignity. The actions of one
individual can jeopardize the well-being of an entire family, school, or network. In the
same way we teach children to navigate risks in their physical surroundings, it is
essential to impart knowledge on safely and securely navigating the online
environment.

Privacy and security emerge as pivotal aspects of digital citizenship education,


requiring attention from governments, educational authorities, families, and the
children themselves. A comprehensive, well-implemented multi stakeholder policy on
privacy and security, integrated into the school curriculum, can empower children and
young people to be digitally competent. This competence allows them to enjoy their
rights and uphold their responsibilities as citizens in the digital age. Additionally,
introducing block chain technology to the learning agenda holds promise in addressing
dilemmas such as privacy, data protection, digital identity management, and cyber
security.

It is imperative to proactively address these challenges by adopting privacy-enhancing


technologies, implementing robust security measures, and ensuring that legal and
regulatory frameworks evolve alongside technological progress. The establishment of
ethical guidelines and responsible practices for emerging technologies is crucial for
striking a balance between innovation and privacy, fostering a sustainable digital
infrastructure that benefits society. This section explores emerging privacy-preserving
techniques and provides best practices for responsible data collaboration.

To mitigate these challenges and potential threats, users should adhere to certain best
practices to enhance their digital privacy. These practices include:

1. Blocking Cookies: Users can prevent unwanted tracking or profiling by third-party


cookies by adjusting browser settings, using extensions, or employing tools to block or
limit cookies.

2. Securing Personal Accounts: Users can safeguard their personal accounts by


employing strong passwords, utilizing password managers, and enabling two-step
authentication, effectively preventing unauthorized access or compromise.

3. Vigilance against Phishing: Users can avoid falling victim to phishing attempts by
verifying the sender, checking URLs, and refraining from clicking on suspicious links or
attachments. Antivirus software can also be employed to detect and block phishing
attempts.

4. App Security: Users should delete unsecured apps from their phones that may collect
or share data without permission. Regularly reviewing app permissions and settings,
limiting access to sensitive information, and being cautious about the apps they install
are additional measures to enhance security.
5. Encrypted Messaging Apps: To prevent eavesdropping or interception by third
parties, individuals should use encrypted messaging apps that offer end-to-end
encryption, ensuring that only the sender and receiver have access to the information.

6. Financial Information Security: Users can enhance security by refraining from saving
financial information on shopping sites that might store data insecurely or sell it to third
parties. Utilizing secure payment methods and platforms with encrypted transactions
further protects identity.

7. VPN Usage: Employing a Virtual Private Network (VPN) helps create a secure
connection between devices and the Internet or a server. This hides users' IP addresses,
locations, browsing history, and traffic from potential threats such as ISPs, hackers,
governments, or other entities.

8. Private Browsing: Utilizing private browsing mode on browsers, which doesn't store
history, cookies, cache, or other data, is an effective measure to prevent tracking or
profiling by websites and advertisers.

Digital Personal Data Protection Act 2023:

In an era dominated by digital interactions, the safeguarding of personal data has risen
to the forefront of concerns for both individuals and governments. In India, the Digital
Personal Data Protection Act of 2023 stands out as a pivotal piece of legislation
designed to protect the privacy rights of its citizens in the digital era.
Critical analysis of the act:

The Digital Personal Data Protection Bill of 2023, presented in the Lok Sabha on August
3, 2023, by the Minister of Electronics & Information Technology, has successfully
passed through the legislative process. It received approval from the Lok Sabha on
August 7, 2023, and unanimous support from the Rajya Sabha on August 9, 2023. The
bill received Presidential assent on August 11, 2023.

The genesis of this legislation can be traced back to the 2017 Supreme Court case,
Justice K.S. Putta swamy vs. Union of India1, which acknowledged the 'Right to Privacy'
as a fundamental right under Article 21 of the Indian Constitution 2. In response, the
need for a dedicated act for the protection of personal data was recognized.

The Act is noteworthy for its brevity, clarity, and accessibility, using plain language
and avoiding intricate provisos and cross-references. Notably, it incorporates gender-
inclusive language, employing "she/her" pronouns when referring to individuals for
the first time in parliamentary law-making.

The legislation defines "data" broadly as any information comprehensible by humans or


automated systems. "Personal Data" specifically refers to data about an identifiable
individual. The Act governs the processing of personal data by entities responsible for
determining its purpose (Data Fiduciaries) and those processing data on their behalf
(Data Processors).

The Act establishes rules for obtaining consent for data processing, emphasizing that
consent must be free, specific, informed, unconditional, and unambiguous. Exceptions
to consent are allowed for state services, medical emergencies, and employment, with
provisions for obtaining consent from minors or individuals with disabilities through
their parents or legal guardians.

1 (2017) 10 SCC 1, AIR 2017 SC 4161


2 Constitution of India 1950
The legislation outlines the rights and duties of Data Principals (individuals whose
data is processed) and Data Fiduciaries (entities processing personal data). It permits
the transfer of personal data outside India, except to countries restricted by the Central
Government, and contains exemptions for specific cases like crime prevention and
research.

The Act creates the Data Protection Board of India, an independent digital authority
with adjudicatory powers responsible for enforcing the Act and imposing penalties for
breaches. Penalties for non-compliance are detailed, varying based on offenses such as
failure to protect children's data or prevent data breaches.

Businesses handling personal data must establish procedures to comply with the Act,
including appointing a Data Protection Officer, conducting assessments, and
maintaining contracts with data processors. However, certain aspects, like criteria for
classifying businesses as Data Fiduciaries, require further clarification. The Act

Empowers the government to request information and allows for the blocking of
information in specific cases.

Media – A Breeding Ground for delinquency behavior:

Media acts as boon or bane in the society sometimes due to unorganized usage it might
outweighs the benefits' causing the floodgates opening and giving wide opportunities
for juveniles to get inspired from the content on social media and express themselves in
ways that may constitute crimes on social networking sites or in the real world. This is
also caused due to the excessive usage of electronic gadgets and long duration of
internet usage by accessing unauthorized content.

Exposure the violent content from media might trigger the crime leading to aggressive
behavior, in state of Punjab 16-year-old boy has beaten his grandmother to death which
he inspires from TV serial, in another instance series named Slender man has been
inspired by two 19-year-old girls which led them to stabbing friend of theirs 19 times.

Based on these kinds of several instances it has been stated that over usage of social
media leads to anti-social behavior.

The idea that juveniles' violent behavior can be influenced by observational learning or
modeling is grounded in social learning theory, which postulates that individuals learn
by observing and imitating the behavior of others. Albert Bandura's Social Learning
Theory suggests that exposure to violent behavior, particularly through media, can
impact the behavior of young individuals.

Children, being in a developmental stage where they are highly impressionable and
open to learning, may be more susceptible to the influence of media violence. This
susceptibility arises because children often lack the cognitive abilities to critically
evaluate and filter the information they receive from various sources. As a result,
repeated exposure to violent content in the media may contribute to the development of
positive attitudes towards aggressive behavior.

It's important to note that while the media can be a potential influence, it is just one of
many factors that contribute to a child's behavior. Parental guidance, peer interactions,
and the overall socio-cultural environment also play crucial roles in shaping a child's
attitudes and behaviors.

Efforts to mitigate the potential negative effects of media violence on juveniles often
involve promoting media literacy, encouraging responsible media consumption, and
fostering open communication between parents and children. Additionally, setting age-
appropriate content guidelines and monitoring children's media exposure can be
important strategies in helping to minimize the impact of violent media content on
young individuals.
There has been a common trend especially in the juvenile's they tend to mimic
aggressive actions which is shown in as movies, series. That’s the reason why the
juvenile offenders engaged in school shootings revealed a prevalent interest in firearms,
bombs, and explosives.

In April 1999, a tragic incident occurred at Columbine High School in Colorado, where
13 individuals lost their lives. Both teenage perpetrators exhibited a strong fascination
with violent video games, particularly Doom, a game even utilized by the Marine Corps
in 1998 for soldier training. The argument suggests that exposure to violent video
games can serve as a form of training, instructing children on weapon use and
desensitizing them emotionally to the act of murder, potentially leading to violent
actions.

Juveniles influenced by TV serials or social media to commit crimes can face legal
consequences or rehabilitation as per relevant laws. The question arises about holding
violent social media accountable for crimes. In India, the Ministry of Electronics &
Information Technology labeled the Blue Whale Game as abetment to suicide under
Section 306 of the Indian Penal Code. However, a blanket ban on violent content faces
challenges due to freedom of speech concerns and the positive aspects of social media.

Banning content may not be effective, as research suggests that perceived violence by
adults may not align with what negatively influences children. Instead, addressing
criminal behavior in juveniles involves considering reinforcement theories like Rotter's
expectancy theory. Breaking the sustainability of criminal behavior requires reducing
juveniles' expectancy of gain from unlawful actions, either from external factors or
internal beliefs. Practical application of these theories is crucial to prevent long-term
effects of media violence on juvenile behavior.

In contemporary India, nuclear families dominate the household landscape, leading


children to often experience a sense of isolation. Consequently, they frequently turn to
social media as a means of entertainment, engaging in activities such as chatting,
sharing content, and more. Parents may remain oblivious to their children's online
activities, contributing to a significant communication gap between parents and
adolescents. Given these circumstances and the emotional vulnerability of teenagers,
social networking platforms serve as outlets for them to express pent-up feelings of
sadness, anger, and frustration, sometimes manifesting in regrettable criminal behavior,
also sharing of graphic content and engaging in cyber-related crimes among teenagers
has become prevalent.

In May 2020, the "Bois Locker Room" private chat group gained notoriety for sharing
objectionable images of underage girls and planning inappropriate activities. Legal
provisions in the Information Technology Act, 2000, and the Indian Penal Code, 1860,
along with the POSCO (Amendment) Act, 2019, aim to address and penalize such
offenses.

While seemingly harmless, social media challenges have led vulnerable juveniles into
dangerous situations. For instance, the Momo Challenge and the Kiki Challenge posed
serious risks, resulting in casualties in various Indian cities.

Cyber bullying is another concern that needs addressing to protect and prevent
juveniles from engaging in such behavior. The relative anonymity of the online
environment makes cyber bullying an attractive alternative, fueled by various reasons
such as personal grudges or deriving pleasure from tormenting others by gaining
supremacy and dominance over others. Body-shaming on social media, where
teenagers spend hours scrolling through images, has severe psychological and
emotional effects.

Influence of Video Games:

Playing video games might not be necessarily the cause for increasing violent behavior
but it might act as the catalyst. Dr. Olson suggests a connection between violent video
games and bullying, a recognized risk factor for more severe violent actions.
Consequently, playing video games might indirectly influence violent behavior by
elevating the risk of its contributing factors. Doug Gentile emphasizes that for violent
video games to significantly impact serious criminal violence statistics, they would need
to be the main predictor, which may not be the case. Instead, they serve as one of
several risk factors contributing to aggressive tendencies.

Researchers have provided experimental evidence establishing a connection between


violent video games and increased aggressive behavior, particularly in children during
sensitive stages of socialization. The impact is notably pronounced when children
initiate virtual violence.

In the book "Violent Video Game Effects on Children and Adolescents," Anderson,
Gentile, and Buckley extensively analyze three recent studies comparing the effects of
interactive (video games) and passive (television and movies) media violence on
aggression and violence. One study involved 161 of 9- to 12-year-olds and 354 college
students randomly assigned to play either violent or nonviolent video games. The
participants then played another computer game where they set punishment levels for
another participant, revealing that those who played violent video games chose more
aggressive punishment. Additionally, habitual exposure to violent media was linked to
higher levels of recent violent behavior, and interactive media violence had a stronger
association with violent behavior compared to non-interactive media violence.

The second study, a cross-sectional co-relational study of high school students, found
that playing violent video games predicted increased physically aggressive and violent
behavior in the real world, even when controlling for various factors. In the third study,
a longitudinal examination of elementary school students showed that increased
exposure to violent video games led to more aggressive attitudes and behaviors over
time.
Bushman and Hussmann’s meta-analysis in 2006 revealed a positive relationship
between exposure to media violence and subsequent aggression in both children and
adults, with greater long-term effects for children. Anderson et al.'s 2010 review,
encompassing 136 studies and 130,296 participants, consistently demonstrated
associations between playing violent video games and various measures of aggression
according to self, teacher, and parent reports. While the correlations were not extremely
high, they align with typical levels seen in psychological studies and are comparable to
other risk factors for youth violence outlined in the 2001 Surgeon General’s Report on
youth violence.

Effects of online Pornography in delinquent behavior:

Pornography is broadly described as any content, encompassing texts, videos, photos,


or audio, consumed with the intent of providing sexual satisfaction and arousal for an
individual or a partnership. The impacts of pornography can differ based on factors
such as exposure and consumption. The consequences of engaging with pornographic
content can manifest in diverse ways, affecting psychological, cognitive, sexual aspects,
and even influencing lasting impacts on relationships. Furthermore, there is a concern
for the health and safety of performers in the industry. These days novelty is what
makes online porn so arousal making exciting the things, which gives access to
unlimited clips.

Research on pornography has particularly delved into its potential link to addiction, a
problem that is often underestimated and may be exacerbated by the aforementioned
impacts. Some literature reviews propose that pornographic images and films can have
addictive qualities, especially when coupled with masturbation. However, conflicting
perspectives exist, with some maintaining that the data on this matter remains
inconclusive.
In addition to addiction, research has explored the relationship between pornographic
material and acts of sexual violence, yielding varied results. The use of pornographic
material also provides ample opportunity for further research into its effects on
individuals. Certain theories associated with the consumption of pornographic content
have been substantiated, shedding light on the reasons behind the observed effects.
Let's get a deeper understanding as to how viewing pornography affects society as
whole.

Rewriting and rewiring entire structure brain:

Within the brain, there exists a region known as the "reward center," responsible for
habit formation by releasing chemicals, including dopamine, which establishes
connections between actions and perceived desirability.

Dopamine, often referred to as a "pleasure" chemical, plays a crucial role in linking


specific habits to a sense of reward. Daily activities such as exercise, eating, and sex
trigger reactions in this part of the brain. However, the impact of pornography on the
brain differs from routine stimulation, like consuming a sugary snack or engaging in a
simple game. While most behaviors have an "off" switch that stops dopamine release
once a craving is satisfied, pornography affects the brain similarly to an addictive drug,
causing a continuous surge of dopamine.

Over time, the brain develops a tolerance to this excessive dopamine release,
necessitating either increased access or exposure to more extreme content (or both) to
achieve the same level of perceived pleasure, which is termed as habituation in
neuroscience. Research from the Neuroscience of Internet Pornography Addiction
report suggests that prolonged exposure to pornography is associated with reduced
activity in the brain's reward circuit.
Once the reward center is altered by the easy access to dopamine triggers, as seen in the
case of porn, individuals may compulsively seek out the activity that initiated the
dopamine release. Additionally, dopamine is released during moments of sexual
excitement and novelty, and porn scenes, with their novel sexual partners, activate the
reward center. This reinforcement can modify the user's sexual preferences.

The Guardian, in 2013, highlighted that many substances directly trigger dopamine
secretion without requiring effort to achieve a goal, potentially damaging the dopamine
reward system. In the context of porn, where sexual content is easily accessible without
the effort of courtship, scans indicate that porn can indeed alter the reward center. In
summary, when viewing pornography, the brain experiences diminishing pleasure
while simultaneously craving more, leading to desensitization and an escalation in
behavior.

When the brain's reward center activates the release of dopamine and associated
chemicals, it also releases a protein known as DeltaFosB, which functions as a
"reinforcer." This protein plays a crucial role in creating neural pathways that link an
individual's actions to their feelings, establishing a strong connection between pleasure
and the act of watching pornography.

As highlighted in the Neuroscience of Internet Pornography Addiction report, this


established connection intensifies the demand for the activity, making it increasingly
likely that an individual will return to consuming porn. If enough of this reinforcing
protein accumulates, it can lead to lasting changes in the brain, rendering an individual
more susceptible to addiction.

The report suggests, "Regarding Internet addiction, neuroscientific research supports


the assumption that underlying neural processes are similar to substance addiction."

When neural pathways connect the brain's reward center with potentially harmful
behaviors, it can overpower previously held beliefs about what is ethical or appropriate,
potentially leading individuals to perceive certain behaviors as normal. A study cited
indicates that individuals exposed to significant amounts of porn tended to believe that
activities like violent sex were twice as common as those not exposed to porn.

The desensitization of the brain's reward circuitry not only sets the stage for sexual
dysfunctions but also has broader implications. Studies indicate that alterations in
dopamine transmission can contribute to the development of depression and anxiety.
Consistent with this finding, individuals who consume porn report experiencing
greater depressive symptoms lower quality of life, and poorer mental health compared
to those who do not engage in porn consumption.

Another noteworthy discovery is that compulsive porn consumers often find


themselves wanting and needing more porn, even if they do not necessarily enjoy it.
This discrepancy between the desire for and enjoyment of porn is a characteristic
feature of reward circuitry deregulation.

In a related study, researchers at the Max Planck Institute in Berlin, Germany, observed
that higher levels of porn use were associated with reduced brain activation in response
to conventional pornographic imagery. This sheds light on why users tend to escalate to
more extreme and unconventional forms of porn, seeking increased stimulation to
achieve the desired level of pleasure due to the desensitization of their reward circuitry.

Also, A recent investigation has revealed that multiple Mind Geek employees admitted
that their company started publishing and uploading the LGBTQ content in their
pornographic websites in the way to help young people to discover and craft their
sexuality by converting them. They confessed that they were helping and grooming
young children, especially the age of 10-12 years for freedom to choose their sexuality in
their media by giving them access through unfiltered content irrespective of age which
became disturbing in society.

In An interaction made by the infamous jubilee media among the teen boys regarding
the addiction of pornographic videos, the discussion revealed that many for teenage
boys porn has completely affected their dopamine to much intense level that straight
men started to watch trans videos just to experience different kind of arousal.

Effects of pornography in a healthy relationship:

The tricky nature of pornography is that falsifies the sexual situations and interactions
of the viewers which results in having harmful attributes towards the sex.

Over the long term, pornography appears to contribute to sexual dysfunctions,


particularly difficulties in achieving erection or orgasm with a real-life partner.
Additionally, the quality of marital relationships and commitment to romantic partners
may be compromised.

Some scientists have sought to explain these effects by drawing parallels between porn
consumption and substance abuse. The brain is evolutionarily wired to respond to
sexual stimulation with surges of dopamine, a neurotransmitter associated with reward
anticipation and the encoding of memories. This adaptation means that when the body
seeks something like food or sex, the brain recalls where to find the same pleasure.
Instead of turning to a romantic partner for sexual fulfillment, habitual porn users
instinctively reach for electronic devices when desire arises.

The intense explosions of reward and pleasure triggered by pornography can lead to
unusually strong habituation in the brain. Psychiatrist Norman Doidge explains that
pornography satisfies the conditions for neuroplastic change, and as users build up
tolerance to content, the industry introduces new and more extreme themes to maintain
interest.

Pornographic scenes, akin to addictive substances, serve as hyper-stimulating triggers


that result in unnaturally high levels of dopamine secretion. This overstimulation can
damage the dopamine reward system, leaving it less responsive to natural sources of
pleasure. Consequently, users may struggle to experience arousal with a physical
partner, illustrating the potential impact of prolonged porn consumption on sexual
function.

Violence and pornography:

Most of the young people are considering that pornographic videos are source of their
primary education not realizing that it removes them from the reality i.e..
desensitization where brain rewires its perception considering it normal and acceptable
which leads to dominance, assault and molestations against women even through
consent has not been given, but the main part here is it's not considered as crime or
moral wrong by most of the videos and most of the time these images try to normalize
the sexual assault and violence in the society.
Porn hub analytics reveal a trend where conventional sex is becoming less interesting to
users, and themes such as incest and violence are increasingly popular. The
proliferation of sexual violence online is a cause for concern, as it may contribute to an
escalation of real-life incidents. Some scientists attribute this relationship to mirror
neurons, brain cells that fire both when an individual performs an action and when they
observe the same action performed by someone else.

The regions of the brain activated when viewing porn are the same as those engaged
during actual sexual experiences. Marco Iacoboni, a professor of psychiatry at the
University of California Los Angeles, suggests that mirror neurons play a role in this
process, stating that the mirror mechanism in the brain indicates that individuals are
automatically influenced by what they perceive. This proposes a plausible
neurobiological mechanism for the contagion of violent behavior, where the brain's
mirror system may contribute to the spread of violent tendencies influenced by the
content observed in pornography.

The research conducted over the last few decades on the impact of media violence and
pornography reveals distinct patterns and conclusions. In the 1970s, the U.S. Surgeon
General commissioned a study, followed by comprehensive studies in 1982 by the
National Institute of Mental Health and in 1992 by the American Psychological
Association. All three studies, with varying approaches, unequivocally concluded that
mass-media violence contributes to aggression across age, gender, race, and ethnicity.
The portrayal of violence as normal or acceptable, compounded by the absence of

Consequences for aggressors, leads to desensitization and an increased likelihood of


aggressive behavior.

In contrast, research on the effects of sexual materials, particularly erotica and


pornography, is less conclusive. While mutually consensual, soft-core, nonviolent
erotica and pornography show little evidence of negative or positive effects, violent
pornography depicting demeaning or humiliating acts towards women may have more
adverse consequences, contributing to domestic violence, rape, and sexual harassment.
The topic remains controversial and calls for further research.

The 1970 Commission on Obscenity and Pornography initially deemed pornography


harmless, but evidence in the 1980s suggested negative effects on some men,
particularly those exhibiting aggressive behavior and attitudes towards women after
exposure to violent pornography. The Meese Commission in the 1980s claimed a causal
link between violent pornography and sexual violence toward women, leading to
recommendations to curb its dissemination. Social scientists contested this, emphasizing
that the research showed a connection between exposure to aggressive pornography
and aggressive behavior in general.

Recent research underscores the harmful mix of sex and violence in adult-oriented
violent pornography, particularly in reinforcing harmful beliefs. Exposure to such
materials increases acceptance of sexual and other types of aggression towards females,
perpetuates harmful myths, and rarely depicts sexual aggressors negatively or shows
them being punished for their actions. This highlights the complex and contentious
nature of the impact of media on human behavior, with ongoing debates and calls for
more research in these areas.

Information technology act 2000:

In India, while cyber pornography isn't explicitly legalized or banned under the IT Act
of 2000, certain actions related to it are punishable. Section 67 of the Act outlines
penalties for publishing, transmitting, or facilitating the dissemination of pornographic
content online, with imprisonment and fines as consequences. Meanwhile, Section 67A
imposes stricter penalties for publishing or transmitting sexually explicit material.
Based on these provisions:

- Viewing cyber pornography isn't illegal.

- Uploading or sharing pornographic content online is unlawful.

- Storing such content isn't considered an offense.

Transmitting cyber pornography through digital means, like messaging or email, is


prohibited.

Exceptions:

Exceptions to Section 67B of the IT Act, 2000 include educational or religious materials
such as books, pamphlets, magazines, or images. For instance, scientific studies on
human sexuality, known as sexology, are not restricted by this section. Additionally,
depicting children for educational purposes, such as illustrating child anatomy, does
not violate the law. Furthermore, the section does not prohibit materials created for
educational or religious purposes. Therefore, utilizing images of children for
informative or religious reasons is not considered an offense under this provision.
Child pornography:

Section 67B3 defines a child as anyone below 18 years of age and outlines five ways in
which child pornography can occur, including the electronic publication or
transmission of sexually explicit material involving children, portraying children in a
sexually explicit or obscene manner, enticing children into online relationships for
explicit acts, facilitating child abuse online, and recording one's own or others' abuse.
Exceptions to this section allow for the use of educational or religious materials such as
books, pamphlets, magazines, or images. For example, the scientific study of human
sexuality, known as sexology, is not restricted, nor is the use of child photographs for
educational purposes such as illustrating child anatomy.

Indian penal code 1860:

Section 292 of the Indian Penal Code prohibits the sale of obscene material, defining
obscenity as material that is lascivious, prurient, or has the potential to corrupt or
deprave individuals. It outlines penalties for various actions related to obscene material:

1. Selling, distributing, exhibiting publicly, or circulating obscene material.

2. Importing or exporting obscene material or being involved in a business associated


with such material.

3. Advertising obscene material.

4. Attempting to engage in any prohibited act under this section.

For a first conviction, the punishment may include imprisonment for up to 2 years and
a fine of up to Rs-2,000. For subsequent convictions, the penalty may involve
imprisonment for up to 5 years and a fine of up to Rs-5,000.

Section 293 of the Indian Penal Code specifies the punishment for selling, hiring, or
distributing obscene material to individuals below the age of 20. On the first conviction,

3 Information technology act 2000


imprisonment of up to 3 years and a fine of up to Rs-5,000 may be imposed, while
subsequent convictions may result in imprisonment of up to 7 years and a fine of up to
Rs-5,000.

POCSO Act 2012 (protection of children from sexual offences act):

The POCSO (The Protection of Children from Sexual Offences) Act, 2012, was
specifically enacted to safeguard children from sexual offenses, including assault,
harassment, and pornography. It is designed to ensure the protection and welfare of
children and applies to individuals under the age of 18, irrespective of gender.

Regarding Cyber Pornography, the Act contains the following provisions:

Section 134 defines child pornography as the use of a child in any form of media for
sexual gratification.

Section 145 outlines the punishment for using a child for pornographic purposes.

Intermediates and their liabilities:

Liability of Internet intermediaries pertains to their responsibility for content


transmitted or hosted on their platforms. Intermediaries, which can include telecom and
internet service providers, search engines, online marketplaces, and web hosting
services, play a vital role in facilitating data flow on the internet.

As per Section 2(1)(w) of the Information Technology Act, 2000, intermediaries are
defined as entities that receive, store, or transmit data on behalf of others, including
various service providers.

4 POCSO act 2012


5 ibid
Intermediaries may not have direct control over content, as it's often users who
generate or publish material. Therefore, there's debate over whether it's fair to hold
intermediaries liable for illegal content. Many argue that users should bear
responsibility unless intermediaries exercise significant editorial control.

Section 79 of the IT Act outlines conditions under which intermediaries are not liable,
including:

1. Demonstrating due diligence as per government guidelines.

2. Not participating in unlawful acts.

3. Taking down illegal content upon actual knowledge or notification from authorities.

Landmark Judicial verdicts:

In the case of Avinash Bajaj v. State (N.C.T.) of Delhi6,

The CEO of bazee.com was arrested after an obscene video was uploaded by a user on
their website. The CEO sought to quash criminal proceedings against him since the
uploader was absconding. The court granted bail to the CEO, subject to certain
conditions.

In State of Tamil Nadu v. Dr L. Parekh 7,

A reputed medical practitioner was sentenced to life imprisonment for online obscenity.
The doctor sought special class treatment as a prisoner, which was denied by the court.

6 2008) 105 DRJ 721: (2008) 150 DLT 769


7 Crl.A. No. 318 of 2009
In State of Tamil Nadu v. Suhas Katti8,

The accused, a family friend of the victim, harassed the victim through annoying emails
after she refused contact. The accused was found guilty under section 67 of the IT Act
and sentenced to two years of rigorous imprisonment along with a fine.

8 C No. 4680 of 2004


Conclusion:

In conclusion, the intersection of digital privacy and digital inclusion has significant
implications for influencing delinquent behaviors in today's technologically driven
society. The expanding digital landscape has provided individuals with unprecedented
access to information, communication, and opportunities for connection. However, it
has also introduced challenges related to privacy concerns and disparities in digital
access.

On one hand, the growing concern over digital privacy highlights the need for robust
safeguards to protect individuals from potential misuse of personal information. The
ease with which digital footprints can be traced raises apprehensions about
surveillance, data breaches, and the unintended consequences of sharing sensitive
information online. As individuals navigate the digital realm, a balance must be struck
between leveraging the benefits of connectivity and safeguarding personal privacy.

On the other hand, the concept of digital inclusion emphasizes the importance of
providing equal access to digital resources and opportunities for all. Disparities in
access to technology can contribute to a digital divide, potentially fostering feelings of
exclusion and inequality. Addressing these disparities is crucial for preventing the
marginalization of certain groups and ensuring that everyone has the tools and skills
needed to participate fully in the digital age.

When examining the influence of media on delinquent behaviors within this context, it
becomes evident that the digital landscape can both exacerbate and mitigate delinquent
tendencies. Privacy breaches, cyber bullying, and exposure to harmful content pose
risks that may contribute to delinquent behavior, especially among vulnerable
populations. Conversely, digital inclusion initiatives that empower individuals through
education, access to resources, and community engagement can serve as preventive
measures against delinquency.
To navigate the complex relationship between digital privacy, digital inclusion, and
delinquent behaviors, policymakers, educators, and technology developers must
collaborate to establish comprehensive frameworks. These frameworks should
prioritize privacy protection, bridge digital divides, and promote responsible digital
citizenship. By fostering a digital environment that respects privacy, ensures inclusivity,
and encourages positive online behaviors, society can harness the transformative
potential of technology while minimizing the risks associated with delinquency in the
digital age.
Bibliography:

Social Media – A Breeding Ground for Juvenile Offenders

Violence in the Media: What Effects on Behavior by Arline Kaplan

Digital Personal Data Protection Act 2023

The Impact of the Digital Personal Data Protection Act 2023 on Privacy Rights in India
by Ananya Chaudhary

Sara Sun Beale The News Media's Influence on Criminal Justice Policy: How
Market-Driven News Promotes Punitiveness Volume 48 ( 2) William & Mary Law
Review p. 397-398 (2006-2007)

Sacha M. Coupet What to Do with the Sheep in Wolf's Clothing: The Role of Rhetoric
and Reality about Youth Offenders in the Constructive Dismantling of the Juvenile
Justice System vol.148( 4) University of Pennsylvania Law Review p.1330 ( 2000)

UNICEF Children in a Digital World , State of the World's Children (2017) Chp.3

Vivek Agarwal, Saranya Dhanasekaran, Harmful Effects of Media on Children and


Adolescents vol 8(2) Journal of Indian Association of Child Adolescent Mental Health
p.39-4 (2012)

Role of Media In Juvenile Justice By Rameen Rashid Khan

Violent video games are a risk factor for criminal behavior and aggression by Matt
DeLisi, Sociology, Craig Anderson, Psychology, Douglas Gentile, Psychology, Angie
Hunt, news service

Violence and Pornography in the Media article by cliffnotes

What porn does to your brain article by cancopy


Brett Reacts To "If Teen GIRLS Were 100% Honest" by comments section

Evidence of the Downfall of Our Society. By comments section

This Company Wants to Convert Straight Men by comments section

The Horrifying Truth about the Porn Industry by breaking in the habit
Bruce D. Bartholow: Effects of Media Violence on Mind, Brain and Behavior by mizzou
visual productions
Indian penal code 1860

Information technology act 2000

Digital personal data protection act 2023

POCSO Act 2012

Obscenity laws in India by ria verma

Privacy and security by council of europe

You might also like