Cyberstalking, Harassment, and Bullying Legislation
Prior to beginning work on this discussion, read all the required resources for this week.
The advent of the Internet and the subsequent proliferation of online social media has given people worldwide new and exciting ways to communicate and connect with family and friends. However, there is the unfortunate reality that the world of social media also draws those whose intents are not to interact in socially desirable or appropriate ways. There have been numerous instances of cyberstalking, cyberbullying, and cyberharassment that have been sensationalized in news programs and televised dramas.
After instances of suicide and even murder, legislative bodies in many nations began to look for possible solutions to curb the problems associated with cyberstalking, cyberharassment, and cyberbullying. The United States and Great Britain appear to be leading the charge in developing legislation designed to put an end to the harmful effects of online antagonism.
For this week’s discussion, analyze current legislation that has been developed in efforts to end cyberstalking, cyberharassment, and cyberbullying. At times, official legislation fails to take into account the harm online crime inflicts on individuals. Select at least one prominent piece of legislation, and examine how it is intended to function to cease an antagonist’s behavior.
Your initial post must
Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2018). Cybercrime and digital forensics: An introduction (2nd ed.). Retrieved from https://www.vitalsource.com/
Halverson, J. R., & Way, A. K. (2012). The curious case of Colleen LaRose: Social margins, new media, and online radicalization (Links to an external site.). Media, War & Conflict, 5(2), 139-153. http://dx.doi.org/10.1177/1750635212440917
Kravets, D. (2009, September 30). Cyberbullying bill gets chilly reception (Links to an external site.). Wired. Retrieved from www.wired.com/threatlevel/2009/09/cyberbullyingbill/
Morphy, E. (2008, December 9). The computer fraud act: Bending a law to fit a notorious case (Links to an external site.). Retrieved from www.ecommercetimes.com/story/65424.html
Torres Soriano, M. R. (2012). The vulnerabilities of online terrorism (Links to an external site.). Studies in Conflict & Terrorism, 35(4), 263-277. http://dx.doi.org/10.1080/1057610X.2012.656345
Giammona, C. (2013, April 14). California case another three-part tragedy of rape, cyber bullying and suicide (Links to an external site.). Retrieved from http://usnews.nbcnews.com/_news/2013/04/14/17747411-california-case-another-three-part-tragedy-of-rape-cyber-bullying-and-suicide?lit
TheVillageCelebration. (2012, December 18). The Village founder, Vickie Newton, targeted by internet stalker (Links to an external site.). Retrieved from http://www.thevillagecelebration.com/thevillage-founder-vickie-newton-targeted-by-internet-stalker/
The Cybersmile Foundation (Links to an external site.). (www.cybersmile.org)
MSCJ Professional Sources (Links to an external site.). (http://ashford-mscj.weebly.com)
[email protected]: Working to Halt Online Abuse (Links to an external site.). (www.haltabuse.org)
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more