Examine the various devices perpetrators of cyberstalking


Assignment:

Cyberstalking, Harassment, and Bullying Legislation

Prior to beginning work on this discussion, read all the required resources.

The advent of the Internet and the subsequent proliferation of online social media has given people worldwide new and exciting ways to communicate and connect with family and friends. However, there is the unfortunate reality that the world of social media also draws those whose intents are not to interact in socially desirable or appropriate ways. There have been numerous instances of cyberstalking, cyberbullying, and cyberharassment that have been sensationalized in news programs and televised dramas.

After instances of suicide and even murder, legislative bodies in many nations began to look for possible solutions to curb the problems associated with cyberstalking, cyberharassment, and cyberbullying. The United States and Great Britain appear to be leading the charge in developing legislation designed to put an end to the harmful effects of online antagonism.

For this discussion, analyze current legislation that has been developed in efforts to end cyberstalking, cyberharassment, and cyberbullying. At times, official legislation fails to take into account the harm online crime inflicts on individuals. Select at least one prominent piece of legislation, and examine how it is intended to function to cease an antagonist's behavior.

Your initial post must

  1. Describe the crime the legislation you selected is designed to combat.
  2. Examine the various devices perpetrators of cyberstalking, cyberharassment, and/or cyberbullying use to target their victims.
  3. Evaluate at least two legal issues that arise from law enforcement efforts to combat cyberstalking, cyberharassment, or cyberbullying.

Required Resources

Text

Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2018). Cybercrime and digital forensics: An introduction (2nd ed.).

Chapter: Cyberbullying, On-Line Harassment, and Cyber stalking

Chapter: Online Extremism, Cyber terror, and Cyber Warfare

Article

Halverson, J. R., & Way, A. K. (2012). The curious case of Colleen LaRose: Social margins, new media, and online radicalization. Media, War & Conflict, 5(2), 139-153.

The full-text version of this article is available through the EBSCOhost database in the University of Arizona Global Campus Library. It provides an overview of the Megan Meier bullying legislation and the various ways the policy failed. It will assist you in the development of discussion post.

Kravets, D. (2009, September 30). Cyberbullying bill gets chilly reception. Wired.

This online article provides an overview of the Megan Meier bullying legislation and the various ways the policy failed. It will assist you in the development of discussion post.

Morphy, E. (2008, December 9). The computer fraud act: Bending a law to fit a notorious case.

This online article provides detailed information on the prosecution of Lori Drew in the Megan Meier cyberbullying case. It will assist you in the development of discussion post.

Torres Soriano, M. R. (2012). The vulnerabilities of online terrorism. Studies in Conflict & Terrorism, 35(4), 263-277.

The full-text version of this article is available through the EBSCOhost database in the University of Arizona Global Campus Library. This article examines the use of online technology in the process of radicalization. It will assist you in the development of your discussion post.

Recommended Resources

Article

Giammona, C. (2013, April 14). California case another three-part tragedy of rape, cyber bullying and suicideart-tragedy-of-rape-cyber-bullying-and-suicide?

This website depicts the suicide of a California teenager after repeated instances of cyber bullying and may assist you in the development of discussion post.

TheVillageCelebration. (2012, December 18). The Village founder, Vickie Newton, targeted by internet stalker.

This website details the cyberstalking of Vickie Newton. It may assist you in the development of this week's discussion post.

The Cybersmile Foundation. (www.cybersmile.org)

This website provides additional information on cyberstalking and may offer assistance developing this week's discussion post.

MSCJ Professional Sources.

This resource site will provide assistance in researching additional sources for the assessments within this course.

WHO@: Working to Halt Online Abuse(www.haltabuse.org)

This website provides additional information on online abuse and may assist in the development of this week's discussion post.

Solution Preview :

Prepared by a verified Expert
Business Law and Ethics: Examine the various devices perpetrators of cyberstalking
Reference No:- TGS03204128

Now Priced at $30 (50% Discount)

Recommended (96%)

Rated (4.8/5)