Get Help with your Assignments Instantly!

SWEETSTUDY.COM – YOUR HOMEWORK ANSWERS
  • chat0

Cyberstalking, Harassment, And Bullying Legislation

profileLibrad6712

 Cyberstalking, Harassment, and Bullying Legislation

Prior to beginning work on this discussion, read all the required resources for this week.

The advent of the Internet and the subsequent proliferation of online social media has given people worldwide new and exciting ways to communicate and connect with family and friends. However, there is the unfortunate reality that the world of social media also draws those whose intents are not to interact in socially desirable or appropriate ways. There have been numerous instances of cyberstalking, cyberbullying, and cyberharassment that have been sensationalized in news programs and televised dramas.

After instances of suicide and even murder, legislative bodies in many nations began to look for possible solutions to curb the problems associated with cyberstalking, cyberharassment, and cyberbullying. The United States and Great Britain appear to be leading the charge in developing legislation designed to put an end to the harmful effects of online antagonism.

For this week’s discussion, analyze current legislation that has been developed in efforts to end cyberstalking, cyberharassment, and cyberbullying. At times, official legislation fails to take into account the harm online crime inflicts on individuals. Select at least one prominent piece of legislation, and examine how it is intended to function to cease an antagonist’s behavior.

Your initial post must

  • Describe the crime the legislation you selected is designed to combat.
  • Examine the various devices perpetrators of cyberstalking, cyberharassment, and/or cyberbullying use to target their victims.
  • Evaluate at least two legal issues that arise from law enforcement efforts to combat cyberstalking, cyberharassment, or cyberbullying.

 

Required Resources

Text

Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2018). Cybercrime and digital forensics: An introduction (2nd ed.).  Retrieved from https://www.vitalsource.com/

  • Chapter 9: Cyberbullying, On-Line Harassment, and Cyber stalking
  • Chapter 10: Online Extremism, Cyber terror, and Cyber Warfare

Article

Halverson, J. R., & Way, A. K. (2012). The curious case of Colleen LaRose: Social margins, new media, and online radicalization (Links to an external site.)Media, War & Conflict5(2), 139-153. http://dx.doi.org/10.1177/1750635212440917

  • The full-text version of this article is available through the EBSCOhost database in the University of Arizona Global Campus Library. It provides an overview of the Megan Meier bullying legislation and the various ways the policy failed. It will assist you in the development of this week’s discussion post.

Kravets, D. (2009, September 30). Cyberbullying bill gets chilly reception (Links to an external site.)Wired. Retrieved from www.wired.com/threatlevel/2009/09/cyberbullyingbill/

  • This online article provides an overview of the Megan Meier bullying legislation and the various ways the policy failed. It will assist you in the development of this week’s discussion post.
    Accessibility Statement does not exist.
    Privacy Policy (Links to an external site.)

Morphy, E. (2008, December 9). The computer fraud act: Bending a law to fit a notorious case (Links to an external site.). Retrieved from www.ecommercetimes.com/story/65424.html

  • This online article provides detailed information on the prosecution of Lori Drew in the Megan Meier cyberbullying case. It will assist you in the development of this week’s discussion post.
    Accessibility Statement does not exist.
    Privacy Policy (Links to an external site.)

Torres Soriano, M. R. (2012). The vulnerabilities of online terrorism (Links to an external site.)Studies in Conflict & Terrorism, 35(4), 263-277. http://dx.doi.org/10.1080/1057610X.2012.656345

  • The full-text version of this article is available through the EBSCOhost database in the University of Arizona Global Campus Library. This article examines the use of online technology in the process of radicalization. It will assist you in the development of your discussion post for this week.

Recommended Resources

Article

Giammona, C. (2013, April 14). California case another three-part tragedy of rape, cyber bullying and suicide (Links to an external site.). Retrieved from http://usnews.nbcnews.com/_news/2013/04/14/17747411-california-case-another-three-part-tragedy-of-rape-cyber-bullying-and-suicide?lit

  • This website depicts the suicide of a California teenager after repeated instances of cyber bullying and may assist you in the development of this week’s discussion post.
    Accessibility Statement does not exist.
    Privacy Policy (Links to an external site.)

TheVillageCelebration. (2012, December 18). The Village founder, Vickie Newton, targeted by internet stalker (Links to an external site.). Retrieved from http://www.thevillagecelebration.com/thevillage-founder-vickie-newton-targeted-by-internet-stalker/

Websites

The Cybersmile Foundation (Links to an external site.). (www.cybersmile.org)

  • This website provides additional information on cyberstalking and may offer assistance developing this week’s discussion post.
    Accessibility Statement does not exist.
    Privacy Policy does not exist

MSCJ Professional Sources (Links to an external site.). (http://ashford-mscj.weebly.com)

  • This resource site will provide assistance in researching additional sources for the assessments within this course.
    Accessibility Statement does not exist.
    Privacy Policy does not exist.

WHO@: Working to Halt Online Abuse (Links to an external site.). (www.haltabuse.org)

  • This website provides additional information on online abuse and may assist in the development of this week’s discussion post.
    Accessibility Statement does not exist.
    Privacy Policy does not exist.
  • 6 days ago
  • 30.06.2022
  • 10
ANSWER(1)

profile

MISS HILLARY

5.0 (6k+)
5.0 (164)

Chat

Purchase the answer to view it

blurred-text

  • attachment

    Cybercrime.edited.docx
5 days ago
BIDS(89)

OTHER QUESTIONS(10)

Hi there! Click one of our representatives below and we will get back to you as soon as possible.

Chat with us on WhatsApp