StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cyber Harassment Laws - Thesis Example

Cite this document
Summary
From the paper "Cyber Harassment Laws" it is clear that a consultative approach is applied in making the recommended changes, beginning with making the law universal in the context that all the states have similar cyber-harassment laws, thus avoiding associated challenges…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.6% of users find it useful
Cyber Harassment Laws
Read Text Preview

Extract of sample "Cyber Harassment Laws"

Cyber Harassment Laws al Affiliation) Introduction This discussion will focus on a review of cyber-harassment laws; basically attempting to investigate the positive attributes of these laws; inadequacies associated with these laws as well as the provision of recommendations on how the application of these laws can be improved. With the increased use of social technology, there have also been increased cases of cyber-harassment. In order to curb this highly rising social menace, different states have enacted laws that would ensure that would ensure that incidences of cyber-harassment are reduced. However, the most imperative issues with the manner these laws have been implemented is the fact that each state has a certain level of uniqueness in relation to the manner these laws have been implemented or applied for instance: In the United States, the penal code in relation to cyber-harassment in Alabama is quite different with cyber-harassment penal code in Alaska. This simply means that these laws differ on their efficacy as well as challenges (Sternberg, 2014). Apart from the United States, other countries that have also implemented cyber-harassment laws, identifying it as a criminal offense is the Republic of Philippines, Canada as well as Australia. It is quite an important issue to investigate in the contemporary society with a purpose of eliminating possible flaws that may be associated with these laws, taking into consideration that communication technologies are replacing traditional modes of communication at an increasing rate (Sternberg, 2014). Background Information The concept of cyber-harassment has been described has an act of repeated electronic contacts, driven by the purposes of creating distress on the targeted recipient (Easttom & Taylor, 2011). However, in order to clarify such acts as harassments, most law-makers claim that a reasonable person, possessing similar information, must consider it sufficient to create distress on their targeted recipients. There are certain considerations that have been given a high sense of priority in relation to cyber-harassment. To begin with, targeted victims of cyber-harassment may not even be in a position to determine that they are being subjected under harassment. Additionally, cyber-harassment is usually accomplished through the use of communication technology, mostly through social-communication technologies; this may be undertaken by a group of individuals or in some cases just an individual (Easttom & Taylor, 2011). Sociologists have claimed that actions considered cyber-harassment are inclusive of; destruction of data, manipulation of one’s passwords, false accusations as well as transmission of threatening messages (Carpenter & Ferguson, 2009). Many states have considered posting a person’s private information on the internet as a serious form of cyber-harassment or portraying one as a racist person. During the early days of cyber-related abuses, approximately between 1995 and the late 1999, cyber-harassment and cyber-bullying were given different forms of descriptions; however, the contemporary society has gone to an extent of clumping the description of these two forms of abuse together (Sternberg, 2014). However, a significant number of states in the United States still identify these issues as unique and different, thus formulating varying laws in relation to how they should be managed. The New York Cyber-Harassment Penal Law (240.30) New York being one of the largest cities in the United States has enacted a cyber-harassment law that basically defines cyber-harassment, while also providing stipulations on how this technological crime can be handled. According to this penal law, a person is considered guilty of serious harassment if he/she acts with intent to harass a second party by communicating to the second party through email, electronic mail or by transmitting any form of information to threaten their targets, or cause physical or mental harm to their targets, of their family members or even their property, while knowing that the target will fear for harm on themselves as well as their property (www.ncsl.org). This law has other sub-clauses that also describe cyber-harassment and stipulates that if a person is found guilty of such an offense, he/she will be considered to have committed first degree or second degree crime taking into consideration his criminal record (www.ncsl.org). That is, a person that commits this crime and has a history of such crime will be charged with first degree offense. Adequacies of this Law Taking an analysis of this law and other laws together with the extent of cyber-harassment in the contemporary society, it is apparent that it satisfies certain aspects of needs that emerge from issues cyber harassment. To begin with, this law provides various comprehensive descriptions of cyber harassment, ensuring that no act that seems offensive in relation to cyber crime is left out. Additionally, the law defines what might be subject a guilty individual to being considered to have committed first degree or second degree offense; in this regard, it enhanced action taken to make punitive decision and also creates a scenario where first offenders may have a change of behavior, basically avoiding cyber-harassment. This law also exhibits adequacy by the fact that it does not only cover the target person, but extends towards hindering any form of cyber-harassment that may affect an individual’s family and property. Inadequacies of the Law An analysis of this law leads to the identification of certain possible flaws that could hinder its success in prevention of cyber-harassment in the United States. To begin with, the law does not indicate the specific punitive measures that one could be subjected to in case he/she is found guilty. This is a possible flaw that may lead to incidences of biased judgment or under-punishment when a person is found guilty. Moreover, the New York Cyber-harassment law does not stipulate how cyber-harassment undertaken in the dimension of violating a person’s personal privacy i.e. misuse of a one’s personal information could be handled. This creates a possible loophole for committing such cyber-related offenses. The other possible weakness of this law emerges from the fact that it is only applicable in New York, meaning that the commitment of such an offense could be handled differently in a state i.e. Alaska or Alabama. Recommendations Taking into consideration the fact that the New York Cyber-harassment law has three major possible weaknesses, there are certain actions that can be undertaken to ensure that the possibility of these flaws occurring is prevented. The first step that should be taken by policy makers is to integrate the aspect of cyber-harassment occurring on the context of utilizing one’s personal information inappropriately on social-communication technologies. The other actions that can be undertaken to improve the efficacy of this law is through mainstreaming punitive measures into the clauses as a means of avoiding bias. Consequently, there is a possibility that the New York Cyber-harassment law may be or may not be the most effective, in this regard, States should consider formulating universal cyber-harassment laws collaboratively to ensure uniformity and efficacy in relation to the manner these crimes are managed. Conclusion In order to ensure that the recommendations provided herein are effectively implemented policy decision-makers may ensure that a consultative approach is applied in making the recommended changes, beginning with making the law universal in the context that all the states have similar cyber-harassment laws, thus avoiding associated challenges. Additionally, the essence of mainstreaming the component of misuse of personal information and punitive measures may be undertaken through collaborative reviews, ensuring the various perspectives with regard to inclusion of these aspects into the existing law is applied thus facilitating its efficacy. References State Cyberstalking and Cyberharassment Laws. (n.d.). Retrieved November 21, 2014, from http://www.ncsl.org/research/telecommunications-and-information-technology/cyberstalking-and-cyberharassment-laws.aspx Top of Form Bottom of Form Sternberg, J. (2014). Misbehavior in cyber places: The regulation of online conduct in virtual communities on the Internet. Lanham, Md.: University Press of America. Top of Form Bottom of Form Easttom, C., & Taylor, J. (2011). Computer crime, investigation, and the law. Boston, MA: Course Technology. Top of Form Bottom of Form Carpenter, D., & Ferguson, C. (2009). The everything parents guide to dealing with bullies: From playground teasing to cyber bullying, all you need to ensure your childs safety and happiness. Avon, Mass.: Adams Media ;. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyberharassment Laws Thesis Example | Topics and Well Written Essays - 1000 words”, n.d.)
Cyberharassment Laws Thesis Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1667305-cyberharassment-laws
(Cyberharassment Laws Thesis Example | Topics and Well Written Essays - 1000 Words)
Cyberharassment Laws Thesis Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1667305-cyberharassment-laws.
“Cyberharassment Laws Thesis Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1667305-cyberharassment-laws.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber Harassment Laws

Cyber-bullying Crime

The mention of cyberbullying now brings about a debate of how strongly governments should act against cyberbullying and whether new acts of laws be implemented against it or not as most of the culprits involved are juveniles.... any states in America have already implemented laws against cyberbullying.... fter the case of Megan Meier, Missouri was not the only state that took this under consideration and made new laws in order to prevent people from getting harassed in this way....
5 Pages (1250 words) Research Paper

Harassment and Bullying when using Email, SMS, Facebook in Workplace

The paper also shows how cyber harassment negatively affects employees' motivation, causing unnecessary stress, fear, and emotional fatigue, eventually lowering the productivity of workers and consequently, that of an organization.... Outlined herein are some of the most common forms of employee harassment via the internet and other contemporary communications channels: Conveyance of spiteful or intimidating SMS communications or emails to a certain worker's cellular phone or computer address, respectively....
7 Pages (1750 words) Research Paper

Description of Cyber Crimes

In business laws, cyber crimes refer to a set of criminal activities committed on individuals or groups aimed at causing intentional harm to their reputation either physically or emotionally using chat rooms, short messages from phones, and the internet in general.... With this, this essay will delve into cyber crimes and the laws that are in existence surrounding cyber crimes.... The paper "Description of cyber Crimes " states that cyber crimes continue to change form hence requiring that security agencies charged with the responsibility of curbing cyber professionals should have up-to date information on how these criminals operate....
10 Pages (2500 words) Research Paper

Final Project: Memo to the Attorney General : Cyber Bullying

It has come to the notice of the state and Federal authorities that appropriate statutes and laws need to be introduced to reduce or prevent this form of electronic harassment, which has led to nine suicides and two homicides in the United States.... But as with any other inventions or technological breakthroughs, the Internet also has fallen pray to various Viruses, hacking, and harassment are some examples of the ways in which this medium is misused.... he consequences of cyber bullying have risen to relatively alarming proportions to the extent that statutes in many states in the country have been modified to include harassment through electronic media to be a crime....
5 Pages (1250 words) Essay

Cyber Stalking

The Working to Halt Online Abuse (WHOA) released their latest statistics on cyber-stalking and their figures indicate that females are still the most common victims of stalking and The trends in cyber-stalking based on 2008 figures also indicate that most of the cases have been carried out in Social Networking sites like Facebook and MySpace and also in Craigslist (Hitchcock, 2009).... Most of the states which registered with the most incidents of cyber-stalking include California and New York with harassers mostly using emails, message boards, instant messaging, phones, texting, blogs, LiveJournal, Friendster, online games, and YouTube as media in harassing their victims (Hitchcock, 2009)....
5 Pages (1250 words) Research Paper

Cyber Bullying - Sealing a Tragic Faith

As argued by Kowalski and colleagues, because educational attempts do not involve the potentially unfavorable outcomes of enforcing criminal anti-cyberbullying laws, enhanced Internet protection educational programs deal with cyberbullying constructively, by equipping teachers with the important instruments to educate parents and students how to utilize new technologies sensibly and securely.... According to Meredith (2010), although cyberbullying can be differentiated on that basis from other kinds of harassment and bullying, it is indefinite whether there has really been a quantifiable boost in the rate of harassment and bullying in our nation, or if the arrivals of sophisticated technologies only make it more noticeable or observable....
6 Pages (1500 words) Research Paper

Harassment and Bullying When Using Email, Sms, Facebook in Workplace

The paper also shows how cyber harassment negatively affects employees' motivation, causing unnecessary stress, fear, and emotional fatigue, eventually lowering the productivity of workers and consequently, that of an organization.... This case study "harassment and Bullying When Using Email, Sms, Facebook in Workplace" comprehensively analyzes the rising trend of cyberbullying in the work environment, showing how it occurs through social sites, phone messages and even via email....
7 Pages (1750 words) Case Study

Cyber-Bullying and Gender Differences

Repetition is a common theme that is involved in the literature on bullying, this describes the time frame and number of occurrences of the harassment; bullying is said to exist if it occurs over and over again during an extended period of time (Olweus, 1993).... Some research suggested that males have predominantly succumbed to physical harassment while females were the primary assailants of psychological bullying (Nabuzoka, 2003).... The paper "cyber-Bullying and Gender Differences" highlights that most cases where cyberbullying prevalent is during the middle school years and it diminishes during high school....
10 Pages (2500 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us