Download file to see previous pages...
The trends in cyber-stalking based on 2008 figures also indicate that most of the cases have been carried out in Social Networking sites like Facebook and MySpace and also in Craigslist (Hitchcock, 2009). The trends also indicate an increase in victims aged 18 to 30 and those who are 41 years old and above with most victims being Caucasian, and the rest being Hispanic, Afro-American, Asian, and Native Americans (Hitchcock, 2009). There was also an increase detected in the cases where victims knew their harassers, and this mostly involved ex-spouses or ex-girl/boyfriends (Hitchcock, 2009). Most of the states which registered with the most incidents of cyber-stalking include California and New York with harassers mostly using emails, message boards, instant messaging, phones, texting, blogs, LiveJournal, Friendster, online games, and YouTube as media in harassing their victims (Hitchcock, 2009). With the difficulty of apprehending these criminals, many of these victims are often killed and are physically and psychologically intimidated by their harassers. Based on the above scenario, this paper shall now present the current literature on cyber-stalking. It shall focus on the manner of perpetuation, the difficulties encountered in managing this crime, and the remedies which have been implemented in order to apprehend harassers.
A paper by Ogilvie (2001) discusses that cyberstalking is a crime which is similar to the usual forms of stalking in the sense that it uses behavior which causes fear and apprehension on a victim. However, because of new electronic technologies, the traditional methods of stalking have been transformed through the application of other mediums such as emails and the Internet (Ogilvie, 2001). Even without empirical research assessing the incidence and prevalence of cyberstalking, many experts and analysts believe that cyberstalking is actually more common than the traditional form of
...Download file to see next pagesRead More
Thus, the question arises: Is cyber law really effective in stopping crime? Can we depend on the Cyber laws? Can it give us the protection that we require? To answer all this questions, we have to undergo a thorough analysis of the definition and meaning of terms like cyber law and cyber crime, the enactments that make up cyber law, the different types of cyber crime, the outcomes of the cyber laws etc., and finally conclude the effectiveness and reliability of cyber laws.
Global Trends in Crime.
The current global trends in crime are largely based on the current digital and the widely available electronic technologies which have infiltrated almost all aspects of our lives. These technologies have transformed theft, fraud, and stalking to the more sophisticated crimes of internet scamming, phishing, cyberstalking, cyber bullying, hacking, identity theft, credit card fraud and other crimes generally labeled under internet or cyber crimes.
Unfortunately like every invention computers too can be used for negative and positive purposes. Because the benefit that computer provides is great, the harm it can cause is also many folds more than pre computer age. Criminals have used computers for criminal activity since its availability was not a problem.
It is true that everything has two sides; a positive and a negative one. And on the basis of some negative effects the potential benefits of technology, such as computers and internet, cannot be ignored. But it is also important to understand the perils of computers and internet, so that one can attempt to avoid and eradicate such perils.
The use of media in the society provides a path for socializing, cognitive development of the youth, emotional expression, thus it defines the way a person would spend his time. The advent of internet led to social networking which has rapidly grown in the recent past.
Computers have been the basis of operations in various institutions ranging from corporate to government organizations. Computers have been very instrumental in communication, transactions, storage of files and data, as well detecting certain malicious activities.
It has become a virtually indispensable tool in education, entertainment, government, and business world (Willard, 2007). While it has become critical in the daily lives of adults, the internet has also become a major part of the children’s lives. Children use the internet for education purposes, online communication and social networking.
Law enforcement agencies have not developed laws that equal the development of the obscenity, exploitation and cyber stalking that is witnessed among populations (Leman- Langlois, 2012).
It is difficult to place cyber law
1 Pages(250 words)Research Paper
GOT A TRICKY QUESTION? RECEIVE AN ANSWER FROM STUDENTS LIKE YOU!
Let us find you another Research Paper on topic Cyber Stalking for FREE!