StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Legal Issues in Cyberstalking - Term Paper Example

Cite this document
Summary
The paper "Legal Issues in Cyberstalking" focuses on the critical analysis of the major legal issues in cyberstalking. The current report intends to demonstrate a deep analysis and understanding of a particular theory along with practice relating to cyberlaw…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.2% of users find it useful
Legal Issues in Cyberstalking
Read Text Preview

Extract of sample "Legal Issues in Cyberstalking"

? Cyberstalking A) Thesis This particular research report intends to demonstrate a deep analysis and understanding about a particular theory along with practice relating to cyberlaw. In this regard, the perception of cyberstalking has been taken into concern. Cyberstalking can be termed as the execution of internet and its associated components for the purpose of harassing or stalking a person or certain groups. The components might embrace instant messaging (IM) and Internet Protocols (IPs) among others. The practice of cyberstalking can be regarded as one of the critical aspects as it imposes unfavorable impact upon the society by a greater level. For the completion of this project, the factors relating to the discrepancies along with the advantageous points relating to cyberstalking will be highlighted upon. The laws that have been formulated against cyberstalking are duly set to punish the offenders or to penalize those individuals associated with the practice of cyberstalking (Milhorn, 2007). B) Background The topic of the study focuses on cyberstalking and its effects on various users of internet. Cyberstalking has been viewed to be one of the most widely practiced activities in the world of internet nowadays. It is frequently practiced by different types of hackers and cyber criminals. However, there are numerous laws that have been formulated as well as exploited by national along with international laws for penalizing the offenders. It is to be affirmed that the concept of cyberstalking is a much broader concept as the whole of the internet medium is related with it. It may provide with a great deal of challenge to study the overall theories related to cyberstalking. There are numerous issues that are needed to be dealt with while dealing with the significant concern of cyberstalking. Facing these issues will lead to a source of learning and knowledge gathering which is quite important. For the completion of this project successfully, a deep analysis about the concept of cyberstalking is needed to be conducted along with proper identification of the problems associated with it. However, the concept of cyber stalking is bound to derive many advantages to the internet world. The laws concerning cyberlaw should be widely supported as with the proper lawful measures, the rising problem concerning the increase of cyber stalking can be lowered. This would prove to be a great aid for minimizing the rates of cyber crimes. As cyber stalking represents conduct of several malicious practices, the laws are specially formed to disrupt such practices by a greater level (Bocij, 2004). C) Inadequacies There are various types of challenges that may arise while analyzing the current traits and practices of cyberstalking. Hacking specialists along with cyber criminals often play their roles in a very skillful manner. Investigating teams are required to trace their internet activities in an effective manner. A lot of technical expertise is demanded to have a clear understanding of the various activities of the offenders. Highly trained professionals are required for checking all kinds of activities related to cyber crimes (Janczewski & Colarik, 2008). The internet age is designed in such a way that people tends to share their personal information very quickly. It can be affirmed from a broader outlook that sharing personal information eventually paves the way for the happening of the activities associated with cyberstalking. As the use of internet is becoming drastically popular in this present day context, it is becoming quite difficult for the people to stop themselves from exchanging personal information over the internet with unknown people. This particular trend is ultimately leading the way towards causing the activities relating to cyberstalking by a greater level. In order to determine the inadequacies relating to the context of cyberstalking, certain crucial factors can be recognized that imposes significant impact upon controlling the ill effects of cyberstalking. In this similar concern, the factors might comprise complexities in the enforcement systems and multiple engagements of the participants in accessing the internet medium (Morley & Parker, 2012). D) Adequacies In relation to the context of cyberstalking, it is to be affirmed that this particular concern can be controlled by a greater degree with the help of conducting various activities and significant strategies. It has been apparently observed that the traditional laws which have been formulated to penalize the cyberstalkers are not very much strict resulting in increased level of cyberstalking related activities at large. However, the federal laws should be formulated in such a way so that the conduct of cyberstalking could be minimized by a significant level. Those types of cyber governing laws should be incorporated that promises to deliver maximum punishment to the offenders. Efforts should be made to create alarming factors of punishment that the cyber criminals would definitely want to avoid. Instead of 5 years, an offender should be punished with at least 10 years of prison, if he/she commits cyberstalking. It is to be affirmed that if the cyber crimes are treated equally offensive like that of any other crime, then the laws concerning cyberstalking can be able to stop the extent of cyberstalking by a certain degree. In this similar context, one of the innovative developments for curbing cyberstalking issues would be to introduce a particular software in which all the internet activities of the users could be traced effectually By this way, it will help in identifying all the possible threats that usually arise in cyber places. A proper surveillance would also provide greater aid in capturing all activities that reflect the increased conduct cyberstalking activities (Milhorn, 2007). In order to determine the adequacies for having a better situation or proper understanding mode or depicting the procedure clarity within the background of cyberstalking, several aspects can be recognized endeavoring towards lessen the aforesaid practice at large. In this similar concern, the aspects comprise minimizing sharing any valuable or personal information in an e-commerce setting and most vitally ensuring that the Internet User Providers (ISPs) posses appropriate policy standards concerning towards prohibiting cyberstalking. It has been apparently observed in this similar concern that apart from the aforesaid aspects, the proper execution of the existing national as well as international laws can also contribute in regulating or lessening the activities relating to cyberstalking by a greater level (Milhorn, 2007). E) Conclusion From the above analysis, it has been apparently observed that the activities relating to cyberstalking are affecting the internet place and every societal member by a considerable level. However, there are various measures that can be adopted in order to curb this issue. Making the internet environment free from the conduct of any sort of malicious activity and crime can be a major source of challenge for controlling the crucial concern of cyberstalking. The prevalence of the existing lawful regulations might lessen the conduct of cyberstalking by a certain degree. It is of primary importance to support the laws that have been devised, executed as well as developed for curbing the factor of cyberstalking as it creates major source of panic and fear in the minds of the victims who gets affected from this practice. It is worth mentioning that eliminating the prevalence of the activities concerning cyberstalking in the internet world can lead towards improved online atmosphere and healthy exchange of information from person to person. This will help in building healthy communication channel as well. The internet world can be improved and made free of cyber crimes and cyberstalking with the adoption along with the proper execution of various innovative laws. These laws would eventually trigger in discontinuing as well as lessening the practice of cyber stalking by a certain degree. References Bocij, P. (2004). Cyberstalking: harrassment in the internet age and how to protect your family. United States: Greenwood Publishing Group. Janczewski, L, J., & Colarik, A, M. (2008). Cyber warfare and cyber terrorism. United States: Idea Group Inc. Morley, D., & Parker, C, S., (2012). Understanding computers: Today and tomorrow, introductory, 14th ed.: Today and tomorrow, introductory. India: Cengage Learning. Milhorn, H, T. (2007). Cybercrime: how to avoid becoming a victim. United States: Universal-Publishers. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyberstalking Term Paper Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1480683-cyberstalking
(Cyberstalking Term Paper Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/information-technology/1480683-cyberstalking.
“Cyberstalking Term Paper Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1480683-cyberstalking.
  • Cited: 0 times

CHECK THESE SAMPLES OF Legal Issues in Cyberstalking

What ethical challenges to the social order could arise from technological advances

With the advent of internet and electronic commerce, ethical issues in business have gained urgency regarding finding solutions as gathering, aligning and disseminating information has become a risky proposition by misusing the customer data, raised interference in privacy and safeguarding of the intellectual rights.... Technology issues are contemporary business issues in the context of their outcome on society, particularly the biotechnology companies that are confronted with issues related to the use of embryonic stem cells, genetic engineering, and cloning....
10 Pages (2500 words) Essay

The Analysis of the Criminal Justice Organizations

For example, as Gallagher and Holmes (2008) point out, different political parties might have different outlooks regarding various criminal and social issues.... When there is a high profile case or legal jargon, the media often turns to the leader for explanations.... It is for the criminal justice agencies to deal with legal and political pressures, both within and outside the system....
6 Pages (1500 words) Term Paper

What Is Meant and Understood by the Term Computer Misuse

his analysis particularly focuses on three different aspects of potential computer misuse; namely identity theft, online harassment (otherwise referred to as 'cyberstalking), and denial of service attacks (DDOS).... The focus of this analysis is to consider the definition of the term 'computer misuse' within the context of UK criminal law....
6 Pages (1500 words) Article

Legal an Ethical Issues Facing IT Managers

The following essay 'Legal an Ethical issues Facing IT Managers' presents the issues of computer ethics which are a crucial topic in the information systems sector.... issues such as cyber-crimes, hacking and password thefts are on the increase in cyber work environments.... Therefore, IT managers should develop and create awareness on the importance of legal and ethical values associated with computer use in the workplace (Oswalt & Elliot-Howard, 2003)....
1 Pages (250 words) Essay

The Consideration of the Effectiveness of the Computer Misuse Act 1990

In most cases of cyberstalking, there will be more than one offensive or threatening letter or telephone call and the police will opt to charge under the Harassment Act 1997, where the court can make a restraining order preventing them from contacting the victim again and breach of this order is punishable with up to five years imprisonment....
10 Pages (2500 words) Term Paper

Cyberstalking Impact on the Physical, Social and Psychological Lives of Teenagers

The paper "Cyberstalking Impact on the Physical, Social and Psychological Lives of Teenagers" assumes the victims of cyberstalking experience trauma, stress and anxiety, they face issues in their social relationships and they even experience suicidal thoughts.... There is no one single generally as well as uniformly accepted definition of the term cyberstalking as the ways of conducting this deviant acts has increased and there are several variations in the way this deviant act may be conducted....
8 Pages (2000 words) Essay

The Privacy and Surveillance in Relation to the Internet

The radical increase of privacy violations for Internet users worldwide has led authorities to concerns regarding the effectiveness of existing legislation regarding Internet use.... Gaps have been identified both as the prevention of privacy violations and the punishment of these activities.... ...
5 Pages (1250 words) Case Study

Age Restrictions on Social Networks to Avoid Cyber Bullying and Related Child Abuses

The paper 'Age Restrictions on Social Networks to Avoid Cyber Bullying and Related Child Abuses' evaluates the use of age restriction as means to prevent cyberbullying, the potential legal problems associated with this policy, alternative solutions to address the problem.... The paper goes a notch higher and looks into alternative solutions to the problem, how effective the policy will be, the challenges it might face as well as the legal problems that might be associated with the policy....
7 Pages (1750 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us