StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Sexual Predators in Cyberspace - Annotated Bibliography Example

Cite this document
Summary
The bibliography "Sexual Predators in Cyberspace" focuses on the critical, thorough, and multifaceted analysis of the literature about sexual predators in cyberspace. Daniel Armagh evaluates the rocketing growth of child pornography in the United States…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
Sexual Predators in Cyberspace
Read Text Preview

Extract of sample "Sexual Predators in Cyberspace"

Sexual Predators in Cyberspace Annotated Bibliography Armagh, Daniel. “A Safety Net for the Internet: Protecting Our Children”. Juvenile Justice Journal, 5.1, (1998). Web. 12 July 2010. Daniel Armagh, the Director of the American Prosecutors Research Institute’s National Center for Prosecution of Child Abuse evaluates the rocketing growth of child pornography in the United States. According to him, the situation is attributed to the absence of parental restriction and law enforcement on the use of internet. The article is an authentic source for professionals who are involved in the investigation of child abuse cases. It gives a vivid account of the perverse pattern found on the internet i.e. how sexual predators and obsessional harassers locate their victims. As the writer has been the director of a Center that provides training and technical assistance to professionals, he has succeeded to pen such a genuine work that enhances the awareness of common people. For instance, according to Armagh (2), parents’ awareness and active involvement is the most effective protection against child victimization. He also reminds that “if parents are to protect their children against cyber predators, they must understand the rational and methodology in using the internet to approach potential victims” (Armagh, 2). Finally, the author puts forward an array of protective measures which parents can implement to ensure the safety of their children from the threat of sexual predators. (2). Berson M J., Berson H R. “Internet Safety”. Education and Technology: an Encyclopedia volume 2, ABC-CLIO, 2004. 369-370. Print. The article tends to discuss the concept of internet safety in educational environment assessing the risky situations that children often confront with on the internet. It also illustrates certain safety measures like “avoidance techniques, de-escalation skills, and protection strategies” (370) that would avert problematic situations. The writers insist on the necessity of developing appropriate use policies and procedures that ensure the safety of children. The writers’ perception on internet safety is based on building children’s defense which involves “gradual and periodic interaction and discussions of their web experiences” (369). Regardless of the relevance of the issue, the article flaws as it does not dig deeper into the subject to provide the readers with dependable advice on cyberspace pornography and violence. (3). McGrath.., Casey. “Forensic Psychiatry and the Internet: Practical Perspectives on Sexual Predators and Obsessional Harassers in Cyber Space”. J AM Acad Psychiatry Law, 30 (2002). 81-94. Print. The article explores the alarming societal issues associated with the use of internet as the technology has opened up new business opportunities for sexual predators and obsessional harassers. According to the writers McGrath and Casey, these two groups have chosen internet as the best vehicle for attaining their business objectives. The major focus of the article is to make the forensic psychiatrists aware of the multifaceted issues associated with the misuse of computers and internet so that their psychiatric evaluation would become more feasible and competent. The article suggests that forensic psychiatrists should have higher understanding of the technology, “because the behavior of those they evaluate may include the activities in cyberspace” (McGrath, Casey, 81). The writers point out an array of reasons why sexual predators find cyberspace a potential arena for illegal business. “Because cyberspace is an ideal environment, giving them access to a great deal of information about a large pool of potential targets.” (84). The article is relevant to the contemporary issues as the writers’ perceptions are based on their authentic findings and work experience in Psychiatry and Behavioral Health (McGrath) and System Security Administration (Mr. Casey). (4). Medaris, M., Girouard, C. “Protecting Children in Cyberspace: The ICAC Task Force Program”. Juvenile Justice Bulletin, OJJDP, Jan. 2002. 2+. Print. Through this article US Department of Justice gives detailed description of the Office of the Juvenile Justice and Delinquency Prevention’s (OJJDP) Internet Crime Against Children (ICAC) Task Force Program. As the article states, “the program is designed to enhance the response of the state and local law enforcement to child pornography and enticement offenses” (Medaris, Girouard, 2). The writers identify internet as the most crucial medium that causes serious sexual solicitations in the current era. The assumption has been backed by the findings of numerous agencies such as National Center for Missing and Exploited Children (NCMEC) and Sex Offender Treatment Program (STOP). The article also illustrates how legislations like Internet Service Providers Mandatory Reporting Law have enabled enforcement agencies to arrest the offenders and to save victims (3). The main objective of the article is to inform the public of the way of reporting sexual abuse to law enforcement agencies. The article restates that ICAC Task Force and Federal agency partners are committed to ensure children’s safety in the information Age (7). (5). Simmons, J. “Shooting an Unarmed, Defenseless, Innocent man: The Ineffectiveness of the Entrapment Defense in Cyberspace”. Works.bepress.com. 2009. 12 July 2010. Simmons considers cyberspace as a unique realm that is entirely different from the real world; and conventional mode of law enforcement and entrapment defense are inappropriate to protect the rights and privacy of innocent individuals. The writer knows the blend of drafting a sensational topic by developing the convictions in a natural flow. The subject is divided into five parts that enhance the readability and understanding of the article. The interesting aspect of the work is the detailed description of the various characteristics of the cyberspace which according to the writer, make real world regulations ineffective to prevent cyberspace predators. The author argues that in cyberspace cases both subjective and objective tests are ineffective and also there is no unanimous opinion regarding the law enforcement in this concern. “The flaw with the traditional entrapment defense is that it can not effectively transpose either the subjective or objective tests to cyberspace, leaving defendants in internet predation cases without an effective defense. This is because internet communications are a poor indicator for predisposition due to anonymity, possible role playing and potential big talk” (Simmons, 26). Altogether the article remains unique as it invites the world’s attention to the inevitability of collaborated efforts on cyberspace regulations. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Annotated Bibliography Example | Topics and Well Written Essays - 1000 words”, n.d.)
Annotated Bibliography Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/miscellaneous/1568462-annotated-bibliography
(Annotated Bibliography Example | Topics and Well Written Essays - 1000 Words)
Annotated Bibliography Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/miscellaneous/1568462-annotated-bibliography.
“Annotated Bibliography Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/miscellaneous/1568462-annotated-bibliography.
  • Cited: 0 times

CHECK THESE SAMPLES OF Sexual Predators in Cyberspace

Fear and Loathing on MySpace.com

Today, they create a digital profile, hook-up with a network, and just hang-out in cyberspace.... Recently, "the site introduced adverts warning teenagers about the dangers of sexual predators on the web" and the BBC contends that, "At the moment, MySpace has no way of verifying the age of users" ("MySpace Tightens Age Restrictions.... A study conducted at the University of New Hampshire found that 1 in 5 children who have been online on a social network have experienced sexual solicitation (Mitchell, Finkelhor, and Wolak 3012)....
8 Pages (2000 words) Personal Statement

Developments in the media

For example, Lewis has discussed the scope of the reforms to the sexual Offenders Act of 1997 by way of the sexual Offences Act of 2003, as a result of which a wider range of offensive activities against children has been brought under the purview of protection offered for children who are vulnerable to sexual abuse4.... This Act also creates a new offense of 'grooming' whereby a person attempting to lure a child into a sexual activity will be guilty even if the actual offense has not occurred....
16 Pages (4000 words) Essay

Who Should Be Responsible For Policing The Internet

People use the cyberspace in many creative and fruitful ways like to transfer information, and connect people through cheap online communication channels.... This side risks not only the internet industry and the constitutional rights of the public, but significantly children who surf the internet and unwittingly meet with online predators and possible sexual assault. ... These online predators share information with other paedophiles usually in a network, on how to seduce or “groom” a victim....
5 Pages (1250 words) Essay

Privacy and Social Media

Once something is on the internet it is on the internet forever somewhere floating around in cyberspace.... Anderson, 2010) Lastly, law enforcement is effected by social media and its popularity with the young and unaware; internet sexual predators being the greatest threat.... The visual anonymity of social networks and the ability to present oneself as someone other than who they are, can make it easier for predators to stalk and interact with their prey....
1 Pages (250 words) Assignment

Internet Crimes Against Children

The paper "Internet Crimes Against Children" states that the Internet is a wonderful technology.... It is true that by using this sophisticated but user-friendly technology we can very well get access to information that was not easily available to us before.... ... ... ... Information technology is more advanced now and if the predator gets a nude picture or images of children, it can be digitally transformed into pornographic material and distributed across the Internet without the knowledge of the children....
16 Pages (4000 words) Case Study

The Impersonal Nature of Social Networking Sites

The paper 'The Impersonal Nature of Social Networking Sites' presents social networking which is unquestionably a part of life for a majority of the people around the globe.... This position emanates from the presence of quite a number of social media websites and applications.... ... ... ... The applications are egocentric in nature....
7 Pages (1750 words) Case Study

Internet and Everyday Life

People engage in cybersex to explore their own sexual identity.... The "Internet and Everyday Life" paper argues that the effect of the Internet on everyday life cannot be overemphasized.... Online dating has introduced new relationship varieties and dimensions that have had mixed effects on users....
6 Pages (1500 words) Article

Sexting Laws

Sexting involving teenagers can lead to sexual behaviors.... Sexting among minors should raise concern among parents and guardians since research studies have shown that young people who have sexted are five times more prone to engage in sexual behaviors (Walczak, Burch, and Kreimer, 2009)....
5 Pages (1250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us