Describe the legal implications of cyberstalking

Assignment Help Management Information Sys
Reference no: EM13845883

Please give very comprehensive and thorough answers that fully address the questions. Full credit will only be given for complete descriptions of the terms and cases as required for the Lab Report. Also, provide the links for all terms and cases you find
Introduction

Cyberstalking and cyberbullying are not just terms for today's youth. They are real and increasing threats online. This is particularly true with social media, social communications, and social networking being done online. Protecting your identity, your privacy, and your data is a requirement for interacting and socializing online.

In this lab, you will define cyberstalking and cyberbullying and describe their legal implications, you will identify case studies for cyberstalking and cyberbullying, and you will define the requirements for a law to protect individuals from both of these threats.

Open a browser, search for cyberstalking

1. In the Report file, define what cyberstalking means

2. In the Report file, describe the legal implications of cyberstalking

Stalking Is Stalking, Offline and Online

Even though cyberstalking might be new, the activity is well understood. Due to how technology changes so quickly, laws specifically tackling cyberstalking are new. In some areas, the laws might not even yet exist. However, the crime is already understood and dealt with by the law enforcement agencies ready to levy new charges.

Police appreciate the similar activity and analogous meaning between cyberstalking and stalking. The principal behaviors involved are harassment, intimidation, and incitement of hatred, etc. No one needs to reinvent a new crime definition, only new laws encompassing those behaviors online, as they sometimes include additional charges such as unauthorized use of a computer, mischief in relation to data, and, in school-age cases, child pornography. Of course, exact nomenclature of charges might vary by state or country, but the described activities are essentially the same.

3. Search the internet for a cyberstalking case

4. In the Lab Report, describe the case, including facts as who was victimized and how the person was victimized.

5. In the Lab Report file, explain how you would protect this individual from the scenario presented in the case by outlining the law you would create.

6. In your browser, search for cyberbullying. Define what cyberbullying means.

7. In the Lab Report file, define what cyberbullying means

8. In the Lab Report file, describe the legal implications of cyberbullying.

9. Search the internet for cyberbullying case. Describe the case, including such facts as who Was victimized and how the person was victimized.

10. In your Lab Report file, explain how you would protect this individual from the scenario Presented in the case by outlining the law you would create.

Reference no: EM13845883

Questions Cloud

Marketing for a large national bank : In this assignment, you are to assume that you are in marketing for a large national bank and that you have been tasked with achieving a key growth objective for the organization
Prepare an estimate of electricity costs : Using the high-low method, prepare an estimate of electricity costs for July, assuming 53,500 units are expected to be produced in July.
Journalize the entries to record the payroll : Journalize the entries to record (a) the payroll and (b) the employer's payroll tax expense for the month.  The state unemployment tax rate is 3.1%, and the federal unemployment tax rate is 0.8%.  Only $25,000 of salaries are subject to unemployme..
What are quicken loans key goals and values : Define the problem: What are Quicken Loans key goals and values? Do additional research about working at Quicken Loans to get more than just the company's view from its website.
Describe the legal implications of cyberstalking : In the Report file, define what cyberstalking means, In the Report file, describe the legal implications of cyberstalking
Prepare an owner equity statement : Prepare an owner's equity statement for the month of June. Prepare a balance sheet at June 30.
How will you get the data you need to test your hypotheses : How will you get the data you need to test your hypotheses? What tools or devices will you use to make or record observations? How will you choose the sample?
What is the length of time for the critical path : Show which path is the critical path and what is the length of time for the critical path (the expected completion time)?
Describe what makes you stand out from others : Your Personalized Strengths Insights, which describe what makes you stand out from others with the same theme in their top five Questions for you to answer to increase your awareness of your talents

Reviews

Write a Review

Management Information Sys Questions & Answers

  Evaluate the sales forecast

Projecting Monthly Computer Sales - Evaluate the sales forecast for July using the following approaches:

  Impact of information technology on the organization

List and discuss at least three positive and three negative impacts of information systems - Distinguish between the transaction cost theory of the impact of information technology on the organization

  Show the business activities and business functions

What business activities and business functions does this type business application support and What kind of computer hardware and software are needed to support this type of business application

  How do i set-up the problem

How do I set-up the problem and What formula, if any, should be used in this problem?

  Investment to the shareholders and board before the project

Technology investments - technology investment to the shareholders and board before the project?

  How will use a relational database to store data

Multidimensional Analysis and Data Versus Information - How will use a relational database to store data, be specific.

  The solution to information securityto some the employee is

the solution to information securityto some the employee is considered as the biggest threat to information security at

  Business plan for a music school

Write a Business Plan - Imagine writing a business plan for a music school. Focus on the aspect of The Leadership (Management) Team/Human resources requirements

  Calculate the total payment for apples and watermelon

Unlimited Pickers is a group of workers who have joined together to provide harvesting services to farmers who need to have their crops brought in. Create a query to calculate the payment for each picking for grapes and strawberries

  Evaluate it while preparing due deligence report

Evaluate IT While Preparing Due Deligence Report - How important technology due diligence is to a company and what the results mean are also explained.

  Describe two examples of expert systems

Describe two examples of expert systems that are being used to assist in decision making. You may use examples from the textbook or other examples you have read about or heard about

  How much of a system should be documented?

How much of a system should be documented? What about user documentation

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd