Friday, July 26, 2019
Cyberharassment Laws Thesis Example | Topics and Well Written Essays - 1000 words
Cyberharassment Laws - Thesis Example the most imperative issues with the manner these laws have been implemented is the fact that each state has a certain level of uniqueness in relation to the manner these laws have been implemented or applied for instance: In the United States, the penal code in relation to cyber-harassment in Alabama is quite different with cyber-harassment penal code in Alaska. This simply means that these laws differ on their efficacy as well as challenges (Sternberg, 2014). Apart from the United States, other countries that have also implemented cyber-harassment laws, identifying it as a criminal offense is the Republic of Philippines, Canada as well as Australia. It is quite an important issue to investigate in the contemporary society with a purpose of eliminating possible flaws that may be associated with these laws, taking into consideration that communication technologies are replacing traditional modes of communication at an increasing rate (Sternberg, 2014). The concept of cyber-harassment has been described has an act of repeated electronic contacts, driven by the purposes of creating distress on the targeted recipient (Easttom & Taylor, 2011). However, in order to clarify such acts as harassments, most law-makers claim that a reasonable person, possessing similar information, must consider it sufficient to create distress on their targeted recipients. There are certain considerations that have been given a high sense of priority in relation to cyber-harassment. To begin with, targeted victims of cyber-harassment may not even be in a position to determine that they are being subjected under harassment. Additionally, cyber-harassment is usually accomplished through the use of communication technology, mostly through social-communication technologies; this may be undertaken by a group of individuals or in some cases just an individual (Easttom & Taylor, 2011). Sociologists have claimed that actions considered cyber-harassment are inclusi ve of; destruction of data,
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.