Saturday, June 15, 2019

Cyberharassment Laws Thesis Example | Topics and Well Written Essays - 1000 words

Cyberharassment Laws - Thesis Examplethe most imperative issues with the manner these laws have been implemented is the fact that for each one state has a certain level of uniqueness in relation to the manner these laws have been implemented or applied for instance In the get together States, the penal code in relation to cyber-harassment in Alabama is quite different with cyber-harassment penal code in Alaska. This simply means that these laws differ on their efficacy as well as challenges (Sternberg, 2014).Apart from the United States, other countries that have also implemented cyber-harassment laws, identifying it as a criminal offense is the republic of Philippines, Canada as well as Australia. It is quite an important issue to investigate in the contemporary society with a purpose of eliminating possible flaws that may be associated with these laws, taking into consideration that communication technologies are replacing traditional modes of communication at an increasing rate (Sternberg, 2014).The concept of cyber-harassment has been described has an act of repeated electronic contacts, driven by the purposes of creating distress on the targeted recipient (Easttom & Taylor, 2011). However, in order to clarify such acts as harassments, most law-makers claim that a mediocre person, possessing similar information, must consider it sufficient to create distress on their targeted recipients. There are certain considerations that have been given a high brain of priority in relation to cyber-harassment. To begin with, targeted victims of cyber-harassment may not even be in a position to determine that they are being subjected beneath harassment. Additionally, cyber-harassment is usually accomplished through the use of communication technology, mostly through social-communication technologies this may be undertaken by a group of individuals or in nigh cases just an individual (Easttom & Taylor, 2011). Sociologists have claimed that actions considered cyber- harassment are inclusive of destruction of data,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.