Cyber-crimes, science homework help

Don't use plagiarized sources. Get Your Custom Essay on
Need an answer from similar question? You have just landed to the most confidential, trustful essay writing service to order the paper from.
Just from $13/Page
Order Now

If in 1985 someone was asked to
define the word sexting, he or she probably would be at a loss for words
since that concept did not yet exist. “Sexting” is the combination of
sex and texting and is the act of sending sexually explicit messages and/or
photos between mobile phones. Barkacs and Barkacs (2010) have reported that 20%
to 39% of U.S. teenagers have engaged in sexting.

When “sexting” includes
minors, legal issues and considerations are exacerbated, which may lead to
prosecution for crimes like possession and dissemination of child pornography.
When one adds the concept of non-consent, the issues related to the prosecution
of “sexting” become even more challenging. As new crimes emerge using
advancements in technology, new legislation must be created in an attempt to
prevent and address those crimes.

For this assignment, select a type of
cybercrime (i.e., cyber-stalking, cyber-bullying, cyber-porn, sexting).
Identify a piece of legislation related to that type of cybercrime that is more
than 5 years old. Then identify a current piece of legislation related to that
type of cybercrime.

Reference: Barkacs,
L. L., & Barkacs, C. B. (2010). Do you think I’m sexty? Minors and sexting:
Teenage fad or child pornography? Journal of Legal, Ethical and Regulatory
Issues, 13
(2), 23–31.

The Assignment (2–3 pages)

  • Briefly describe the type of cybercrime you selected.
  • Describe the piece of legislation you selected that is more than 5
    years old.
  • Describe the piece of legislation you selected that is current.
  • Explain any significant differences between the two pieces of legislation.
  • Explain how the evolution of the type of cybercrime you selected
    has influenced legislation.

Support your Application
Assignment with specific references to all resources used in its preparation.
You are to provide a reference list for all resources, including those in the
Learning Resources for this course.

Readings

  • Course Text:Taylor, R.
    W., Fritsch, E. J., & Liederbach, J. (2015). Digital crime and
    digital terrorism.
    (3rd ed.). Upper Saddle River, NJ: Pearson..
    • Chapter 1,
      “Introduction and Overview of Digital Crime and Digital
      Terrorism”
    • Chapter 10,
      “Digital Laws and Legislation”
  • Article: Audal, J.,
    Lu, Q., & Roman, P. (2008). Computer crimes. American Criminal Law
    Review, 45
    (2), 233–274.
        
  • Article: Barkacs, L.
    L., & Barkacs, C. B. (2010). Do you think I’m sexty? Minors and
    sexting: Teenage fad or child pornography? Journal of Legal, Ethical
    and Regulatory Issues, 13
    (2), 23–31.
        
  • Article: Martin, J.
    A., Caramanica, M. R., & Fargo, A. L. (2011). Anonymous speakers and
    confidential sources: Using shield laws when they overlap online. Communication
    Law and Policy, 16
    (1), 89–125.
  • Article: Smith-Mason,
    J. (2011). Privacy rights…versus public safety after 9/11. Phi Kappa
    Phi Forum, 91
    (3), 14–15.
        


TWO  pages with at least THREE
references….

It is important that you cover all the topics identified in the
assignment. Covering the topic does not mean mentioning the topic BUT
presenting an explanation from the context of ethics and the readings for this
class

To get maximum points you need to follow the requirements listed for
this assignments 1) look at the page limits 2) review and follow APA rules
3) create SUBHEADINGS to identify the key sections you are presenting and
4) Free from typographical and sentence construction errors.