If in 1985 someone was asked to define the word sexting, he or she probably would be at a loss for words since that concept
If in 1985 someone was asked to define the word sexting, he or she probably would be at a loss for words since that concept did not yet exist. "Sexting" is the combination of sex and texting and is the act of sending sexually explicit messages and/or photos between mobile devices. Approximately 4% to 25% of minors have engaged in sexting, depending on age of those surveyed (Lorang, McNiel, & Binder, 2016).
When sexting involves minors, legal issues and considerations are exacerbated, which may lead to prosecution for crimes like possession and dissemination of child pornography. When one adds the concept of non-consent, the issues related to the prosecution of sexting become even more challenging. As new crimes emerge using advancements in technology, new legislation must be created in an attempt to prevent and address those crimes.
For this assignment, select a type of cybercrime (e.g., cyber-stalking, cyber-bullying, cyber-porn, sexting). Identify a piece of legislation related to that type of cybercrime that is more than 5 years old. Then identify a current piece of legislation related to that type of cybercrime.
The Assignment:
Choose a cybercrime of interest that has been active for more than 5 years and still an issue. Research the Walden Library and the Internet to find examples of legislation focused on cybercrime that is at least 5 years old and legislation that is current (less than 5 years).
Using the Walden Writing Center APA Course Paper Template, write a 3- to 4-page paper in which you do the following:
- Briefly describe the type of cybercrime you selected.
- Describe the piece of legislation you selected that is more than 5 years old.
- Describe the piece of legislation you selected that is current.
- Explain any significant differences between the two pieces of legislation.
- Explain how the evolution of the type of cybercrime you selected has influenced legislation.
Support your Assignment with specific references to all resources used in its preparation. You are to provide a reference list for all resources, including those in the Learning Resources for this course.
Resources:
Taylor, R. W., Fritsch, E. J., Saylor, M., R. & Tafoya, W. L. (2019). Cyber crime and cyber terrorism (4th ed.). Pearson.
Chapter 1, “Introduction and Overview of Digital Crime and Digital Terrorism” (pp. 1–19)
Chapter 3, “The Criminology of Computer Crime” (pp. 43–68)
Chapter 6, “White Collar Crimes” (pp. 124–143)
#TurnItInApproved
#PhDLevel
#WaldenU
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.