Describe at least two tactics that law enforcement might utilize to address cyber-bullying and explain whether or not each tactic is effective.

Describe a situation online where you witnessed trolling and flaming. What was the situation? How were the comments handled?
August 18, 2019
What impact do high-publicity sexual harassment cases have on the American workforce?
August 18, 2019

Describe at least two tactics that law enforcement might utilize to address cyber-bullying and explain whether or not each tactic is effective.

Question Description

PAPER MUST BE 2-3 PAGES IN LENGTH (DO NOT GO BY WORD COUNT) 12 POINT FONT, DOUBLE SPACED, INCLUDE SUBHEADING BETWEEN SECTIONS. PROPER APA FORMAT THROUGHOUT THE PAPER. Use references provided below.

Application: Technology and Cyber-Bullying

Research indicates as many as 50% of U.S. youths are victims of cyber-bullying. The majority of these victims seldom report the cyber-bullying to parents or law enforcement (Hinduja & Patchin, 2008). While having similar characteristics of traditional face-to-face bullying, cyber-bullying reaches beyond the playground. Cyber-bullies can enter into unsuspecting victims’ homes across the country and the world. Once cyber-bullies have access to victims, they can proceed to use coercion, intimidation, harassment, and threats. This can result in short- and long-term effects on the victims.

For this assignment, examine technologies used for cyber-bullying and consider effects cyber-bullying might have on victims. Then evaluate the effectiveness of tactics currently used by law enforcement to combat cyber-bullying.

Reference: Hinduja, S., & Patchin, J. W. (2008). Bullying beyond the schoolyard: Preventing and responding to cyberbullying. Thousand Oaks, CA: Corwin Press.

The Assignment (2–3 pages)

  • Provide three examples of technologies and explain how each could be used in cyber-bullying.
  • Explain at least two effects that cyber-bullying might have on victims.
  • Describe at least two tactics that law enforcement might utilize to address cyber-bullying and explain whether or not each tactic is effective.

READINGS

  • Course Text:Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2015). Digital crime and digital terrorism.(3rd ed.). Upper Saddle River, NJ: Pearson.
    • Chapter 8, “Sex Crimes, Victimization, and Obscenity on the World Wide Web”
  • Article: Cooley, A. H. (2011). Guarding against a radical redefinition of liability for Internet misrepresentation: The United States v. Drew prosecution and the Computer Fraud and Abuse Act. Journal of Internet Law, 14(8), 1, 15–28.
    Retrieved from the Walden Library using the Business Source Complete database.
  • Article: Drogin, E. Y., & Young, K. (2008). Forensic mental health aspects of adolescent “cyber bullying”: A jurisprudent science perspective. Journal of Psychiatry & Law, 36(4), 679–690.
    Retrieved from the Walden Library using the Academic Search Complete database.
  • Article: Gillespie, A. A. (2006). Cyber-bullying and harassment of teenagers: The legal response. Journal of Social Welfare & Family Law, 28(2), 123–136.
    Retrieved from the Walden Library using the Academic Search Complete database.
  • Article: King, A. V. (2010). Constitutionality of cyberbullying laws: Keeping the online playground safe for both teens and free speech. Vanderbilt Law Review, 63(3), 845–884.
    Retrieved from the Walden Library using the Academic Search Complete database.
  • Article: McCarthy, T., & Michels, S. (2009, July 2). Lori Drew MySpace suicide hoax conviction thrown out. ABC News. Retrieved from http://abcnews.go.com/TheLaw/story?id=7977226&page=1
  • Article: Meredith, J. P. (2010). Combating cyberbullying: Emphasizing education over criminalization. Federal Communications Law Journal, 63(1), 311–340.
    Retrieved from the Walden Library using the ProQuest Central database.