Verified Document

Cyberstalking The Rapid Changes Witnessed Over The Essay

Cyberstalking The rapid changes witnessed over the course of the last two decades has demonstrated how technology and, more specifically, the internet, have expanded the rule of law and the accompanying challenges that lie in enforcing the law. The purpose of this essay is to describe the greatest challenge facing law enforcement agencies in investigating exploitation, cyber stalking and obscenity. This challenge is the mere scope of problems that this platform has created. This essay will also discuss how jurisdictional issues often interfere with the true and honest law enforcement in this area.

Subjectivity as the Leading Challenge

Living in a free society, where free speech is protected by federal law, subjective differences often arise when discussing what is obscene or not. This subjective quality of human behavior is the root of all these issues and should be respected as a problem that must be solved, yet individual liberty and freedom of expression also needs to be protected as well. This is the difficult framework law enforcement officials are presented with and creates the boundaries on which this investigation is conducted within.

Each locality has its each unique and individual set of behavioral standards that are very difficult to standardize and objectify. This is the greatest challenge to law enforcement officials as their application of "reasonable" must accurately reflect the standards of the community. This is extremely difficult and asks to remove the human...

Too much is expected out of these professionals and it is time where law and order is understood in much more tolerant and open minded manner.
Cyberstalking

Kumar (2011) suggested that "Cyberstalking dramatically signals the potential of the Internet to facilitate some types of crimes, as well as pointing to the interventions available and likely to prove effective. Cyberstalking is an entirely new form of deviant behavior that uses technology to harass others in a variety of ways. " This new way of criminal behavior presents a starting point for law enforcement officials as new set of problems the internet poses. Once again, subjective guesses must be made to determine what exactly is stalking and what is not. This problematic course of deduction often leaves law enforcement officials either too aggressive or not aggressive enough. It is ironic that a practice such cyber bullying and cyberstalking can also create real life bullying and stalking.

This problem compounds itself because of certain protections the internet provides. Knowing his or her victims are unable to identify the source of the harassment or threats makes the cyberstalker bolder, encouraging him or her to continue the harassment. This makes many perpetrators more willing to continue pursuing the victim not only at work, but at home, with all the information in the world about the target. Numerous websites provide personal information, including unlisted telephone…

Sources used in this document:
References

Kumar, R. (2011). Cyberstalking: Crime and Challenge at the Cyberspace. International Journal of Computing and Business Research, 2 (1), 2011. Retrieved from http://www.researchmanuscripts.com/PapersVol2N1Jan2011/1.pdf

Ramsey, G. (2013). The War on Cybercrime: How Far Can You Go? Corporate Counsel, 16 April 2013. Retrieved from http://www.law.com/corporatecounsel/PubArticleCC.jsp?id=1202596081920&The_War _On_Cybercrime_How_Far_Can_You_Go&slreturn=20130715093530

Shinder, D. (2011). What makes cybercrime laws so difficult to enforce. Tech Repbulic, 26 Jan 2011. Retrieved from http://www.techrepublic.com/blog/it-security/what-makes- cybercrime-laws-so-difficult-to-enforce/
Cite this Document:
Copy Bibliography Citation

Related Documents

Stalking May Be Defined As Any Sort
Words: 2085 Length: 5 Document Type: Term Paper

Stalking may be defined as any sort of unwanted contact a person called the stalker makes on the intended victim, which could directly or indirectly cause one or more of the following criminal actions, which are fear of death, sexual contact which is of criminal nature, assault, kidnapping, injury and damage to property. (Stalking: www.atss-hq.com) Nearly all stalkers are afflicted with some form of mental or emotional problem. A stalker

Stalking Is a Behavior Which
Words: 958 Length: 3 Document Type: Thesis

While the Zona, et al., study closely examines the victim-suspect relationships, another study conducted by Troy McEwen, Paul E. Mullen, and Rosemary Purcell (2006) focuses more succinctly on the behavioral disorder as regards stalkers' propensity for violence and physical harm to their victims (p. 2). McEwen, et al., found that the longer the behavior of stalking continued, the greater the potential for physical harm to the victim (p. 2). McEwen,

Victims of Stalking and Social Work
Words: 580 Length: 2 Document Type: Essay

Physicial Mental Health Effects of Being Stalked: Men and Women Stalking is a common problem and one that results in adverse mental and health effects for both men and women who are stalked. The National Institute of Justice reports that stalking victims "have higher levels of fear and distress, including anxiety, post-traumatic stress disorder and depression symptoms. Several studies indicate that partner stalking independently contributes to victim fear and distress." (2014,

Crime Victims
Words: 2103 Length: 5 Document Type: Research Paper

Stalking Victimization in the United States Crime Victimization It wasn't until Rebecca Schaeffer was killed by Robert John Bardo in 1989 that the word 'stalking' began to take on a new meaning in popular culture, one associated with the pursuit of celebrities by the paparazzi, criminal harassment, and even serial killers (Nicol, 2006, pp. 18-20). A year later California responded by passing the first anti-stalking statute and within another year the other

Enhancing Privacy Over the Internet
Words: 665 Length: 2 Document Type: Research Paper

Stalking in the Computer Age In the last two decades, there has been an increase in knowledge of computers and other provisions of the technology. Notably, with the increase in the knowledge regarding the use of the computers criminals have found an opportunity for the criminal acts (Reyns et al., 2012). For example, there is an increase in the number of spammers, and cyber stalkers hence increase in the number of

Phoenix Program Lessons to Iraq
Words: 19225 Length: 75 Document Type: Term Paper

(MACV Dir 381-41) This document is one of the first confidential memorandums associated with the Phoenix Program, which details in 1967 the mostly U.S. involvement in counterinsurgency intelligence and activities and discusses the future training and development of South Vietnam forces to serve the same function, that had been supported by the U.S. In civilian (mostly CIA) and military roles. The document stresses that the U.S. role is to

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now