Friday, August 9, 2019

Cyberstalking Term Paper Example | Topics and Well Written Essays - 1000 words

Cyberstalking - Term Paper Example This particular research report intends to demonstrate a deep analysis and understanding about a particular theory along with practice relating to cyberlaw. In this regard, the perception of cyberstalking has been taken into concern. Cyberstalking can be termed as the execution of internet and its associated components for the purpose of harassing or stalking a person or certain groups. The components might embrace instant messaging (IM) and Internet Protocols (IPs) among others. The practice of cyberstalking can be regarded as one of the critical aspects as it imposes unfavorable impact upon the society by a greater level. For the completion of this project, the factors relating to the discrepancies along with the advantageous points relating to cyberstalking will be highlighted upon. The laws that have been formulated against cyberstalking are duly set to punish the offenders or to penalize those individuals associated with the practice of cyberstalking (Milhorn, 2007). B) Backgrou nd The topic of the study focuses on cyberstalking and its effects on various users of internet. Cyberstalking has been viewed to be one of the most widely practiced activities in the world of internet nowadays. It is frequently practiced by different types of hackers and cyber criminals. However, there are numerous laws that have been formulated as well as exploited by national along with international laws for penalizing the offenders. It is to be affirmed that the concept of cyberstalking is a much broader concept as the whole of the internet medium is related with it. It may provide with a great deal of challenge to study the overall theories related to cyberstalking. There are numerous issues that are needed to be dealt with while dealing with the significant concern of cyberstalking. Facing these issues will lead to a source of learning and knowledge gathering which is quite important. For the completion of this project successfully, a deep analysis about the concept of cybers talking is needed to be conducted along with proper identification of the problems associated with it. However, the concept of cyber stalking is bound to derive many advantages to the internet world. The laws concerning cyberlaw should be widely supported as with the proper lawful measures, the rising problem concerning the increase of cyber stalking can be lowered. This would prove to be a great aid for minimizing the rates of cyber crimes. As cyber stalking represents conduct of several malicious practices, the laws are specially formed to disrupt such practices by a greater level (Bocij, 2004). C) Inadequacies There are various types of challenges that may arise while analyzing the current traits and practices of cyberstalking. Hacking specialists along with cyber criminals often play their roles in a very skillful manner. Investigating teams are required to trace their internet activities in an effective manner. A lot of technical expertise is demanded to have a clear understand ing of the various activities of the offenders. Highly trained professionals are required for checking all kinds of activities related to cyber crimes (Janczewski & Colarik, 2008). The internet age is designed in such a way that people tends to share their personal information very quickly. It can be affirmed from a broader outlook that sharing personal information eventually paves the way for the happening of the activities associated with cyberstalking. As the use of internet is becoming drastically popular in this present day context, it is becoming quite difficult for the people to stop themselves from exchanging personal information over the internet with unknown people. This particular trend is ultimately leading the way towards causing the activities relating to cyberstalking by a greater level. In order to determine the inadequacies relating to the context of cyberstalking, certain crucial factors can be recognized that imposes significant impact upon controlling the ill eff ects of cyberstalking.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.