Week 2 Assignment: Cybercrime Legislation
If in 1985 someone was asked to define the word sexting, he or she probably would be at a loss for words since that concept did not yet exist. “Sexting” is the combination of sex and texting and is the act of sending sexually explicit messages and/or photos between mobile devices. Approximately 4% to 25% of minors have engaged in sexting, depending on age of those surveyed (Lorang, McNiel, & Binder, 2016).
When sexting involves minors, legal issues and considerations are exacerbated, which may lead to prosecution for crimes like possession and dissemination of child pornography. When one adds the concept of non-consent, the issues related to the prosecution of sexting become even more challenging. As new crimes emerge using advancements in technology, new legislation must be created in an attempt to prevent and address those crimes.
For this assignment, select a type of cybercrime (e.g., cyber-stalking, cyber-bullying, cyber-porn, sexting). Identify a piece of legislation related to that type of cybercrime that is more than 5 years old. Then identify a current piece of legislation related to that type of cybercrime.
Choose a cybercrime of interest that has been active for more than 5 years and still an issue. Research the Walden Library and the Internet to find examples of legislation focused on cybercrime that is at least 5 years old and legislation that is current (less than 5 years).
Using the Walden Writing Center APA Course Paper Template, write a 3- to 4-page paper in which you do the following:
Briefly describe the type of cybercrime you selected.
Describe the piece of legislation you selected that is more than 5 years old.
Describe the piece of legislation you selected that is current.
Explain any significant differences between the two pieces of legislation.
Explain how the evolution of the type of cybercrime you selected has influenced legislation.
Support your Assignment with specific references to all resources used in its preparation. You are to provide a reference list for all resources, including those in the Learning Resources for this course.
Taylor, R. W., Fritsch, E. J., Saylor, M., R. & Tafoya, W. L. (2019). Cyber crime and cyber terrorism (4th ed.). Pearson.
Chapter 1, “Introduction and Overview of Digital Crime and Digital Terrorism” (pp. 1–19)
Chapter 3, “The Criminology of Computer Crime” (pp. 43–68)
Chapter 6, “White Collar Crimes” (pp. 124–143)
Brinckerhoff, R. (2018). Social network or social nightmare: How California courts can prevent Facebook’s frightening foray into facial recognition technology from haunting consumer privacy rights forever. Federal Communications Law Journal, 70(1), 105-156.
Kugler, M. B., & Strahilevitz, L. J. (2017). The myth of fourth amendment circularity. The University of Chicago Law Review, 84(4), 1747-1812.
Lavorgna, A., & Sergi, A. (2016). Serious, therefore organised? A critique of the emerging “cyber-organised crime” rhetoric in the United Kingdom. International Journal of Cyber Criminology, 10(2), 170-187.
Li, J. X. (2017). Cyber crime and legal countermeasures: A historical analysis. International Journal of Criminal Justice Sciences, 12(2), 196-207.
Michel, C. (2016). Violent street crime versus harmful white-collar crime: A comparison of perceived seriousness and punitiveness. Critical Criminology, 24(1), 127-143.
Michel, C., Heide, K. M., & Cochran, J. K. (2016). The consequences of knowledge about elite deviance. American Journal of Criminal Justice, 41(2), 359-382.
Michel, C., Cochran, J. K., & Heide, K. M. (2016). Public knowledge about white-collar crime: An exploratory study. Crime, Law and Social Change, 65(1-2), 67-91.
Nawafleh, Y., Nawafleh, A., & Nawafleh, S. (2016). Cybercrimes: Concept, forms, and their civil liabilities. International Journal of Arts & Sciences, 9(1), 211-234.
Ngo, F., Jaishankar, K., & Agustina, J. R. (2017). Sexting: Current research gaps and legislative issues. International Journal of Cyber Criminology, 11(2), 161-168.
O’Connor, K., Drouin, M., Yergens, N., & Newsham, G. (2017). Sexting legislation in the united states and abroad: A call for uniformity. International Journal of Cyber Criminology, 11(2), 218-245.
O’Shea, B. (2017). A new method to address cyberbullying in the united states: The application of a notice-and- takedown model as a restriction on cyberbullying speech. Federal Communications Law Journal, 69(2), 119-145.
Rajesh, K. V. N., & Ramesh, K. V. N. (2016). Computer forensics: An overview. Journal on Software Engineering, 10(4), 1-5.
Tokson, M. (2016). Knowledge and Fourth Amendment privacy. Northwestern University Law Review, 111(1), 139-204.
Barnett, C. (2018). The measurement of white-collar crime using Uniform Crime Reporting (UCR) data. Retrieved from https://ucr.fbi.gov/nibrs/nibrs_wcc.pdf
U.S. Department of Justice, Federal Bureau of Investigation. (2017). Preliminary semiannual Uniform Crime Report, January–June 2017. Retrieved from https://ucr.fbi.gov/crime-in-the-u.s/2017/preliminary-report