literature review: Cyberstalking or Cyberbullying and Laws to Protect Individuals

User Generated

tcunpxre

Writing

Description

Please go through the attached doc

literature review:

Some of the questions to consider are:

1. What is the business problem/issue formulated by the author?

2. Is it clearly defined?

3. Could the problem have been approached more effectively or from another perspective?

4. Has the author also evaluated the literature relevant to this problem/issue?

5. Does the author agree or disagree with the relevant literature?

6. How does the article contribute to your understanding of the problem or topic?

Please ensure at least 2 real-world examples are discussed and integrated in the literature review.

Literature Review Expectations:

1. At least 10 peer-reviewed articles are to be included in the literature review.

2. It should be organized by theme or subject of the article.

3. A minimum of one paragraph is required per article is required.

4. The review must be synthesized, and the articles analyzed for content as it relates to the content of the case study above.

5. Free of grammatical errors.

6. No evidence of plagiarism.

7. Since this is Information Technology related the articles cannot be greater than 5-years old unless it considered a seminal article.


Written Requirements:

Be sure to use appropriate APA format and cite your Reading or other sources that you used in your literature review.

The literature review should contain enough information to adequately answer the business problem provided in the case study and contain no spelling, grammar, or APA errors.

Points deducted from grade for each writing, spelling, or grammar error are at your instructor’s discretion.

Unformatted Attachment Preview

Case Study: Lab – Cyberstalking or Cyberbullying and Laws to Protect Individuals Please ensure at least 2 real-world examples are discussed and integrated in the literature review. In this lab you will conduct a review of the literature on this topic and complete a literature review on this topic. There are many sites that can assist in the formatting and content of a literature review. Here is an example: http://guides.lib.ua.edu/c.php?g=39963&p=253698 Some of the questions to consider are: 1. What is the business problem/issue formulated by the author? 2. Is it clearly defined? 3. Could the problem have been approached more effectively or from another perspective? 4. Has the author also evaluated the literature relevant to this problem/issue? 5. Does the author agree or disagree with the relevant literature? 6. How does the article contribute to your understanding of the problem or topic? Literature Review Expectations: 1. At least 10 peer-reviewed articles are to be included in the literature review. 2. It should be organized by theme or subject of the article. 3. A minimum of one paragraph is required per article is required. 4. The review must be synthesized, and the articles analyzed for content as it relates to the content of the case study above. 5. Free of grammatical errors. 6. No evidence of plagiarism. 7. Since this is Information Technology related the articles cannot be greater than 5-years old unless it considered a seminal article. 8. The literature review must be run through the plagiarism detector and no more than 25% of the articles should be used by another student. If there is a greater than 25% match in the paper it will receive a point deduction of 50%. If greater than 50% is a match the submission will receive a 0 without an option for resubmission. If there is a match in articles the synthetization and analyzation of the material MUST be original for content. Written Requirements Be sure to use appropriate APA format and cite your Reading or other sources that you used in your literature review. The literature review should contain enough information to adequately answer the business problem provided in the case study and contain no spelling, grammar, or APA errors. Points deducted from grade for each writing, spelling, or grammar error are at your instructor’s discretion. Also review the university policy on plagiarism. If you have any questions, please contact your professor. Directions for Submitting Your Lab Place your literature review in the drobox for the Unit 3 Lab.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: Cyberbullying and cyberstalking

Name
Institution
Date

1

Cyberbullying and Cyberstalking

2

Introduction
Cyberbullying is bullying which occurs through the use of digital devices such as
computers, cell phones, and tablets. It can take place over Text, SMS, and apps, or in forums,
social media, or in games where people can participate, view or share content (Hango, D. W.
(2016). Cyberstalking is a criminal offense of using the internet with the internet to threaten or
harass someone. Cyberstalking can be carried out through social media, chatrooms email, and
instant messaging clients and also through any other online channel.
Legal implications
Harassment is a crime under the Criminal Code.
If the victim feels frightened despite the intention of the perpetrator, an offender is guilty
to be punished up to 10 years in prison.

Anti-Stalking Legislation in the United States
The District of Columbia and all 50 states to date have adopted criminal cyberstalking
statutes. Among those states, 44 of them have implemented cyberstalking laws within
harassment and existing laws. Breaking this law, an offender is jailed 5 years in prison.

Societal Intervention and Prevention
People are recommended by law enforcement officials to select ambiguous screen names
if possible. They are also advised to avoid exposing personal information and data in web
profiles.

Cyberbullying and Cyberstalking

3

Literature review
The emergence of cyberbullying
There is been a decline in traditional bullying while cyberbullying has emerged as a
matter of mobile devices, internet access, and social media. It is most evident in developed and
also in developing the world (Monks, C. P., Mahdavi, J., & Rix, K. (2016). The rate of
cyberbullying is a bit low when compared to traditional ways of bullying, even though recent
data indicates there is a rise of cyberbullying. According to sample data 10-17 years of internet
users aged 10-17 in the U.S, there is an increase of 83% of online harassment cases. The increase
is dynamic over the recent decade, in 2005 it was 11%, 2010 increased to 30% and in 2015 it
was at 83%. An average of 10% of 6-17 years was bullied online according ...

Related Tags