How to combat Cyber bullying and harassment through Law Enforcement

How to write a fabulous college essay write up using 7 easy tips
August 15, 2017
How to achieve a successfully appealing animation for commercial purposes ?
August 15, 2017
Show all

How to combat Cyber bullying and harassment through Law Enforcement

How to combat Cyber bullying and harassment through Law Enforcement Table of Contents Abstract 2 Introduction. 4 Cyber Bullying and Harassment 5 2.1. Schools in handling cyber bullying. 6 Laws applicable to cyber bullying and harassment 7 3.1. Federal Initiatives. 8 3.2. Law and state law enforcement efforts. 8 3.2.1. Training. 9 3.2.2. Resources. 9 3.2.3. Updated Criminal Policies. 10 Recommendation. 10 Conclusion. 11 References. 11 Abstract Technology has been a great benefit to the current society and it is constantly evolving for the better; it makes communication easier, saves on cost and time. However, this cannot be without certain negative issues like cyber bullying and harassment which is also evolving. These issues have the ability to spoil the education setting as well as affect adversely the preys psychologically and physically. This paper gives an overview of this issue as well as the evidence backing this. Varied solutions are given that would help to alleviate this. Moreover varied law enforcement methods are stated. How to combat Cyber bullying and harassment through Law Enforcement 1. Introduction With the rise of communication technologies, there is similarly an increase in crimes that are associated with the same. It is hence the duty of social control systems so as to maintain the speed with the relevant sectors more so cyberspace, computers and electronic mediums to harass others. One form of such victimization is called cyber bullying. Cyber bullying is composed of the application of data and technology so as to harass others. According to the National Crime Prevention, cyber bullying is the instance electronic tools are used so as to harass other individuals or inflict pain. Additionally according to Patchin and Hinduja (2006), bullying is most commonly associated to education set ups. Adults too can get involved in such tendencies which may be termed to as harassment if it goes to a great extent. It is worth noting that cyber bullying is serious, comprising of threats and undertaking serious physical infliction or death, it may not in most cases be actions that are stated in the penal codes. Additionally, cyber bullying connects with other instances of deviance tendencies undertaken electronically like libel, defamation and cyber stalking. The society has over time been highly reliant on technology, in most cases juveniles, this makes the cases related to cyber bullying to be on the rise. With regard to research, cyber bullying has been done in depth the press. For instances the most watch video in 2006 was of a student reenacting cyber scene from Star Wars using a golf ball. The student was forced to leave school due to the humiliation he received and go for counseling. Cases have similarly been of students ending up dead. The social and physical implications of taking part of bullying are well stated. A good example is that it leads to depression, eating disorders and school issues (Stewart, and Fritsch, 2011). Since cyber bullying is termed to as bullying through electronic means it is hence appropriate to attribute that the individuals that suffer under these people’s hands undergo harms just like the prior bullying which was done physically. Due to the adverse implications brought about by cyber bullying and the poor focus it has been accorded in books, an in depth awareness of the matter is vital, more so for the social control groups to know and correct the issue. It is true that most institutions are not conversant with cyber bullying. In addition cases that have called for in depth consideration by the law, the traditional reaction has handled them as aspects of disturbance. This paper assesses this issue in depth and offers varied ways on how to solve this issue in the best manner possible. As the paper comes to an end, it offers recommendations that would make it effective and successful the practices undertaken by the varied agencies; polices, law makers and society as a whole. 2. Cyber Bullying and Harassment Research that has been done has shown that cyber bullying contrasts in a wide number of populations. According to Li’s (2005) research in 177 students from Canada, it was noted that over 25% of them had been victims of cyber bullying, other studies done by Raskauskas and Stolz show that 54 individuals had experiences with the internet and acquired results showing that 21% had been cyber bullied while 49% were harassed. The spread of cyber bullying changes in regards to size, age and gender. Girls are known to be the highest victims of such activities with the number of boys reporting such cases being higher. The impact brought about by cyber bullying could be higher due to the size of victims and the lack of ability to evade the harassments. The results are made possible by the task that communication plays in the present society. With the higher number of youths using the technology devices; for interaction, it is no doubt that is the most popular method used for cyber bullying. Computer chats and e-mails are most common methods used. Another method not common but is on the rise is the use of video games which calls for internet. In 2009, 27 year old man was arrested for engaging in sexual harassment with a 15 year old girl he got on Xbox chat. In most of the books, cyber bullying is not accorded the necessary focus it deserves. One may not find it easy as to why a child could not just turn down a chat with another person. But according to Patchin and Hinduja (2006) state that a precise method of assessment is that accepting a chat is desirable while turning down a chat could be regarded as bullying, the involvement of the law enforcement bodies would be a right step to do. Cyber bullying however has the same attributes as other forms of deviance undertaken electronically. First the setting that it happens is different. The social control bodies may find it had to manage it as it takes place in the abstract world. The attacks that happen in the cyber have physical helpers; the players are hence seen as taking their role as criminals in the cyber setting. Cyber bullying to the one being harassed is connected to the time spent in the technology tools (Stewart, and Fritsch, 2011). The change of lifestyle brings about the increase of harassment. Another attribute of cyber bullying is that the one carrying it out use wrong identities, this hence limits social responsibility making it easier for one to get involved in negative operations. Last of all, the cyber-criminal activities are done with no control processes that may react in cases of harassment. Even though there are a number of law enforcement bodies, there is a lack of bodies that watch over the information passing over the internet. In nations that are quite sensitive to privacy and free speech, they are bound to be against putting in place control measures affecting that. 2.1. Schools in handling cyber bullying Even though the ability to managing cyber bullying is based on the agencies, schools similarly have a duty to play in making sure that there is safety of the learners. The school administration is however faced by challenges of the First Amendment which safeguards controlling speech and tendencies. This fear can be attributed to the laws being unclear on instances that force should be involved. The school, if they are not aware of the impact brought by cyber bullying and harassment may render it a local issue and let it goes scot-free. The schools should be in a position of managing such cases before they rise and become a national issue. 3. Laws applicable to cyber bullying and harassment Cyber bullying is not stated in the law that offers the official bodies elements to undertake law enforcement. On the other hand, cyber bullying tendencies are unlawful like, penal codes that are against assault, harassment, stalking and hate messages among others that may be used to prosecute the ones undertaking such practices. Moreover, there have been policies that have been formulated and offer legal capability for criminal justice bodies to take part and stop cyber bullying acts. In reference to the National Conference of State Legislatures (2009), all of the states have come up with policies that handle electronic harassment. Here are some of the policies that make it possible for the law enforcement to manage cyber bullying. In terms of harassment; this is done is a person abuses or annoys or embarrasses an individual. This can be done electronically or physically through starting communication, through threats, sending consecutive messages that are a nuisance. This harassment can be done over the internet according to sec 33.07 where there is falsifying of identity on the internet so as to harm others or use of another person’s identity with no permission. Law makers are given the hard task of going through all of the social issues and acquire which requires the involvement of the state. As noted, the law makers have recognized online harassment as being one of the social evils that need urgent enforcement. On the other hand, with law enforcement measures in place, cyber bullying and connected issues are to be made sure that the laws made meet the threshold of all the challenges they are to face; the policies ought not to be vague as noted in the US v. Drew in 2009 where the law did not offer guidelines for law enforcement. As stated in the online harassment law (SEC 33.07), it is prohibited to acquire the identity of another person without their permission, though it does not include emails and messages despite its extensive description. 3.1. Federal Initiatives The federal bodies should be on the fore front in enforcing laws dealing with cyber bullying. This is with regard to their technical experience, political backing that enables them to acquire the needed resources and the promotions against terrorism, and there is high pressure that is placed on this federal body to safeguard cybercrime (Stewart, and Fritsch, 2011). The crimes taking place in the states offers them the ability to get involved, where other bodies like the state are not able to. Even though several bodies like the FBI, NSA and DHS have the capability and resources, they do not get involved in cyber bullying. There are laws that are against cyber bullying, they are however explicit in doing away with cybercrimes like Title 18 U.S.C 875 the terms as unlawful the issuance of communication so as to hurt others. However, cyber bullying is seen as a local matter that calls for the federal involvement in cases that are quite serious as well as the instance the laws are seen as inefficient. 3.2. Law and state law enforcement efforts Even though there has been an increase in the number of cases related to cybercrimes, a good number of youths are not for reporting cases on online harassment (National Children’s Home, 2005). This sense of not reporting as well as the complexity of tracking the fast growing harassment using technology, makes policing the cyber bullying crimes to be quite hard for the local and state law bodies. There is the absence of resources and personnel that are skilled in tracking and handling such cases. Bodies that are involved in such efforts do not need extensive skills. There are a number of things that ought to be considered so that cyber bullying and harassment are brought to book. 3.2.1. Training This is more so for the first line officer that are charged with safeguarding and assessing the crime setting, acquiring and storing electronic evidence and issuing evidence in the court. There ought to be a certification program that would make sure that the skills acquired from the training as uniform. 3.2.2. Resources The desire for resources in the relevant sectors, managerial base and tools as well as information is vital aspects in the enforcing laws that combat cyber bullying and harassment. In regards to company models, more relational aspects with other companies were necessary more so due to the form of cyber cases. So as to create association as a team, through thus centers acquire a number of benefits that may involve resources that they would not have acquired (Stewart, and Fritsch, 2011). Each and every department that is engaged in the enforcement of policies handling cyber issues ought to be issued with the relevant resources for them to work in the best way possible. The managers ought to be allocated with sufficient financial backing as well as staff so as to run the agencies in the most effective way possible. These are allocated by the administrative bodies hence calling for cooperation from them. The availability of relevant data is necessary so as to track the crimes that take place as well as to better know the problem and use it as evidence in courts. 3.2.3. Updated Criminal Policies There is the need for the National Institute of Justice to be in touch with the constantly changing technological environment so as to make it possible for them to come up with laws the safeguard the users from harassment. The technology industry is one that is daily changing; new machines are created almost every day while at the same time new ways to harass others are constantly created. This leads to the policy makers as well as enforcers to keep them abreast with what is going on and change the laws so as to accommodate these new practices. 4. Recommendation There are a number of issues that happen and hinder the full application of the law as it should be done. This section offers recommendations so that there is effective management of cyber bullying and harassment. First and foremost there ought to be clear laws on what is unlawful and what freedom of speech and action is. A good number of centers are not able to act on such cases as they fear that they may be infringing on the freedom of the person. The varied sectors additionally ought to be accorded the necessary skills so as to be able to know what is unlawful and what is not. Certain sectors may let crime go free without notice, these calls for skilled staff to handle this. In regards to training, it is recommended that the relevant groups be informed of the process so that they are able to appreciate it. The training should not be based to the police; it ought to integrate all of the relevant departments. It is through this the staff charged with the duty of keeping tracks on the crime will be in a position to note and manage such cases. 5. Conclusion Cyber bullying and harassment are grave issues that are facing the current society and is growing in terms of anonymity. The related agencies that are charged with noting and arresting such issues are not able to handle it since they lack the ability to do so; limited staff, low resources and insufficient laws. The paper has been able to look into the advancing cases in cyber bullying and harassment in the youth. It has been able to show evidence of the cases that are constantly increasing. Additionally it has demonstrated the varied way that it can be handled in terms of laws, policies and resources. These law enforcement efforts call the application of every part of the society from the local to the national as well as international bodies so as to manage cyber bullying and harassment. The future promises to be bright if the necessary steps as stated in the paper are applied. References Li, Q. (2005). New bottle but old wine: A research of cyberbullying in school. Computers in Human Behavior, 23, 1777€“1791. National Children’s Home. (2005). Putting U in the picture: Mobile bullying survey. Retrieved from bullying National Conference of State Legislatures. (2009). State electronic harassment or €œcyberstalking€ laws. Retrieved from Patchin, J.W., & Hinduja, S. (2006). Bulliesmove beyond the schoolyard: A preliminary look at cyberbullying. Youth Violence and Juvenile Justice, 4, 148€“169. Raskauskas, J., & Stoltz, A. D. (2007). Involvement in traditional and electronic bullying among adolescents. Developmental Psychology, 43, 564€“575. Stewart, D. and Fritsch, E. (2011). School and Law Enforcement Efforts to Combat Cyberbullying. Preventing School Failure, 55(2), 79€“87

Leave a Reply

Your email address will not be published. Required fields are marked *