Week 2 assignment: cybercrime legislation | CRJS 6217 – Technological Solutions and 21st-Century Crime | Walden University

If in 1985 someone was asked to define the word sexting, he or she probably would be at a loss for words since that concept did not yet exist. “Sexting” is the combination of sex and texting and is the act of sending sexually explicit messages and/or photos between mobile devices. Approximately 4% to 25% of minors have engaged in sexting, depending on age of those surveyed (Lorang, McNiel, & Binder, 2016).

When sexting involves minors, legal issues and considerations are exacerbated, which may lead to prosecution for crimes like possession and dissemination of child pornography. When one adds the concept of non-consent, the issues related to the prosecution of sexting become even more challenging. As new crimes emerge using advancements in technology, new legislation must be created in an attempt to prevent and address those crimes.

For this assignment, select a type of cybercrime (e.g., cyber-stalking, cyber-bullying, cyber-porn, sexting). Identify a piece of legislation related to that type of cybercrime that is more than 5 years old. Then identify a current piece of legislation related to that type of cybercrime.

The Assignment:

Choose a cybercrime of interest that has been active for more than 5 years and still an issue. Research the Walden Library and the Internet to find examples of legislation focused on cybercrime that is at least 5 years old and legislation that is current (less than 5 years).

Using the Walden Writing Center APA Course Paper Template, write a 3- to 4-page paper in which you do the following:

  • Briefly describe the type of cybercrime you selected.
  • Describe the piece of legislation you selected that is more than 5 years old.
  • Describe the piece of legislation you selected that is current.
  • Explain any significant differences between the two pieces of legislation.
  • Explain how the evolution of the type of cybercrime you selected has influenced legislation.

Support your Assignment with specific references to all resources used in its preparation. You are to provide a reference list for all resources, including those in the Learning Resources for this course.



Taylor, R. W., Fritsch, E. J., Saylor, M., R. &  Tafoya, W. L. (2019). Cyber crime and cyber terrorism (4th ed.). Pearson. 
Chapter 1, “Introduction and Overview of Digital Crime and Digital Terrorism” (pp. 1–19)
Chapter 3, “The Criminology of Computer Crime” (pp. 43–68)
Chapter 6, “White Collar Crimes” (pp. 124–143)

Brinckerhoff, R. (2018). Social network or social nightmare: How California courts can prevent Facebook’s frightening foray into facial recognition technology from haunting consumer privacy rights forever. Federal Communications Law Journal, 70(1), 105-156.

Kugler, M. B., & Strahilevitz, L. J. (2017). The myth of fourth amendment circularity. The University of Chicago Law Review, 84(4), 1747-1812.

Lavorgna, A., & Sergi, A. (2016). Serious, therefore organised? A critique of the emerging “cyber-organised crime” rhetoric in the United Kingdom. International Journal of Cyber Criminology, 10(2), 170-187.

Li, J. X. (2017). Cyber crime and legal countermeasures: A historical analysis. International Journal of Criminal Justice Sciences, 12(2), 196-207.

Michel, C. (2016). Violent street crime versus harmful white-collar crime: A comparison of perceived seriousness and punitiveness. Critical Criminology, 24(1), 127-143.

Michel, C., Heide, K. M., & Cochran, J. K. (2016). The consequences of knowledge about elite deviance. American Journal of Criminal Justice, 41(2), 359-382.

Michel, C., Cochran, J. K., & Heide, K. M. (2016). Public knowledge about white-collar crime: An exploratory study. Crime, Law and Social Change, 65(1-2), 67-91.

Nawafleh, Y., Nawafleh, A., & Nawafleh, S. (2016). Cybercrimes: Concept, forms, and their civil liabilities. International Journal of Arts & Sciences, 9(1), 211-234.

Ngo, F., Jaishankar, K., & Agustina, J. R. (2017). Sexting: Current research gaps and legislative issues. International Journal of Cyber Criminology, 11(2), 161-168.

O’Connor, K., Drouin, M., Yergens, N., & Newsham, G. (2017). Sexting legislation in the united states and abroad: A call for uniformity. International Journal of Cyber Criminology, 11(2), 218-245.

O’Shea, B. (2017). A new method to address cyberbullying in the united states: The application of a notice-and- takedown model as a restriction on cyberbullying speech. Federal Communications Law Journal, 69(2), 119-145.

Rajesh, K. V. N., & Ramesh, K. V. N. (2016). Computer forensics: An overview. Journal on Software Engineering, 10(4), 1-5.

Tokson, M. (2016). Knowledge and Fourth Amendment privacy. Northwestern University Law Review, 111(1), 139-204.

Barnett, C. (2018). The measurement of white-collar crime using Uniform Crime Reporting (UCR) data. Retrieved from https://ucr.fbi.gov/nibrs/nibrs_wcc.pdf

U.S. Department of Justice, Federal Bureau of Investigation. (2017). Preliminary semiannual Uniform Crime Report, January–June 2017. Retrieved from https://ucr.fbi.gov/crime-in-the-u.s/2017/preliminary-report




Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more