Verified Document

Computer Crimes Cynthia Simmons Began Receiving Unwanted Essay

Computer Crimes Cynthia Simmons began receiving unwanted communication from an unknown assailant. She did what the experts recommend: she changed her email address, instant messenger identity and other online identifiers, nothing stopped the computer harassment. She believes the offender to be her ex-boyfriend, Jacob Myers, but even searching her computer and comparing the offending emails to that of Jacob Myers, the evidence has not been sufficient to obtain a search warrant to search Jacob Myers' computer.

It appears that Ms. Simmons is the victim of cyberstalking. According the NCSL, "cyberstalking is the use of the Internet, email or other electronic communications to stalk, and generally...

Simmons, has been receiving calls to her home propositioning her for services and she found out that someone had placed her contact information on an escort service website. Stalking is a serious crime, whether done with a computer or not and almost every state has a law on the books against stalking and several states now have laws against cyberstalking.
In the past few days Ms. Simmons has been contacted via e-mail on how to stop the harassment. She was told to send $9.99 through PayPal for four different payments. However, when the identify of the account holder was discovered, it was traced to an account that…

Sources used in this document:
References

Epley, C. (June 23, 2010). Cyber-Crimes: An Analysis of Cyber-extortion. Retrieved from http://www.suite101.com/content/cyber-crimes-part-one-cyber-extortion

Greenberg, P. (January 26, 2011). State Cyberstalking, Cyberharrasment and Cyberbullying Laws.

National Conference of State Legislatures (NCSL). Retrieved from http://www.ncls.org/IssuesResearch/TelecommunicationsInformationTechnology/CyberstalkingLaws.html.
Cite this Document:
Copy Bibliography Citation

Related Documents

Computers and the Internet
Words: 1343 Length: 5 Document Type: Term Paper

Computers and the Internet The Naked Mind When Roszak refers to the "naked mind," he means to speak about the capacity and ability of the human mind as compared to the capabilities that the computer machines can do. According to Roszak, how the human mind works has vital differences from how computers process information. Roszak praises the human mind because according to him, the human mind is more dynamic and more independent

Computers Recent Progress in the
Words: 444 Length: 1 Document Type: Term Paper

Unlike Linux, Windows can only run in GUI mode, which requires more system resources for running complicated and exacting applications, including networking functions. From the other side most of software applications, which are designed nowadays, are Windows oriented and they do not work even under WINE (windows interpreter for Linux), which limits options of Linux. Integrated security features in Linux are more powerful than in most of Windows versions,

Computers and Work -- and
Words: 457 Length: 1 Document Type: Term Paper

" (Wahlgren, 2004) Telecommuting, conversely, can cause the opposite problem -- isolating employees from the input of other individuals, and also the system of rewards that comes from having a manager praise -- or critique one's performance in a personal basis, rather than through emails or online correspondence. The Internet seems to act to decrease social connections on the whole. "13% of heavy Internet users reported spending less time attending

Computers in Nursing the Next
Words: 862 Length: 3 Document Type: Term Paper

Figure 2: Comparing RFID Tags and their Use It's important to note that the majority of RFID tags can be programmed by the user - a critical component in the development of patient-based strategies around RFID and the reason healthcare service providers are focused on this technology and its implications for redefining their entire treatment programs and treatment value chains. Figure 3 provides a schematic that defines how RFID works. Tags communicate

Computers & the Internet: Intellectual
Words: 1783 Length: 5 Document Type: Research Paper

S.C. § 302). In contrast, copyright protection for a work created between 1923 and the end of 1977 has already expired currently. With the durational element of copyright protection in mind, one can clearly see how important such protection is for creators. Having one's work meet the requirements for federal copyright protection is of the utmost importance to solidifying long-term and strong protection of one's efforts as a creator and

Computers VPN As a Company Grows, It
Words: 1000 Length: 3 Document Type: Essay

Computers VPN As a company grows, it might increase to multiple shops or offices across the nation and around the world. In order to keep things running proficiently, the people working in those locations need a quick, secure and reliable way to share information across computer networks. In addition, travelling workers like salespeople need a regularly protected and reliable way to connect to their business's computer network from distant locations. One well-liked

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now